Course Hero Logo

ITM 820 Assignment 3.docx - Information Systems Security...

  • Ryerson University
  • ITM 750
  • JusticeStraw8839
  • 3
  • 100% (1) 1 out of 1 people found this document helpful

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 3 out of 3 pages.

Information Systems Security and Privacy - ITM820 Assignment 3Section 1 – Fill in the Blanks1.Cyber criminals2.Denial of Service3.IPS4.Personal firewall5.Malware6.Zombie7.Virus8.Advanced Persistent Threats9.Flooding ping command10. Activists11. Logic bomb12. Exploits13. Knowledge based14. Anything15. Infection Mechanism16. Availability17. Politically motivated attackers18. Propagation19. Prevention20. Maintain access21. Hybrid IDS22. Distributed DoS23. Low interaction honeypot24. Anomaly25. Spam26. Metamorphic virus27. Network Based Intrusion Detection28. Firewall29. Worm30. Apprentice31. Social engineering attacks (convince user to bypass security mechanisms to installtrojans or respond to phishing attacks)32. Multipartite33. Intrusion
34. Remote systems35. Rate halting36. SYN spoofing37. Spoofed source38. IDS39. Internal threats40. Statistical41. Honeypot42. Signature43. Access policy44. Forward45. Privilege escalation46. Trojan47. Host-based firewalls48. Host based IDS49. Circuit level proxy50. Application proxy

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 3 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
TimMclaren
Tags
Transmission Control Protocol, Denial of service attack, Spoofing attack

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture