MSCI 3005 Lecture Notes - Lecture 25: Symmetric-Key Algorithm, Password, Computer Worm

31 views2 pages
Information Security Lecture 19
I. Malicious software (malware) attacks
a. Remote attacks requiring user action
i. Virus- attaches itself to other programs to spread
ii. Worm- replicates and distributes itself through networks
iii. Phishing attack
iv. Spyware-keystroke loggers and screen scrapers
b. Denial of service attack- DOS. Attacker overwhelms a target computer with a massive
numer of information requests
c. Distributed denial of service attack- a dos attack by first compromising a large number
of computers through malicious software and then coordinating them (zombies or
botnet) to send massive number of information requests to a target computer
i. Done through many computers that have been compromised
ii. Distributed: many computers together used to attack a particular server.
Sending requests to server again and again.. server gets slow and thererefore
server cant respond to real requests to customers
d. All of these: selling access to computers that are compromised in a black market
i. Someone who can make use of the compromised computers will buy access
II. Authenticiation mechanisms
a. Possessio is he a idiidual os a for of idetificatio (drier’s licese, studet
ID)
b. Knowledge is when an individual needs to know something to gain access (passwords)
c. Traits requires recognition of physical or behavioral human characteristics (biometrics,
voice, signature)
III. Information security controls. Trying to prevent corporate lan
a. Physical controls
i. Company gate, building door
b. Access controls
i. ID system (card or biometric)
ii. Authentication, access password, personal ID
c. Communication controls (firewall, encryption, VPN)
IV. Malware that propagates over a network such as the internet with no user intervention is
called a worm.
a. Computer worm can propogate itself without intervention
b. Different than viruses. Viruses need some form of human intervention
c. Example of worm was stusnet worm.
i. Corrupt and take control of programic controls
V. Cryptography
a. Cryptography
i. Set of techniques, mostsly mathematical, that assures security of information as
it flows through communication medium
find more resources at oneclass.com
find more resources at oneclass.com
Unlock document

This preview shows half of the first page of the document.
Unlock all 2 pages and 3 million more documents.

Already have an account? Log in

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents