Professional Documents
Culture Documents
Worms – Much like a virus, but does not harm data, other than infiltrate and choke
the network.
Trojans – Infiltrates computers and secretly allows external software and people to
invade the computer and use its resources.
Denial-of-service Attack
9 Denial-of-Service Attack
The requesting server sends a request for service, the responding server sends a response; but
the requesting server does not respond, thus, allowing the connection to time out.
10 Distributed Denial-of-Service
Attack
Many requesting servers send service requests to the responding server, which responds, but
requesting servers allow the connection request to time out.
11 Threats to the Organization
Cracking and Espionage – The act of breaking into networks and computers illegally, usually
with intent to create mischief. It is also used for industrial and political espionage – to steal
information.
Ethical Hacking – same as Cracking but the motivation is benign - not to harm but expose weaknesses.
Phishing and Identity Theft – use of fake websites to lure unsuspecting users to reveal their
private information.
12 Technologies for handling
Security
Encryption
Public-key Cryptography
Firewall
Perimeter Security
Two Factor Authentication, AAA Authentication
Securing the Client
Desktop Firewalls
Password Policy
Creating a Secure Environment