przez Fooza Alsayed 4 lat temu
316
Więcej takich
What's your essay about?
Type in the title of your essay.
Senior management
Legal department
Examples: Norton Antivirus, McAfee
Work on the structure of your essay.
Develop the ideas presented in the introduction.
Create a catchy introductory paragraph.
Take into consideration the interests of your audience.
Analyze another essay written on this topic
Find at least one example and see whether it is well written or not.
Type in the title and the author(s)
of the essay which you're going to analyze.
Egress filtering
Ensuring spoofed packets don’t leave a network
Subtopic
Ingress filtering
When Internet service providers (ISPs) prevent incoming packets with false IP addresses from being passed on.
Spoofing generates a false return address on packets therefore, sources of attack cannot be identified and turned off
Does not involve a break-in at the target computer
Legitimate users cannot get in
Target machine is busy responding to a stream of automated requests
Malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks
The computers that are taken over are called zombies
Is the logical sequence of the essay accurate or faulty?
Select an option:
Used to steal passwords, or spy on users by recording keystrokes
Users are tricked into installing it
disguised as iTunes file or malicious web site
Add some reasons to support your previous choice.
Program that a hacker secretly installs
Negative impact of virus or worm attack
Effort for IT workers
to clean up mess
Lost productivity
as IT workers attempt to recover data & programs
Lost data and programs
Can propagate without human intervention (unlike viruses)
replicate itself in order to consume resources to bring system down.
Harmful programs
What evidence do(es) the author(s) present?
Type in the evidence.
Add notes if you need larger blocks of text.
Reside in active memory of a computer
Famous Virus: Melissa
Infect documents
insert unwanted words, numbers or phrases
Macro viruses
Created in an application macro language
Most common types of virus and easily created
Does not spread itself from computer to computer
Must be passed on to other users through
Shared files
Infected e-mail document attachments
Deliver a “payload”
reformat hard drive
delete or modify a document
display a message
Often attached to files - when file is opened, virus executes
that causes a computer to behave in unexpected and undesirable manner
Usually disguised as something else
Malicious pieces of programming code
What claims do(es) the author(s) make?
Type them in.
Research your topic
Write down the sources you will base your essay on.
Computer users share login IDs and passwords
Computer help desks
Sometimes forget to
Check whether users are authorized to perform the requested action.
Verify users’ identities.
Under intense pressure to provide fast responses to users’ questions.
A business policy that permits and encourages employees to use their own mobile devices (smartphones, tablets, or laptops) to access company computing resources and applications.
Since security fixes could make Software harder to use or eliminate “nice to have” features.
US companies continue to use installed software “as is”
JRE
RealPlayer
IE
Often patches are released on a regular basis, one example being Microsoft’s Patch Tuesday. On the second Tuesday of each month, Microsoft releases security fixes that resolve identified holes. If, however, a critical vulnerability is discovered, a patch may be released outside of schedule
Software developers quickly create and issue patch:
delays in installing patches expose users to security breaches
users are responsible for obtaining and installing patches - which they can download from the Web
a “fix” to eliminate the problem
Zero-day attack
Takes place before a vulnerability is discovered or fixed
Exploit
Due to poor system design or implementation
Takes advantage of a particular system vulnerability
Attack on system
Number of possible entry points to a network expands continuously as more devices added.
this increases possibility of security breaches
Continues to increase in complexity:
all interconnected and driven by 100s of millions of lines of code.
switches, routers, gateways
apps, web sites
networks, computers, OSes
Computing environment is enormously complex .
List first-hand information :