CSCI824-swain - securitymanagement Course:CSCI824(...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
Automation possibilities in information  security management by Stefan Fenz and Raydel Montesino Course: CSCI824 (Secure Database System)  Advisor: Dr. C. Farkas Semester: Fall 2011 Presenter: M. Swain Email: [email protected]
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
IT’S A JUNGLE OUT THERE Computer Viruses Trojan Horses Address Book theft DNS Poisoning Zombies, IP Spoofing Password Grabbers Logic Bombs Network Worms Hijacked Home Pages Denial of Service Attacks Buffer Overruns Password Crackers * Slide borrowed from: www.hpplnj.org/technology/ratzan2.ppt
Background image of page 2
In 1980 a computer cracked a 3-character password within  one minute  [4] . DID YOU KNOW? In 2004 a computer virus infected 1 million computers within  one hour  [4] . In 1999 a team of computers cracked a 56-character password  within one day [4] . Between February 2005 and July 2006, there     were 237  reported security breaches involving more than 89 million records  which contained personal information .
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
What is the Solution?
Background image of page 4
Solutions Good Security Practice    Information Security as the preservation of: Ø Confidentiality Ensuring that information is accessible only to those  authorized to have access Ø Integrity Safeguarding the accuracy and completeness of  information and processing  methods
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/13/2011 for the course CSCE 824 taught by Professor Staff during the Fall '11 term at South Carolina.

Page1 / 20

CSCI824-swain - securitymanagement Course:CSCI824(...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online