New User Special Price Expires in

Let's log you in.

Sign in with Facebook


Don't have a StudySoup account? Create one here!


Create a StudySoup account

Be part of our community, it's free to join!

Sign up with Facebook


Create your account
By creating an account you agree to StudySoup's terms and conditions and privacy policy

Already have a StudySoup account? Login here


by: Andreas

INFSYS3848Week3.pdf INFSYS 3848

GPA 3.8

Preview These Notes for FREE

Get a free preview of these Notes, just enter your email below.

Unlock Preview
Unlock Preview

Preview these materials now for free

Why put in your email? Get access to more of this material and other relevant free materials for your school

View Preview

About this Document

Week 3 notes. Feel free to read them. Its about hacking and attacks
Principles of Information Security
Dr. Shaji Khan
Class Notes
hackers, attacks, DoS
25 ?




Popular in Principles of Information Security

Popular in Information technology

This 2 page Class Notes was uploaded by Andreas on Wednesday February 3, 2016. The Class Notes belongs to INFSYS 3848 at University of Missouri - St. Louis taught by Dr. Shaji Khan in Spring 2016. Since its upload, it has received 26 views. For similar materials see Principles of Information Security in Information technology at University of Missouri - St. Louis.


Reviews for INFSYS3848Week3.pdf


Report this Material


What is Karma?


Karma is the currency of StudySoup.

You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!

Date Created: 02/03/16
Week 3 Security Malware Viruses Program written to alter the way a computer works ,without the permision of the user. It needs a program or a host file so it can spread from one computer to another. They leave infections as the travel. A virus cannot spread without a human action like running the program. Worms Programs that replicate themselves without the use of a host file. It is a subclass of a virus. The biggest danger is that it replicates itself on a system.This way it can send thousands of copies of itself to create a devastating effect. Trojan horse Appears legitimate but it is malicious. It can take the form of an email. It create a back door in the systems which gives access to another user to take over confinential oinformation.Unlike virues and worms they don not replicate themselves. Spyware Program that can monitor activity in your computer. They spy passwords ,names ,account numbers etc. Usually for advertising purposes spyware can track users information for preferences and and places we visit. While a firewall can block the online transaction of a spyware program, an antivirus can identify the treat and remove it. Hacking Intentionally using a computer resource without authorization.Traditionally it scans netwroks for computers which may have vulnerabilities. After they break in the system, the hacker tool kit is installed that is nothing else but software which automates many hacking attacks. Denial of service attacks(DoS) A method hackers use to prevent or deny legitimate users access to a computer. They are typically executed using DoS tools that send many packets to a server. The attack floods the server’s resources and makes the system unusable.Any system that is connected to the internet and is equiped with TCp-based network services is subject to attack. Another type of DoS attack are the Zombie computers or Botnets. What happens in this case is that hackers use viruses ,warms and trojans to gain control of many computers .Then ,they send commands to these “bots” to send data to target servers.These computers are then used to carry our Distributed Denial of Service Attacks(DDoS) which means that hundreds computers may be involved. Attacks targeted towrds individuals (Social engineering) Tricking /manipulating vistims into actions or entrusting confidential information. It includes phishing(type of social engineering attack that an email is sent with a link to a authentic looking website where users are asked confidential information. Types of attackers(Hackers) • Good guys: white hat • Bad guys: black hat • Script Kiddies: inexperienced individuals trying to become hackers by using available scripts and tools to carry out hacking activitis.The reason why they are dangerous is that there are so many of wanna be hackers. Types of attackers(Digrunted employees): they can cause great damage because they are familiar with systems and vulnerabilties ,they have access and know what can cause the greatest damage.Examples are disgrunted IT staff ,particularly those in networking,software development and IT security. Accidents and natural disasters: they can cause major disruptions to telecomunication networks and oragnizaitional data. Also business continuity planning are outlines procedures for keeping an organization in the event of a natural disaster


Buy Material

Are you sure you want to buy this material for

25 Karma

Buy Material

BOOM! Enjoy Your Free Notes!

We've added these Notes to your profile, click here to view them now.


You're already Subscribed!

Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'

Why people love StudySoup

Bentley McCaw University of Florida

"I was shooting for a perfect 4.0 GPA this semester. Having StudySoup as a study aid was critical to helping me achieve my goal...and I nailed it!"

Kyle Maynard Purdue

"When you're taking detailed notes and trying to help everyone else out in the class, it really helps you learn and understand the I made $280 on my first study guide!"

Bentley McCaw University of Florida

"I was shooting for a perfect 4.0 GPA this semester. Having StudySoup as a study aid was critical to helping me achieve my goal...and I nailed it!"

Parker Thompson 500 Startups

"It's a great way for students to improve their educational experience and it seemed like a product that everybody wants, so all the people participating are winning."

Become an Elite Notetaker and start selling your notes online!

Refund Policy


All subscriptions to StudySoup are paid in full at the time of subscribing. To change your credit card information or to cancel your subscription, go to "Edit Settings". All credit card information will be available there. If you should decide to cancel your subscription, it will continue to be valid until the next payment period, as all payments for the current period were made in advance. For special circumstances, please email


StudySoup has more than 1 million course-specific study resources to help students study smarter. If you’re having trouble finding what you’re looking for, our customer support team can help you find what you need! Feel free to contact them here:

Recurring Subscriptions: If you have canceled your recurring subscription on the day of renewal and have not downloaded any documents, you may request a refund by submitting an email to

Satisfaction Guarantee: If you’re not satisfied with your subscription, you can contact us for further help. Contact must be made within 3 business days of your subscription purchase and your refund request will be subject for review.

Please Note: Refunds can never be provided more than 30 days after the initial purchase date regardless of your activity on the site.