Security Threats

Security Threats - Understand how security threats can...

Info iconThis preview shows pages 1–14. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Understand how security threats can affect you.  Know the sources of security threats. Productivity  Privacy ACLU Pizza Delivery  Theft Financial Assets Other Tangible Assets Identity 1 in 4 Americans have been victims of identity theft in last five years  Average cost to victim = $500  Average time spent by victim = 40 hrs.  71% of fraud happens within 1 week Natural events  Human mistakes  Malicious human activity Undesirable software on your computer Virus Worm Trojan Horse Denial of Service Attacks Adware/Spyware Your computer displays vulgar, embarrassing, or annoying messages  Your computer develops unusual visual or sound effects  Your computer suddenly seems to work very slowly  Your computer reboots unexpectedly Executable files increase in size unexpectedly  Your computer starts sending out lots of e- mail messages on its own  You have difficulty saving files, or files mysteriously disappear Program instructions in a file that reproduces itself, and spreads to other files on same computer Malware that can spread itself to other computers with minimal user interaction A program that seems to perform one (good) function while actually doing something else (bad) A program that controls infected machines and commands them to flood a network with traffic by making numerous unnecessary requests Before the Super Bowl, several gambling websites were threatened by organized criminal demanding extortion. They threatened to attack the sites servers with a denial-of-service attack unless protection money was paid. The potential damage was huge because many people would place bets during a short period of time. An outage of a few hours could result in the loss of up to a million dollars. Some smaller sites paid up, figuring it would be cheaper than to face the loss. Software that gathers information about your...
View Full Document

This note was uploaded on 07/08/2010 for the course ACIS 1504 taught by Professor Jmlacoste during the Spring '07 term at Virginia Tech.

Page1 / 28

Security Threats - Understand how security threats can...

This preview shows document pages 1 - 14. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online