Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Computer security

502 views

Published on

Published in: Technology, News & Politics
  • Be the first to comment

  • Be the first to like this

Computer security

  1. 1. Computer Security Part 1 of 2 Small book by Shelly Cashman that came with text.
  2. 2. Top 10 Hackers Who Got Caught
  3. 3. Gerald Martin hacked into the system of a company that competed with his. – NY Times
  4. 4. Anonymous “A Leaderless Hacker Group”
  5. 5. Figure 10-1, pg 382
  6. 6. Internet and Network Attacks Virus Worm Trojan Rootkit Infects, negatively altering the way computer works Copies itself repeatedly, using up resources Needs certain condition to trigger, does not replicate Allows person to take over your computer from remote location.
  7. 7. Figure 10-2 from pg 385
  8. 8. Trojan Programs, 3. 90% Viruses, 7.00 % Network Worms, 89.1 0% Malicious Program Types http://www.securelist.com/en/analysis/151436695/Virus_Review_2002 Portable Media, 1.3 0% Internet, 2. 30% Email, 93.4 0% Main Virus Threat
  9. 9. Safeguards against computer viruses and other malware
  10. 10. Figure 10-5 from pg 388 of your book
  11. 11. Safeguards
  12. 12. Hardware Theft and Vandalism
  13. 13. Software Theft • End-User License Agreement (EULA)
  14. 14. Information Theft (Encryption)
  15. 15. Information Theft (Digital Signature)
  16. 16. System Failure Uninterruptible Power Supply (UPS)
  17. 17. Backing Up – The Ultimate Safeguard
  18. 18. Wireless Security Wireless Access Point (WAP)
  19. 19. 802.11i network
  20. 20. For Next Time • Read the rest of the Computer Security booklet, page 398 to the end (p. 408). Be prepared to take home test.

×