Today we talked about network security. Our discussion started off with information assurance. Within information assurance there are 4 main parts:
1) Confidentiality- Keeping those who are suppose to be out, out.
2) Integrity- Making sure the data hasn’t changed from point A to point B.
3) Authentication- Something you know (your password), something you are (finger print scan), something have in your possession (bank card).
4) Availability- Similar to confidentiality except it makes the appropriate data available.
We then talked about the 8 types of threats:
1) Viruses- These attack that particular computer.
2) Trojan horse- A program that hides on your computer and waits to be executed.
3) Logic bomb- Distributed primarily by worms and viruses.
4) Worms- is like a virus except it doesn’t need a person there to execute in and can spread from one system to another.
5) Adware & Spyware- Adware is a program that monitors the types of websites that you visit frequently and uses that information to generate targeted advertisements. Spyware is any program that sends information about your systems or your actions across the Internet.
6) Root Kit- A type of back door program that is inserted into application software.
7) Botnets- Short for robot network, this is a group of computers under the control of one operator, used for malicious purposes.
8) Privileged escalation- Software applications that contain bugs. An unauthorized user exploits these bugs to gain privileged access to a computer system.
Sunday, March 7, 2010
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment