Lecture-Net-Security-4-14-10-2

Lecture-Net-Security-4-14-10-2 - CIS3360...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
1 CIS 3360 Lecture Network Security Ratan K. Guha, Spring 2010 April 14, 2010
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Reading Assignments Chapter 7, Table 7.5 and 7.7 Security in Networks I gave this as a reading assignment at the beginning of the semester and again. Briefly we will talk about network security controls 2
Background image of page 2
Information about CyberSpy US court orders keylogger CyberSpy to halt software sales The Federal Trade Commission (FTC) won an injunction today against software  vendor and keylogger developer CyberSpy. The US district court ruling prohibits  CyberSpy from selling or operating its RemoteSpy software package. By  Joel Hruska  | Last updated November 18, 2008 7:37  PM http://arstechnica.com/security/news/2008/11/us-court-o  (source) 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Threats in Networks Attackers gather information about a network Attackers exploit vulnerabilities Network vulnerabilities are given in table 7.4 Vulnerabilities are determined by collecting information about 
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 10/05/2010 for the course CIS CIS 3360 taught by Professor Guha during the Spring '10 term at University of Central Florida.

Page1 / 14

Lecture-Net-Security-4-14-10-2 - CIS3360...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online