ISM 3004 Lecture Notes - Lecture 13: Scavenger Hunt, Ransomware, Keystroke Logging
Document Summary
Scavenger hunt week 13 information security, part 2. If you have no backup, it is best to pay the ransom to get your files back. 13. 04-email and info security: how is email used to distribute malware, email is ubiquitous (it"s everywhere and everyone uses it, distribute as, attachments. Http://www. suntrust. com/images/common/release3/logo_home. gif : attackers use actual graphics from real site! Information security should have multiple layers of defense and each should warn you of their attack: policy. An ounce of prevention is worth a pound of cure. : uf. Internal (it team: external security consultants, social engineering and technological, dr testing, perform restore and verify systems work, simulated disasters. In english : e= 13, e,t,n,r,o,a, i, and s= 67% J,k,q,x,z only make up 1: repeated patterns, key-based cryptography, like physical keys. Lock= encrypt= encipher: unlock= decrypt= decipher, keys can be lost or stolen , key security responsibility of owner, key management, key length impact on security and system performance (complexity)