9781423901402_PPT_Ch15 - Information Technology in Theory...

Info iconThis preview shows pages 1–12. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 15 Network Security Information Technology in Theory By Pelin Aksoy and Laura DeNardis
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Objectives Understand the main types of network security threats, including denial-of-service attacks, viruses, worms, identity theft, and password theft Examine why critical infrastructure attacks are a concern in the current economic and political context Understand how to significantly reduce the risk of attacks through basic security approaches like firewalls, access control software, and encryption Information Technology in Theory
Background image of page 2
3 Objectives (continued) Distinguish between packet filtering and stateful inspection and application proxy firewall approaches Learn about public key cryptography Become familiar with advanced security techniques such as digital signatures and biometric identification Information Technology in Theory
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 Understanding the Threats Morris Worm The first highly publicized network security problem 1988 Network security breaches are still a daily occurrence The annual costs of preventing attacks and implementing reparative security measures is massive Information Technology in Theory
Background image of page 4
5 CERT Respond to problems Report incidents Research security technologies Educate users about security Homeland security International CERTs Information Technology in Theory
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6 Who is a threat? Hackers Spammers Rogue employees Corporate or national spies Cyberterrorists Information Technology in Theory
Background image of page 6
7 Cyberterrorism A terrorist attack could employ a variety of tactics to disrupt or disable networks for hours, days, or even weeks Financial systems Airline reservation systems Stock market networks ATMs Power grid Water systems Air traffic control Information Technology in Theory
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
8 Types of Attacks Viruses and worms Denial-of-service attacks Identity and password theft Data interception and modification Bandwidth piracy Critical infrastructure attacks Information Technology in Theory
Background image of page 8
9 Viruses Like biological viruses spread among people, computer viruses propagate from computer to computer A virus is malicious code embedded within a seemingly legitimate program that only becomes active when the program is executed For example, a file attached to an e-mail may actually be a virus that executes when the file downloads or the user double-clicks the link Information Technology in Theory
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
10 Worms Self-propagating and self-replicating Autonomous—once unleashed, replicate without any action on the part of users Exploit existing vulnerabilities, or security holes Modify files, launch coordinated attacks that flood a target computer with messages, or simply overwhelm a network with debilitating amounts of traffic Information Technology in Theory
Background image of page 10
11 Social Engineering Hoax viruses use social engineering techniques to make users take some action that simulates the actual effects of a virus
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 12
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 06/14/2011 for the course CIS 3003 taught by Professor Bauer during the Spring '11 term at University of Central Florida.

Page1 / 49

9781423901402_PPT_Ch15 - Information Technology in Theory...

This preview shows document pages 1 - 12. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online