Computer Security and Risks

minorbigarmΑσφάλεια

30 Νοε 2013 (πριν από 3 χρόνια και 6 μήνες)

57 εμφανίσεις

Computer Security and Risks

“If the law doesn't fit reality anymore,
law has to be changed. That’s not a
new thing. That’s civilization as usual”

Gilberto Gil Crusader in Open source
who works for the Brazilian
government

Using
Quizlet


Choosing one word per page and two from
some


Make approximately 8 to 10 flash cards


Invite your friends to your flash cards


Learn all the terminology about computer
crime using quizlet.com

Computer Crime


Computer Forensics


cybercrime


Cyberstalking


Identity theft


Social engineering


Spoofing


Phishing


Spammer


Computer Crime


Malware


Cross platform Viruses


Macro Virus


Macros


1999 Melisa Virus


Cross scripting Virus


Worms


Computer Crime


Trojan Horse


Logic Bomb


Time Bomb


Spyware


Tracking software


Spybot


Drive by Downloads

Just as natural forests are more
resistant to disease than are single
-
species tree farms, mixed computing
environments are less susceptible to
crippling attacks than is an
organization in which everyone uses
the same hardware and software.

Computer Crime


Proxy server


SSL


Audit Trails


Antivirus


Security patches


MS Slammer


Hackers


Crackers


Webjackers


Zombie Computers


Bots


Botnets

Quotes


In 2007 a DDOS attack crippled the electronic
infrastructure of the republic of Estonia, one
of the most wired countries in the world


“In

the old world if you wanted to attack
something physical you had to attack it with guns
men etc, but a database usually has multiple
pathways unpredictable routes into it and seems
impossible to defend it. That why most efforts at
computer security have been defeated”.
Andrew Marshall (Military Analyst)

Computer Crime


DOS attacks (Denial of Service)


DDOS distributed DOS


Mafia Boy


Biometrics


Smart Card


Passwords


Access
-
control software


Access privileges

Quotes


“Computer security experts are forever trying
to shut the stable door after the horse has
bolted” Tom Forester Computer Ethics


Computer Crime


Firewalls


Encryption


Encryption Key


Decryption


Audit control software


Backups


Generations


RAID


Automatically mirror


Instant redundancy


Off site backup


On line backup (Speed Issues)