IS 3003 Lecture Notes - Lecture 8: Trojan Horse, Managed Security Service, Phishing
Document Summary
Chapter 8: system vulne rabilities improper use or crime. Internet vulnerabilities: network is open to anyone, size of internet means abuses can have wide impact, fixed internet address eases identification by hackers, email attachments, email used for transmitting trade secrets. Im messages lack security, can be easily intercepted: malicious software - malware order to be executed. to others over a network. longer to shut down or turn on. Virus: software program attaches itself to other software or files in. Virus indications: slow computer, shutting down constantly, takes. Worms: computer programs copy themselves from one computer. Virus vs worms: human intervention is necessary for a virus. Trojan horses: program appears to be benign then does something. Spyware: small programs installed on computers to monitor web. Key loggers: record every keystroke on a computer. worm copies themselves automatically. activity and serve up advertising other than expected. 1: hackers & crackers happening in the hacker world.