MCS 2020 Lecture Notes - Lecture 20: Wired Equivalent Privacy, Denial-Of-Service Attack, Cyberterrorism

33 views7 pages

Document Summary

Estonia case gives a good example of how important it is to look at security on a global level. Thinking about employees and external partners who might access you system with an effected device is also important. Information security: the users are your weakest link in security. Security: policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information system: controls, major privacy concerns surveillance, focused regular attention directed at particular individuals, impact of technology. Why vulnerable: accessibility of networks, only as secure as weakest link, acceptable user management strategy, infected devices accessing your network, hardware & software problems, disasters, external threat, loss/threat. Internal threats employees: security threats often originate inside an organization, sloppy security, inside knowledge, social engineering, disgruntled employees are one of the biggest threats. Wireless security issues: rfid, ssid (service set identi ers, wep (wired equivalent privacy)

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers