This preview shows pages 1–3. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: o Viruses o Worms o Trojans o Backdoors o Botnets (Zombies) o Cookies o Phishing (Deceptive email to gain personal information) o Pharming (Website hijack) Ways of Protection: Firewalls AntiVirus OS Updates AntiSpyware/Spamware Protecting Information Physical (alarm system, backup system) Access (focus on identifying user; biometric recognition, ID/smart cards, passwords) Communication (networks; firewalls, encryption) Disaster Recovery Plan Identifying critical parts of an operation Disaster Avoidance Plans Uninterrupted Power Supply (UPS) Backups Cold Site Backups (Stored off-site on another medium; disk) Warm Site Backups (Off-site on computers on regular basis) Hot Site Backups (Simultaneously duplicating off-site)...
View Full Document
- Fall '08