This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: o Viruses o Worms o Trojans o Backdoors o Botnets (Zombies) o Cookies o Phishing (Deceptive email to gain personal information) o Pharming (Website hijack) § Ways of Protection: · Firewalls · AntiVirus · OS Updates · AntiSpyware/Spamware Protecting Information Physical (alarm system, backup system) Access (focus on identifying user; biometric recognition, ID/smart cards, passwords) Communication (networks; firewalls, encryption) Disaster Recovery Plan Identifying critical parts of an operation Disaster Avoidance Plans § Uninterrupted Power Supply (UPS) § Backups · Cold Site Backups (Stored off-site on another medium; disk) · Warm Site Backups (Off-site on computers on regular basis) · Hot Site Backups (Simultaneously duplicating off-site)...
View Full Document
This note was uploaded on 03/30/2008 for the course MIS 204 taught by Professor Davidp.kitlan,pe during the Fall '08 term at Penn State.
- Fall '08