CIS 3210 Lecture Notes - Lecture 4: Malware, Wireshark, Application Layer

8 views3 pages

Document Summary

The message is traversing down through the layers, each layer adds its own header to the packet encapsulation. When the packet arrives and the packet traverses up the layers, and the header is striped away decapsulation. The internet was not originally designed with much security in mind. The original vision: a group of mutually trusting users attached to a transparent network. Internet protocol designers are now playing catch up . There are security consideration in all layers. Malware can get in a host from: Virus: self-replicating infection by receiving/executing object (e-mail attachment) Worm: self-replicating infection by passively receiving object that gets itself executed. Spyware: is malware that can record keystrokes, web sites visited and upload the recorded information to a collection site. Botnet: infected hosts can be enrolled in botnets and used for spamming, or ddos attacks. Denial of service (dos): attackers make resources (server or bandwidth) unavailable to legitimate tra c by overwhelming resources with bogus tra c.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents