CS330 Chapter Notes - Chapter 8: Antivirus Software, Service Assurance, Malware
Document Summary
Threat: harms an is through: unauthorized access, modification of data, destruction, disclosure, denial of service. Cyber-threat: malicious attempt to damage a computer network. Anti-virus software is only good against known threats. Govt forcing data protection through secure mediums. Logical = data makes sense physical = data correctly stored. Use redundant hardware/software to ensure backups are always available. Ensures can"t say they didn"t send / receive. Symmetric key encryption: same key is used to encrypt and decipher text. Public key encryption: uses one public key to encrypt and one private key to decipher. Wireless security: anyone with equipment can intercept the wireless signal.