Chapter 8
Chapter 8
Chapter 8
INFORMATION
SYSTEM
6 2 Denial-of-
Click Fraud HACKERS Service Attacks
AND
COMPUTER
SRIME
5 3
Identity Theft Computer Crime
4
Studies have found that user
lack of knowledge is the
single greatest cause
of network security breaches.
2 RISK ASSESSMENT
SECURITY POLICY 3
Consists of statements rangking infromation
risks, identifying acceptable security goals, and
identifying the mechanisms for achieving these
goals DISASTER RECOVERY
4 PLANNING AND BUSINESS
CONTINUITY PLANNING
Biometric
Token Smart Card Authentication
BIOMETRIC AUTHENTICATION DEMONSTRATION
Firew alls, Intrusion Detection Systems , and Antivirus
Softw are
Computer viruses
Computer worms
Spyware
Adware
Securing Wireless Networks
3
IMPLEMENTATION FOR ENCRYPTION
Ensuring
System
Availability
Hardware
Software
Power Supply Components
Create environment
Provide continuous, uninteruppted service
Ensuring
Software
Quality
Employing
Software Metrics
Software Testing
1. What is
a botnet ?
A botnet is a network of
autonomous malicious
software agents that are under
the control of a bot
commander.
4. Describe some of the w eakness exploited by malw are
Weaknesses in human
nature
Internet Vulnerabilities
4 1
The level of
sophistication 3 2 Technical weakness
THANK YOU!