IT541_Unit3 - Unit 3 1 Running Head QUESTIONS FROM THE BOOK...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Unit 3 1 Running Head: QUESTIONS FROM THE BOOK PROJECT Questions from the Book Project 3 Jennifer Angel Kaplan University IT 541 Computer and Network Security Dr. Steven Case January 26, 2010
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Unit 3 2 Abstract Security threats grow in numbers daily, they include worms, viruses and Trojan Horses. Through these malicious software enemies companies have striven to better their network efforts to keep the unwanted outside. In creating a more protected environment for employees and users of the network services, authentication comes into play. This paper will attempt to correctly identify the issues related to the problems.
Background image of page 2
Unit 3 3 Project 3 7.5 Consider the following fragment in an authentication program: Username = read_username (); Password = read_password(); If username is "133t h4ck0r" Return ALLOW_LOGIN; If username and password are valid Return ALLOW_LOGIN Else return DENY_LOGIN What type of malicious software is this? This is a back door program. It's a mechanism that bypasses a regular security check. It has been noted sometimes programmers will create a back door for legitimate purpose - one could be the possibility of skipping a rather lengthy authentication process especially when the programmer is trying to debug a network. Back doors are also used as a stand-alone program and may be entered into legitimate code. There is a specific kind of back door called a RAT (Remote Administration Tool) and sometimes referred to as a Remote Access Trojan. The RAT allows for the computer to be monitored and controlled from a remote location. Some people will place a RAT in the network to allow a company network to be reached from home and other programmers will place this back door in a computer to allow a help desk person access to the problem area to help get the system functioning again. In the criminal mind, if a RAT has been placed on a network - it is
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/09/2010 for the course IT 541 taught by Professor Cs during the Winter '10 term at Kaplan University.

Page1 / 7

IT541_Unit3 - Unit 3 1 Running Head QUESTIONS FROM THE BOOK...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online