10 Security Threats

10 Security Threats - SecurityThreats ConceptsText...

Info iconThis preview shows pages 1–13. Sign up to view the full content.

View Full Document Right Arrow Icon
Security Threats Concepts Text Chapter 9 – Information  Security Management Sections Q1, Q3-Q6 Skip Sections Q2 & Q7
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Today’s Objectives Understand how security threats can affect  you. Know the sources of security threats.
Background image of page 2
Why Discuss IT Security? Productivity Privacy ACLU Pizza Delivery  Theft Financial Assets Other Tangible Assets Identity
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
What Are the Threats to  Information Security? Natural events Human mistakes Malicious human activity
Background image of page 4
What is Malware? Undesirable software on your computer Virus Worm Trojan Horse  Denial of Service Attacks Adware/Spyware
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
What are Some Symptoms of a  Malware Infection? Your computer displays vulgar, embarrassing, or  annoying messages Your computer develops unusual visual or  sound effects Your computer suddenly seems to work very  slowly Your computer reboots unexpectedly
Background image of page 6
What are Some Symptoms of a  Malware Infection? Executable files increase in size  unexpectedly Your computer starts sending out lots of e- mail messages on its own You have difficulty saving files, or files  mysteriously disappear
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
What is a Virus? Program instructions in a file that reproduces itself, and  spreads to other files on same computer
Background image of page 8
What is a Worm? Malware that can spread itself to other  computers with minimal user interaction
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
What is a Trojan Horse? A program that seems to  perform one (good) function  while actually doing  something else (bad)
Background image of page 10
What is a Denial of  Service Attack?  A program that controls infected machines and  commands them to flood a network with traffic by  making numerous unnecessary requests
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Denial of Service Example Before the Super Bowl, several gambling  websites were threatened by organized criminal  demanding extortion.  They threatened to attack  the sites’ servers with a denial-of-service attack  unless “protection” money was paid.  The  potential damage was huge because many  people would place bets during a short period of  time.  An outage of a few hours could result in  the loss of up to a million dollars.  Some smaller  sites paid up, figuring it would be cheaper than  to face the loss.
Background image of page 12
Image of page 13
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 11/21/2011 for the course ACIS 1504 taught by Professor Jmlacoste during the Fall '07 term at Virginia Tech.

Page1 / 27

10 Security Threats - SecurityThreats ConceptsText...

This preview shows document pages 1 - 13. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online