I CSI 124X- Midterm Exam Guide - Comprehensive Notes for the exam ( 21 pages long!)
Document Summary
A denial of service (dos) attack prevents computers from reaching a particular resource (i. e. website) on the internet: spoofing can be used in email: generating fake messages changing messages" contents, re- sending old messages. Loss of confidentiality the combination of computer attacks and easy spoofing has some very grave risks: there are various risks associated with the theft or publication of sensitive data identity theft . Phishing a form of spoofing, with the specific goal to defraud recipients. Cpu the cpu executes the instructions (operations) that the computer performs: the cpu is the processor (e. g. intel core i7) manufacturers tout when discussing their computers. The primary place the cpu gets its data from is the memory: sometimes known as random access. Memory (ram: the memory stores both the instructions the cpu executes, as well as the data used by the instructions. Cpu and ram are connected via the bus to communicate.