MIS 301 Chapter Notes - Chapter 13: Syn Flood, Dumpster Diving, Denial-Of-Service Attack

60 views2 pages

Document Summary

Chapter 13: information security: barbarians at the gateway (and just about everywhere else) Determine potential threats, evaluate risks of potential threats, manage potential threats. Biometrics: technologies that measure and analyze human body characteristics for identification or authentication. Example: fingerprint readers, retina scanners, voice and face recognition, etc. Goal is to be a better solution for good passwords. Brute-force attack: an attack that exhausts all possible password combinations in order to break into an account; the larger and more complicated as password or key, the longer a brute-force attack will take. The largest attacks are still unable to compromise information in banks or on shopping sites. Compliance: some firms are bound by security compliance commitments and will face fines and retribution if they fail to meet the commitments. Distributed denial of service (ddos) attack: an attack where a firm"s computer systems are flooded with thousands of seemingly legitimate requests.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents