BTM 200 Lecture Notes - Lecture 8: Advanced Encryption Standard, Multi-Core Processor, Instruction Set

34 views7 pages

Document Summary

Advanced encryption standard (aes): instruction set making cpu deliver faster data protection. + possibility of creating more powerful portable computing devices. Chapter 9: securing your system: protecting your digital data and devices. Hacking tools and attack types: data that isn"t stored in a computer can be captured with a packet analyzer (sniffer), capturing each packet travelling on internet network, or a keylogger, capturing all keystrokes made on computer. Denial-of-service attacks (dos): distributed denial-of-service (ddos): launching dos attacks from more than one zombie at the same time, botnet: large group of software programs called robots of bots running simultaneously on zombie computers. How hackers gain computer access: exploit kits: software program running on servers searching for vulnerabilities such as security holes in browsers. Virus basics: virus: computer program attaching itself to another computer program (known as. Types of viruses: six broad categories of viruses, 1.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents