Tuesday, November 27, 2007

11/5/07 Class Notes

EXAMPLES OF VIRUSES

Windows registry (regedit, cookies): e.g., spyware and adware (one type of spyware)

Boot Virus–Attacks boot sectors of the hard drive

"Trojan horses” –a botplanted in the systems being attacked, can be operated locally or remotely for malicious purposes

Viruses-
Fast to attack–Easily invade and infect computer hard disk
Slow to defend–Less likely to detect and destroy
Hard to find (Stealth)–Memory resident (registry)Able to manipulate its execution to disguise its presence

Use Password, alphanumeric, mix with upper and lower cases, change frequently, no dictionary names

Use Encryption, coding of messages in traffic between the customer placing an order and the merchant’s network processing the order


Firewall: frequently used for Internet security
Enforces an access control policy between two networks
Detects intruders, blocks them from entry, keeps track what they did and notifies the system administratorSummary and Exercises

No comments: