w7_3_Security_chp8

w7_3_Security_chp8 - Security IE332 to edit Master subtitle...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
Click to edit Master subtitle style Security IE332 2/26/2010 yij@purdue.edu
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Announcements TipShow Voting through Online Survey. You pick up top three TipShows. We had total 38 chances of TipShow. Rank 1 – 7: 5% Rank 8 – 14: 4% Rank 15 – 21: 3% Rank 22 – 28: 2% Rank 29 – 38: 1%
Background image of page 2
Why systems are vulnerable? Hardware problems Breakdowns, configuration errors, damage from improper use or crime Software problems Programming errors, installation errors, unauthorized changes) Disasters Power failures, flood, fires, etc.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security Vulnerability
Background image of page 4
Internet vulnerabilities Network open to anyone Size of Internet means abuses can have wide impact Use of fixed Internet addresses with permanent connections to Internet eases identification by hackers E-mail attachments E-mail used for transmitting trade
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Wireless security challenges Radio frequency bands easy to scan SSIDs (service set identifiers) Identify access points Broadcast multiple times
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 25

w7_3_Security_chp8 - Security IE332 to edit Master subtitle...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online