{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Chapter 15 - Information Technology in Theory By Pelin...

Info icon This preview shows pages 1–12. Sign up to view the full content.

View Full Document Right Arrow Icon
Information Technology in Theory Chapter 15 Network Security Information Technology in Theory By Pelin Aksoy and Laura DeNardis
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Information Technology in Theory 2 Objectives Understand the main types of network security threats, including denial-of-service attacks, viruses, worms, identity theft, and password theft Examine why critical infrastructure attacks are a concern in the current economic and political context Understand how to significantly reduce the risk of attacks through basic security approaches like firewalls, access control software, and encryption
Image of page 2
Information Technology in Theory 3 Objectives (continued) Distinguish between packet filtering and stateful inspection and application proxy firewall approaches Learn about public key cryptography Become familiar with advanced security techniques such as digital signatures and biometric identification
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Information Technology in Theory 4 Understanding the Threats Morris Worm The first highly publicized network security problem 1988 Network security breaches still a daily occurrence The annual costs of preventing attacks and implementing reparative security measures is massive.
Image of page 4
Information Technology in Theory 5 CERT Respond to problems Report incidents Research security technologies Educate users about security Homeland security International CERTs
Image of page 5

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Information Technology in Theory 6 Who is a threat? Hackers Spammers Rogue employees Corporate or national spies Cyberterrorists
Image of page 6
Information Technology in Theory 7 Cyberterrorism A terrorist attack could employ a variety of tactics to disrupt or disable networks for hours, days, or even weeks. Financial systems Airline reservation systems Stock market networks ATMs Power grid Water systems Air traffic control
Image of page 7

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Information Technology in Theory 8 Types of Attacks Viruses and worms Denial-of-service attacks Identity and password theft
Image of page 8
Information Technology in Theory 9 Types of Attacks (continued) Data interception and modification Bandwidth piracy Critical infrastructure attacks
Image of page 9

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Information Technology in Theory 10 Viruses Like biological viruses spread among people, computer viruses propagate from computer to computer. A virus is malicious code embedded within a seemingly legitimate program that only becomes active when the program is executed. For example, a file attached to an e-mail may actually be a virus that executes when the file downloads or the user double-clicks the link.
Image of page 10
Information Technology in Theory 11 Worms Self-propagating and self-replicating. Autonomous—once unleashed, replicate without any action on the part of users.
Image of page 11

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 12
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern