INFSYS3848Week3.pdf INFSYS 3848
Popular in Principles of Information Security
Popular in Information technology
This 2 page Class Notes was uploaded by Andreas on Wednesday February 3, 2016. The Class Notes belongs to INFSYS 3848 at University of Missouri - St. Louis taught by Dr. Shaji Khan in Spring 2016. Since its upload, it has received 26 views. For similar materials see Principles of Information Security in Information technology at University of Missouri - St. Louis.
Reviews for INFSYS3848Week3.pdf
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 02/03/16
Week 3 Security Malware Viruses Program written to alter the way a computer works ,without the permision of the user. It needs a program or a host ﬁle so it can spread from one computer to another. They leave infections as the travel. A virus cannot spread without a human action like running the program. Worms Programs that replicate themselves without the use of a host ﬁle. It is a subclass of a virus. The biggest danger is that it replicates itself on a system.This way it can send thousands of copies of itself to create a devastating effect. Trojan horse Appears legitimate but it is malicious. It can take the form of an email. It create a back door in the systems which gives access to another user to take over conﬁnential oinformation.Unlike virues and worms they don not replicate themselves. Spyware Program that can monitor activity in your computer. They spy passwords ,names ,account numbers etc. Usually for advertising purposes spyware can track users information for preferences and and places we visit. While a ﬁrewall can block the online transaction of a spyware program, an antivirus can identify the treat and remove it. Hacking Intentionally using a computer resource without authorization.Traditionally it scans netwroks for computers which may have vulnerabilities. After they break in the system, the hacker tool kit is installed that is nothing else but software which automates many hacking attacks. Denial of service attacks(DoS) A method hackers use to prevent or deny legitimate users access to a computer. They are typically executed using DoS tools that send many packets to a server. The attack ﬂoods the server’s resources and makes the system unusable.Any system that is connected to the internet and is equiped with TCp-based network services is subject to attack. Another type of DoS attack are the Zombie computers or Botnets. What happens in this case is that hackers use viruses ,warms and trojans to gain control of many computers .Then ,they send commands to these “bots” to send data to target servers.These computers are then used to carry our Distributed Denial of Service Attacks(DDoS) which means that hundreds computers may be involved. Attacks targeted towrds individuals (Social engineering) Tricking /manipulating vistims into actions or entrusting conﬁdential information. It includes phishing(type of social engineering attack that an email is sent with a link to a authentic looking website where users are asked conﬁdential information. Types of attackers(Hackers) • Good guys: white hat • Bad guys: black hat • Script Kiddies: inexperienced individuals trying to become hackers by using available scripts and tools to carry out hacking activitis.The reason why they are dangerous is that there are so many of wanna be hackers. Types of attackers(Digrunted employees): they can cause great damage because they are familiar with systems and vulnerabilties ,they have access and know what can cause the greatest damage.Examples are disgrunted IT staff ,particularly those in networking,software development and IT security. Accidents and natural disasters: they can cause major disruptions to telecomunication networks and oragnizaitional data. Also business continuity planning are outlines procedures for keeping an organization in the event of a natural disaster
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'