CS330 Chapter Notes - Chapter 8: Symmetric-Key Algorithm, Computer Data Storage, Network Address Translation

60 views8 pages

Document Summary

Why systems are vulnerable can stem from technical, organizational, and environmental factors and poor management decisions vulnerabilities at each level. Hardware problems (breakdown, configuration error, damage from improper use/ crime) Use of (cid:374)et(cid:449)orks/ (cid:272)o(cid:373)puters outside of fir(cid:373)"s (cid:272)o(cid:374)trol software problems (programming errors, installation errors, unauthorized changes) lost and theft of portable devices. People are connected for long periods of time. Email: attachments with malicious software, transmitting trade secrets. Identify access points & broadcast multiple times: easy to be picked up by intruders. War driving- eavesdroppers drive by buildings to try and detect ssid and gain access to network and resources. Wired equivalent privacy (wep)- users fail to implement wep or stronger. Wep is standard that requires an encrypted password; can be easily decrypted. Malicious software: viruses, worms, trojan horses, and spyware. Spyware- technology that aids in gathering information about a person or organization without their knowledge.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents