CMPT 100 Lecture Notes - Keystroke Logging, File Sharing, Wi-Fi

24 views3 pages

Document Summary

It is important to update definitions on a daily basis. Lesson: one can"t just rely on technology to defend against system attacks. Patches are afterthoughts-someone has already exploited the hole! Myth: there"s nothing on my computer anyone would want. That may be true for most citizens. However, citizens may use different ip addresses to perform illegal tasks. Most computers are faster than they need to be today. The faster the cpu, the less likely that the victim will notice the system is being used for an attack or to move files. Low security and poor policy: home computers are especially unlikely to have all current patches installed or to be set up to operate in a reasonably secure fashion. Many (perhaps the majority) are neither technically gifted, nor well trained. An attack that has been automated for mass-mail social engineering. Old hard drives, floppy disks, or cds. Packing material from a new computer with system details.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents

Related Questions