Windows registry (regedit, cookies): e.g., spyware and adware (one type of spyware)
Boot Virus–Attacks boot sectors of the hard drive
"Trojan horses” –a botplanted in the systems being attacked, can be operated locally or remotely for malicious purposes
Viruses-
Fast to attack–Easily invade and infect computer hard disk
Slow to defend–Less likely to detect and destroy
Hard to find (Stealth)–Memory resident (registry)Able to manipulate its execution to disguise its presence
Use Password, alphanumeric, mix with upper and lower cases, change frequently, no dictionary names
Use Encryption, coding of messages in traffic between the customer placing an order and the merchant’s network processing the order
Firewall: frequently used for Internet security
Enforces an access control policy between two networks
Detects intruders, blocks them from entry, keeps track what they did and notifies the system administratorSummary and Exercises
No comments:
Post a Comment