CISB 420 Introduction
CISB 420 Introduction
Fundamentals
Chuck Easttom
Middle ground.
Mitigation
Avoidance
Transference
Acceptance
Trojan horse
Spyware
Logic Bomb
Virus
One of the two most common types
Usually spreads through e-mail
Uses system resources, causing slowdown or
stoppage
Spyware
The most rapidly growing types of malware
Cookies
Key logger
Logic Bomb
Lays dormant until some logical condition is met,
often a specific date.
Intrusions
Attacks that break through
system resources
Hackers
Crackers
Social engineering
War-driving
People:
Hackers
White hats
Black hats
Gray hats
Script kiddies
Sneakers
Ethical hackers
Devices
Firewall
Filters network traffic
Proxy server
Disguises IP address of internal host
Intrusion Detection System
Monitors traffic, looking for attempted attacks
Activities
Authentication
Auditing
CERT
www.cert.org
Microsoft Security Advisor
www.microsoft.com/security/default.mspx
F-Secure
www.f-secure.com
SANS
www.sans.org