Chapter 15 - Information Technology in Theory By Pelin...

Info iconThis preview shows pages 1–12. Sign up to view the full content.

View Full Document Right Arrow Icon
Information Technology in Theory Chapter 15 Network Security Information Technology in Theory By Pelin Aksoy and Laura DeNardis
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Information Technology in Theory 2 Objectives Understand the main types of network security threats, including denial-of-service attacks, viruses, worms, identity theft, and password theft Examine why critical infrastructure attacks are a concern in the current economic and political context Understand how to significantly reduce the risk of attacks through basic security approaches like firewalls, access control software, and encryption
Background image of page 2
Information Technology in Theory 3 Objectives (continued) Distinguish between packet filtering and stateful inspection and application proxy firewall approaches Learn about public key cryptography Become familiar with advanced security techniques such as digital signatures and biometric identification
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Information Technology in Theory 4 Understanding the Threats Morris Worm The first highly publicized network security problem 1988 Network security breaches still a daily occurrence The annual costs of preventing attacks and implementing reparative security measures is massive.
Background image of page 4
Information Technology in Theory 5 CERT Respond to problems Report incidents Research security technologies Educate users about security Homeland security International CERTs
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Information Technology in Theory 6 Who is a threat? Hackers Spammers Rogue employees Corporate or national spies Cyberterrorists
Background image of page 6
Information Technology in Theory 7 Cyberterrorism A terrorist attack could employ a variety of tactics to disrupt or disable networks for hours, days, or even weeks. Financial systems Airline reservation systems Stock market networks ATMs Power grid Water systems Air traffic control
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Information Technology in Theory 8 Types of Attacks Viruses and worms Denial-of-service attacks Identity and password theft
Background image of page 8
Information Technology in Theory 9 Types of Attacks (continued) Data interception and modification Bandwidth piracy Critical infrastructure attacks
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Information Technology in Theory 10 Viruses Like biological viruses spread among people, computer viruses propagate from computer to computer. A virus is malicious code embedded within a seemingly legitimate program that only becomes active when the program is executed. For example, a file attached to an e-mail may actually be a virus that executes when the file downloads or the user double-clicks the link.
Background image of page 10
Information Technology in Theory 11 Worms Self-propagating and self-replicating. Autonomous—once unleashed, replicate without any action on the part of users. Exploit existing vulnerabilities, or security holes
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 12
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 01/26/2012 for the course IT 108, 103, taught by Professor Bruno during the Spring '11 term at George Mason.

Page1 / 50

Chapter 15 - Information Technology in Theory By Pelin...

This preview shows document pages 1 - 12. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online