I CSI 124X- Midterm Exam Guide - Comprehensive Notes for the exam ( 21 pages long!)

56 views21 pages

Document Summary

A denial of service (dos) attack prevents computers from reaching a particular resource (i. e. website) on the internet: spoofing can be used in email: generating fake messages changing messages" contents, re- sending old messages. Loss of confidentiality the combination of computer attacks and easy spoofing has some very grave risks: there are various risks associated with the theft or publication of sensitive data identity theft . Phishing a form of spoofing, with the specific goal to defraud recipients. Cpu the cpu executes the instructions (operations) that the computer performs: the cpu is the processor (e. g. intel core i7) manufacturers tout when discussing their computers. The primary place the cpu gets its data from is the memory: sometimes known as random access. Memory (ram: the memory stores both the instructions the cpu executes, as well as the data used by the instructions. Cpu and ram are connected via the bus to communicate.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers

Related Documents