The document discusses security threats and attacks against computer systems. It covers program threats like trojan horses, viruses, and buffer overflows. It also discusses system and network threats like port scanning, denial of service attacks, and the Morris Internet worm. The document examines cryptography as a tool to provide security through encryption, digital signatures, public/private key pairs, and hash functions.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
119 views8 pages
Chapter 15: Security
The document discusses security threats and attacks against computer systems. It covers program threats like trojan horses, viruses, and buffer overflows. It also discusses system and network threats like port scanning, denial of service attacks, and the Morris Internet worm. The document examines cryptography as a tool to provide security through encryption, digital signatures, public/private key pairs, and hash functions.