Ch 7 Security - SECURITY CHALLENGES & VULNERABILITIES...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
Figure 7-1, p. 232 WHY SYSTEMS ARE VULNERABLE E , E , E System Complexity E Computerized Procedures Not Always Read or Audited Extensive E Effect of Disaster E (Electrical Problems, Power Failures, Flood, Fires, Natural Disaster, etc.) Unauthorized E Access Possible * THREATS,d TO INFO SYSTEMS Hardware Problems (Breakdowns E , Configuration E Errors, Damage From Improper E Use Or Crime) Software Problems (Programming Errors, Program Changes, Installation Errors, Unauthorized E Changes) Telecommunications Problems Internet Vulnerabilities E Wireless Security Challenges * THREATS TO INFO SYSTEMS User Errors Access Penetration Personnel Actions Theft E Data Services
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Equipment E VULNERABILITIES E SOFTWARE: Failure Of Protection Features, Access Control, Bounds Control FILES/DATA: Subject To Theft, Copying, Unauthorized Access, Changing Data * MALICIOUS E SOFTWARE (Malware) Viruses Worms Trojan Horses Spyware i Key Loggers * COMPUTER VIRUS Rogue Program Difficult to Detect E Spreads Rapidly E Destroys Data Disrupts E Processing * WORM
Background image of page 2
Independent E Computer Programs Copy Themselves From One Computer To Other Computers Over A Network Are NOT Attached To Program Files Spread Rapidly Operation Of Computer Networks * TROJAN HORSE Program That Appears Useful But Contains A Hidden Security Risk * KEY LOGGERS Record Every Keystroke Steal E Information Launch Internet Attacks Gain E Access To E-mail Accounts Obtain E Password Gather E Personal Information (E.G., Credit Card Numbers) * Hackers Vs. Crackers
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Cyber vandalism Spoofing i Sniffing i Denial-of-Service (DoS) Attack Distributed Denial-of-Service (DDoS) Attack Botnets i * HACKERS vs CRACKERS HACKER Gains Illegal E Access to Computer MOTIVATION E Profit E Criminal E Mischief E Personal Pleasure E CRACKER Hacker With Criminal E Intent * CYBERVANDALISM Intentional E Disruption E , Defacement E , Or Destruction E Of A Web Site Or Corporate E Information System * SPOOFING E
Background image of page 4
Spoof: Misrepresent E Oneself By Using Fake E E-mail Address Or Masquerade E As Someone Else Spoofing: Redirect A Web Link To An Address Different From The Intended One * SNIFFING E Sniffer: Eavesdropping E Program Monitoring E Information Traveling Over A Network Sniffers Enable Hackers To Steal E Proprietary E Information From Anywhere * DENIAL-OF-SERVICE (DoS) ATTACK Flood Network Server Or Web Server With Thousands Of FALSE E Communications Or Requests For Service Goal: Crash Network Network Has So Many Queries It Cannot Service Legitimate Requests * DISTRIBUTED DENIAL-OF-SERVICE (DDoS) ATTACK
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/31/2011 for the course ACCOUNTING 1111 taught by Professor Burs during the Spring '11 term at Troy.

Page1 / 15

Ch 7 Security - SECURITY CHALLENGES & VULNERABILITIES...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online