ICT211_StudyUnit3 - ICT211 Encryption Techniques And System...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
ICT211 Encryption Techniques And System Security STUDY UNIT 3
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 2
ICT211 STUDY NOTES STUDY UNIT 3 SIM UNIVERSITY SU3-1 SUMMARY OF UNIT 3 This is the third Unit for the course Encryption Techniques and System Security . There are altogether two chapters: Chapter 10 and Chapter 11. Chapter 10 is on Malicious Software. It highlights the well-known threats of viruses. It also discusses other types of malicious software (e.g. logic bombs, zombies, etc.) and the counter-measures. Chapter 11 discusses a critical component in network security, the firewall. Different types of firewalls, their strengths and limitations, as well as the various possible deployment configurations will be discussed. As a whole these three chapters will provide better insights at system-level security issues. STUDY GUIDE FOR UNIT 3 Chapter 10 Malicious Software This chapter discusses another well-publicized security area: malicious software. This covers viruses and worms, as well as other less well-known problematic software such as trap doors and zombies. Not surprisingly, due to its widespread nature, viruses will be our focus. We will discuss the different types of viruses, different phases in its life time, and counter-measures. On the other hand, we will not go into details of its structure (Page 337 – 338), nor into the advanced anti-virus techniques (Page 345 – 347). Chapter 11 Firewalls In this chapter, we shall look at a security component, the firewall , that is used in most networks these days. The important material in this chapter is in Section 11.1 in the reference text. We will discuss the characteristics of firewalls, the techniques they employed, the strengths and limitations (Page 356 – 366). We will also discuss the different types of firewalls and the configurations (Page 366 – 368). The material in Trusted Systems (Page 368 – 373) will only be briefly touched on. The estimated time required to cover the material in each chapter is as follows: Topics Estimated Study Time Chapter 10 10.1 Viruses and Related Threats 12 hours 10.2 Viruses Countermeasures 3 hours Chapter 11 11.1 Firewall Design Principles 12 hours 11.2 Trusted Systems 1 hours
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
STUDY UNIT 3 ICT211 STUDY NOTES SU3-2 SIM UNIVERSITY CHAPTER 10 MALICIOUS SOFTWARE 10.1 VIRUSES AND RELATED THREATS This chapter is again on an area of security that has been well-publicized. It concerns software that may sabotage a computing system. This includes the well- known examples of viruses, worms, Trojan horses, etc. There could be quite a few different types of such malicious software. A good way to classify is as follows. Malicious Programs 1. Some of these programs, or rather, fragments of programs, that cannot exist independently of some actual program. They also do not replicate themselves when executed. Examples of these include trap doors, logic bombs and Trojan horses. 2.
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 09/06/2010 for the course IT ICt211 taught by Professor Tan during the Spring '10 term at Singapore Institute of Management.

Page1 / 24

ICT211_StudyUnit3 - ICT211 Encryption Techniques And System...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online