Encryption - IST 195 Rubin 10/21/2015
Encryption - IST 195 Rubin 10/21/2015 IST 195 - M001
Popular in Information Technologies
Popular in Information technology
This 2 page Class Notes was uploaded by Ryan Ratty on Friday October 30, 2015. The Class Notes belongs to IST 195 - M001 at Syracuse University taught by J. Rubin in Fall 2015. Since its upload, it has received 26 views. For similar materials see Information Technologies in Information technology at Syracuse University.
Reviews for Encryption - IST 195 Rubin 10/21/2015
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 10/30/15
IST 195 Ryan Ratty 1021 201 5 Definitions Botnet Computers that are controlled by one individual and can work together in a coordinated fashion Virus Software program installed without permission or knowledge of user that alters the way the computer operates and replicates itself to other mediacomputers Worm Like a virus but doesn t infect other files it creates copies of itself and send them across the network Trojan Horse Software that appears to be legitimate but infects the computer Distributed Denial of Service DDoS Attack that prevents legitimate access to a web server Identity Theft Gathering of personal data in order to assume their persona for financial gain PhishingSpear phishing Spoofing email from a legitimate source to trick recipient into sharing personal data Social Media hacks Using hacked social media pages to spread phishing links Charming Redirecting web traffic from a legitimate website to an illegitimate one using DNS or hosts files Attack Cycle Recon gt DDoSDeliver gt Command amp Control gt Lateral Movement gt Target ID gt Attack Protect Detect Investigate Contain Defensive Countermeasures For this class we are going to focus on the first two steps of the attack cycle and the first defensive countermeasure Malware Effects Rogue Toolbars Performance issues Browser hijacking Data missingcharged Key logging Theft of Account Information banks social media email etc Encryption of your hard drive ransomware Tracking of movements mobile malware Rootlet giving hacker total control Protect Security Software Antimalware Antispyware Mobile security Personal firewall Antivirus Software Automatic updates Weekly scans Public Key Infrastructure Digital certificates Digital signatures IST 195 Ryan Ratty 1021 201 5 Encryption Restore Disconnect Turn off WiFi or disconnect ethernet cable If Windows run computer in safe mode with networking only if you need to download files Clean Malware tips Set up Protection Mechanisms Security software Antivirus software PKI Reconnect to the Internet
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'