OMIS2000- Chapter Notes

O based on the priorities established by the networks

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: nal corporate networks through smartphones. • Internet vulnerabilities o Computers connected to the Internet through a digital subscriber line because they use fixed Internet addresses, where they can be easily identified. A fixed Internet address creates a fixed target for hackers. o Telephone service based on internet technology (hackers can intercept conversations or shut down voice service by flooding servers supporting VoIP with bogus traffic o Vulnerability increased due to widespread of use of email, instant messaging, and peer- to- peer file sharing programs. (springboard for malicious software or unauthorized access to corporate systems) • Wireless Security challenges o Wireless networks in many locations do not have basic protections against war driving, in which eavesdropper drive by buildings or park outside and try to intercept wireless network traffic. Malicious software: viruses, worms, Trojan horses, and spyware • Malicious software programs, are referred to as malware (include a variety of threats, such as computer viruses, worms and Trojan horses. • Computer virus – is a rogue software program that attaches itself to other software programs or data files in order to be executed, usually without knowledge or permission. o Deliver a ‘payload’ (such as instructions to display a message or image, or destroying programs or data, clogging computer memory, reformatting a computers hardware, or causing programs to run improperly. o Spread from computer to computer, when some action is taken such as sending an email attachment or copying an infected file. • Worms o Independent computer programs that copy themselves from one computer to other computers over a network. • OMIS 2000 Final Exam Gahtan 26 o Unlike viruses they can operate on their own without attaching to other computer program files and rely less on human behaviour to spread from computer to computer o...
View Full Document

Ask a homework question - tutors are online