Information Security.docx

2 Pages
Unlock Document

Rutgers University
Business Analytics and Information Tech
Bruce Rights

Information Security 2/4/2013 Forward port Outbound port? Issues with ports: outbound traffic, unintentional open ports Denial of service: making someone unable to get their job done E.g. denial of service through IPS Network access control – Virtual network Honey pot – computer that looks to be desirable and easily hackable; allows people to understand who and what hackers tend to target and how they do it 2/6/13 Dark net – Quiz next Wed – covers materials of Sans Podcast and wiki from last 5 classes *Unprotected computer on the internet can be owned within an average of 4 minutes Hacker types: Black Hat – typical hacker; learner, voyeur, info capture, ID/CC Theft, etc. *Anonymous is an example of hacktivism – people who hack for a cause (also WikiLeaks) *industrial espionage – people who aren’t as good but just look to deface (actually beneficial because it lets you know that your site or computer is vul
More Less

Related notes for 33:136:471

Log In


Don't have an account?

Join OneClass

Access over 10 million pages of study
documents for 1.3 million courses.

Sign up

Join to view


By registering, I agree to the Terms and Privacy Policies
Already have an account?
Just a few more details

So we can recommend you notes for your school.

Reset Password

Please enter below the email address you registered with and we will send you a link to reset your password.

Add your courses

Get notes from the top students in your class.