Computer security

Preview:

DESCRIPTION

 

Citation preview

Computer Security

Part 1 of 2Small book by Shelly

Cashman that came with text.

Gerald Martin hacked into the system of a company that competed with his. – NY Times

Anonymous “A Leaderless Hacker Group”

Figure 10-1, pg 382

Internet and Network AttacksVirus Worm Trojan Rootkit

Infects, negatively altering the way computer works

Copies itself repeatedly, using up resources

Needs certain condition to trigger, does not replicate

Allows person to take over your computer from remote location.

Figure 10-2 from pg 385

Tro-jan Pro-

grams;

3.90%

Viruses;

7.00%

Network Worms; 89.10%

Malicious Program Types

http://www.securelist.com/en/analysis/151436695/Virus_Review_2002

Porta-ble Media; 1.30%

In-ternet; 2.30%

Email; 93.40%

Main Virus Threat

Safeguards against computer viruses and other malware

Figure 10-5 from pg 388 of your book

Safeguards

Hardware Theft and Vandalism

Software Theft

• End-User License Agreement (EULA)

Information Theft (Encryption)

Information Theft (Digital Signature)

System Failure

Uninterruptible Power Supply (UPS)

Backing Up – The Ultimate Safeguard

Wireless Security

Wireless Access Point (WAP)

802.11i network

For Next Time

• Read the rest of the Computer Security booklet, page 398 to the end (p. 408). Be prepared to take home test.

Recommended