computer security
DESCRIPTION
TRANSCRIPT
![Page 1: Computer security](https://reader033.vdocument.in/reader033/viewer/2022051611/54b731034a795925408b45a1/html5/thumbnails/1.jpg)
Computer Security
Part 1 of 2Small book by Shelly
Cashman that came with text.
![Page 2: Computer security](https://reader033.vdocument.in/reader033/viewer/2022051611/54b731034a795925408b45a1/html5/thumbnails/2.jpg)
Top 10 Hackers Who Got Caught
![Page 3: Computer security](https://reader033.vdocument.in/reader033/viewer/2022051611/54b731034a795925408b45a1/html5/thumbnails/3.jpg)
Gerald Martin hacked into the system of a company that competed with his. – NY Times
![Page 6: Computer security](https://reader033.vdocument.in/reader033/viewer/2022051611/54b731034a795925408b45a1/html5/thumbnails/6.jpg)
Figure 10-1, pg 382
![Page 7: Computer security](https://reader033.vdocument.in/reader033/viewer/2022051611/54b731034a795925408b45a1/html5/thumbnails/7.jpg)
Internet and Network AttacksVirus Worm Trojan Rootkit
Infects, negatively altering the way computer works
Copies itself repeatedly, using up resources
Needs certain condition to trigger, does not replicate
Allows person to take over your computer from remote location.
![Page 8: Computer security](https://reader033.vdocument.in/reader033/viewer/2022051611/54b731034a795925408b45a1/html5/thumbnails/8.jpg)
![Page 9: Computer security](https://reader033.vdocument.in/reader033/viewer/2022051611/54b731034a795925408b45a1/html5/thumbnails/9.jpg)
Figure 10-2 from pg 385
![Page 10: Computer security](https://reader033.vdocument.in/reader033/viewer/2022051611/54b731034a795925408b45a1/html5/thumbnails/10.jpg)
Tro-jan Pro-
grams;
3.90%
Viruses;
7.00%
Network Worms; 89.10%
Malicious Program Types
http://www.securelist.com/en/analysis/151436695/Virus_Review_2002
Porta-ble Media; 1.30%
In-ternet; 2.30%
Email; 93.40%
Main Virus Threat
![Page 11: Computer security](https://reader033.vdocument.in/reader033/viewer/2022051611/54b731034a795925408b45a1/html5/thumbnails/11.jpg)
Safeguards against computer viruses and other malware
![Page 12: Computer security](https://reader033.vdocument.in/reader033/viewer/2022051611/54b731034a795925408b45a1/html5/thumbnails/12.jpg)
![Page 13: Computer security](https://reader033.vdocument.in/reader033/viewer/2022051611/54b731034a795925408b45a1/html5/thumbnails/13.jpg)
Figure 10-5 from pg 388 of your book
![Page 14: Computer security](https://reader033.vdocument.in/reader033/viewer/2022051611/54b731034a795925408b45a1/html5/thumbnails/14.jpg)
Safeguards
![Page 15: Computer security](https://reader033.vdocument.in/reader033/viewer/2022051611/54b731034a795925408b45a1/html5/thumbnails/15.jpg)
Hardware Theft and Vandalism
![Page 17: Computer security](https://reader033.vdocument.in/reader033/viewer/2022051611/54b731034a795925408b45a1/html5/thumbnails/17.jpg)
Information Theft (Encryption)
![Page 18: Computer security](https://reader033.vdocument.in/reader033/viewer/2022051611/54b731034a795925408b45a1/html5/thumbnails/18.jpg)
Information Theft (Digital Signature)
![Page 19: Computer security](https://reader033.vdocument.in/reader033/viewer/2022051611/54b731034a795925408b45a1/html5/thumbnails/19.jpg)
System Failure
Uninterruptible Power Supply (UPS)
![Page 20: Computer security](https://reader033.vdocument.in/reader033/viewer/2022051611/54b731034a795925408b45a1/html5/thumbnails/20.jpg)
Backing Up – The Ultimate Safeguard
![Page 21: Computer security](https://reader033.vdocument.in/reader033/viewer/2022051611/54b731034a795925408b45a1/html5/thumbnails/21.jpg)
Wireless Security
Wireless Access Point (WAP)
![Page 22: Computer security](https://reader033.vdocument.in/reader033/viewer/2022051611/54b731034a795925408b45a1/html5/thumbnails/22.jpg)
![Page 23: Computer security](https://reader033.vdocument.in/reader033/viewer/2022051611/54b731034a795925408b45a1/html5/thumbnails/23.jpg)
802.11i network
![Page 24: Computer security](https://reader033.vdocument.in/reader033/viewer/2022051611/54b731034a795925408b45a1/html5/thumbnails/24.jpg)
For Next Time
• Read the rest of the Computer Security booklet, page 398 to the end (p. 408). Be prepared to take home test.