CS330 Chapter Notes - Chapter 8: Symmetric-Key Algorithm, Computer Data Storage, Network Address Translation
Document Summary
Why systems are vulnerable can stem from technical, organizational, and environmental factors and poor management decisions vulnerabilities at each level. Hardware problems (breakdown, configuration error, damage from improper use/ crime) Use of (cid:374)et(cid:449)orks/ (cid:272)o(cid:373)puters outside of fir(cid:373)"s (cid:272)o(cid:374)trol software problems (programming errors, installation errors, unauthorized changes) lost and theft of portable devices. People are connected for long periods of time. Email: attachments with malicious software, transmitting trade secrets. Identify access points & broadcast multiple times: easy to be picked up by intruders. War driving- eavesdroppers drive by buildings to try and detect ssid and gain access to network and resources. Wired equivalent privacy (wep)- users fail to implement wep or stronger. Wep is standard that requires an encrypted password; can be easily decrypted. Malicious software: viruses, worms, trojan horses, and spyware. Spyware- technology that aids in gathering information about a person or organization without their knowledge.