Chat with us, powered by LiveChat New England College Information Cookies Store Research Essay | acewriters
+1(978)310-4246 credencewriters@gmail.com
  

Question :Learning About Cookies as Spyware. Research what kind of information cookies store. You might find the following websites helpful: www.allaboutcookies.org/www.howstuffworks.com/cookie1.htm Using WORD, write an ORIGINAL brief essay of 300 words or more describing cookies and the way they can invade privacy.Sources :Text Book : Easttom, Chuck. Computer Security Fundamentals, (Third Edition). Indianapolis: Pearson, 2016. ISBN-13: 978-0-7897-5746-3Read Chapter 1 of the Easttom text, Introduction to Computer Security. Primary topics: Types of threatsNetwork attacksSecurity terminolog Note : please follow the sources
easttom_ppt_01_final.ppt

Unformatted Attachment Preview

Computer Security
Fundamentals
Chuck Easttom
Chapter 1 Introduction to to Computer Security
Chapter 1 Objectives





Identify top threats to a computer network
Assess the likelihood of an attack
Define key terms like cracker, sneaker,
firewall, and authentication
Compare and contrast perimeter and layered
approaches to network security
Use online resources
© 2016 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
2
Introduction

Computer systems and networks are all
around us.





Online banking
Automated supermarket checkouts
Online classes
Online shopping
Online travel resources
© 2016 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
3
Introduction (cont.)



How is personal information safeguarded?
What are the vulnerabilities?
What secures these systems?
© 2016 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
4
How Seriously Should You Take
Threats to Network Security?

Which group do you belong to?

“No one is coming after my computer.”

“The sky is falling!”

Middle ground.
© 2016 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
5
Identifying Types of Threats







Malware: MALicious softWARE
Security Breaches
DoS: Denial of Service attacks
Web Attacks
Session Hijacking
DNS Poisoning
Insider Threats
© 2016 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
6
Malware

Software with a malicious purpose
❑ Virus
❑ Trojan horse
❑ Spyware
❑ Logic Bomb
© 2016 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
7
Malware (cont.)
Virus



One of the two most common types
Usually spreads through e-mail
Uses system resources, causing slowdown or
stoppage
© 2016 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
8
Malware (cont.)
Trojan Horse


The other most
common kind of
malware
Named after the
wooden horse of
ancient history
© 2016 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
9
Malware (cont.)
Spyware

The most rapidly growing types of malware


Cookies
Key logger
© 2016 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
10
Malware (cont.)
Logic Bomb

Lays dormant until some logical condition is met,
often a specific date.
© 2016 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
11
Compromising System Security
Intrusions

Attacks that break through
system resources




Hackers
Crackers
Social engineering
War-driving
© 2016 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
12
Denial of Service Attacks

The attacker does not
intrude into the system
but just blocks access
by authorized users.
© 2016 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
13
Web Attacks

The attacker attempts to
breach a web
application. Common
attacks of this type are
SQL injection and Cross
Site Scripting.
© 2016 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
14
Session Hijacking

This is a complex attack
that involves actually
taking over an
authenticated session.
© 2016 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
15
DNS Poisoning

This involves altering
DNS records on a DNS
server to redirect client
traffic to malicious
websites, usually for
identity theft.
© 2016 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
16
Assessing the Likelihood of an Attack
on Your Network

Viruses


Catch up on new and refurbished viruses
Unauthorized use of systems



DoS attacks
Intrusions
Employee misuse
© 2016 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
17
Basic Security Terminology
People:

Hackers






White hats
Black hats
Gray hats
Script kiddies
Sneakers
Ethical hackers
© 2016 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
18
Basic Security Terminology (cont.)
Devices

Firewall


Proxy server


Filters network traffic
Disguises IP address of internal host
Intrusion Detection System

Monitors traffic, looking for attempted attacks
© 2016 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
19
Basic Security Terminology (cont.)
Activities


Authentication
Auditing
© 2016 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
20
Network Security Paradigms

How will youprotect your network?






CIA Triangle
Least Privileges
Perimeter security approach
Layered security approach
Proactive versus reactive
Hybrid security method
© 2016 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
21
How Do Legal Issues Impact Network
Security?




The Computer Security Act of 1987
OMB Circular A-130
See www.alw.nih.gov/Security/FIRST/papers/
legal/statelaw.txt for state computer laws
Health Insurance Portability and
Accountability Act of 1996, HIPAA
© 2016 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
22
Online Security Resources

CERT


Microsoft Security Advisor


www.microsoft.com/security/default.mspx
F-Secure


www.cert.org
www.f-secure.com
SANS

www.sans.org
© 2016 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
23
Summary


Network security is a constantly changing
field.
You need three levels of knowledge.



Take the courses necessary to learn the basic
techniques.
Learn your enterprise system intimately, with all
its strengths and vulnerabilities.
Keep current in the ever-changing world of threats
and exploits.
© 2016 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
24

Our essay writing service fulfills every request with the highest level of urgency
attachment

error: Content is protected !!