Upload
carolyn-brockman
View
196
Download
1
Tags:
Embed Size (px)
DESCRIPTION
Citation preview
Computer Security
Part 1 of 2Small book by Shelly
Cashman that came with text.
Top 10 Hackers Who Got Caught
Gerald Martin hacked into the system of a company that competed with his. – NY Times
Anonymous “A Leaderless Hacker Group”
Figure 10-1, pg 382
Internet and Network AttacksVirus Worm Trojan Rootkit
Infects, negatively altering the way computer works
Copies itself repeatedly, using up resources
Needs certain condition to trigger, does not replicate
Allows person to take over your computer from remote location.
Figure 10-2 from pg 385
Tro-jan Pro-
grams;
3.90%
Viruses;
7.00%
Network Worms; 89.10%
Malicious Program Types
http://www.securelist.com/en/analysis/151436695/Virus_Review_2002
Porta-ble Media; 1.30%
In-ternet; 2.30%
Email; 93.40%
Main Virus Threat
Safeguards against computer viruses and other malware
Figure 10-5 from pg 388 of your book
Safeguards
Hardware Theft and Vandalism
Information Theft (Encryption)
Information Theft (Digital Signature)
System Failure
Uninterruptible Power Supply (UPS)
Backing Up – The Ultimate Safeguard
Wireless Security
Wireless Access Point (WAP)
802.11i network
For Next Time
• Read the rest of the Computer Security booklet, page 398 to the end (p. 408). Be prepared to take home test.