B FOR 204 Study Guide - Comprehensive Final Exam Guide - Internet Protocol Suite, Cryptography, Algorithm

72 views32 pages

Document Summary

Threats: hardware e. g. natural disaster, software e. g. virus, data e. g. Computer security topics: processes, protocols and compliance, programming security, network and system security, types of malware and vulnerabilities, vulnerability scanning, network security devices, analytical security, log analysis, data security, cryptography, pki, digital signatures. Lectures 2: they harm the confidentiality, integrity and availability of computer asset. Attacks can be launched by humans or systems: malwares are malicious software that exploits the vulnerabilities of a system. Downloading a malware into a computing system is a threat. Malware: malware can be classified into two broad categories, based first on how it spreads or propagates to reach the desired targets, then on the actions or payloads it performs once a target is reached, propagation mechanisms: Lectures 3 content: parasitic software fragments that attach themselves to some existing executable. One reason viruses dominated the malware scene in earlier years was the lack of user authentication and access controls on personal computer systems.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers