ISM 3004 Lecture Notes - Lecture 13: Scavenger Hunt, Ransomware, Keystroke Logging

59 views10 pages

Document Summary

Scavenger hunt week 13 information security, part 2. If you have no backup, it is best to pay the ransom to get your files back. 13. 04-email and info security: how is email used to distribute malware, email is ubiquitous (it"s everywhere and everyone uses it, distribute as, attachments. Http://www. suntrust. com/images/common/release3/logo_home. gif : attackers use actual graphics from real site! Information security should have multiple layers of defense and each should warn you of their attack: policy. An ounce of prevention is worth a pound of cure. : uf. Internal (it team: external security consultants, social engineering and technological, dr testing, perform restore and verify systems work, simulated disasters. In english : e= 13, e,t,n,r,o,a, i, and s= 67% J,k,q,x,z only make up 1: repeated patterns, key-based cryptography, like physical keys. Lock= encrypt= encipher: unlock= decrypt= decipher, keys can be lost or stolen , key security responsibility of owner, key management, key length impact on security and system performance (complexity)

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents