Preview

Chapter 8 Computer

Good Essays
Open Document
Open Document
2419 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Chapter 8 Computer
Name : Date: February 2, 2013

Chapter 8
Reading Organizer

After completion of this chapter, you should be able to:

• Identify and describe the various networking threats. • Identify different methods of attack. • Describe security procedures and applications. • Describe the features of a firewall and how it can be used to protect against an attack.

8.1

1.
Once the hacker gains access to the network, four types of threat may arise. List and explain each of these four threats.

a. Information theft- Breaking into a computer to obtain confidential information. Information can be used or sold for various purposes. Example: Stealing a organization’s proprietary information, such as research and development information.

b. Identity theft- Breaking into a computer to destroy or alter data records. Examples of data loss: sending a virus that reformats a computer’s hard drive. Examples of data manipulation: breaking into a records system to change information, such as the price of an item.

c. Data loss / manipulation – A form of information theft where personal information is stolen for the purpose of takeing over someone’s identity. Using this information an individual can obtain legal documents, apply for credit and make unauthorized online purchases. Idnetity theft is a growing problem costing billions of dollars per year.

d. Disruption of service – Preventing legitimate users from accessing services to which they should be entitled.

2. Activity
Identify the type of security threat described by connecting the correct threat with its definition. [pic] [pic]

3. Explain what External Threats are.

External threats arise from individuals working outside of an organization. They do not have authorized access to the computer systems or network. External attackers work their way

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Lab 2

    • 385 Words
    • 2 Pages

    2. What is the relationship between risks, threats and vulnerabilities as it pertains to Information Systems Security throughout the seven domains of a typical IT infrastructure?…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The following table presents the possible threats, the potential vulnerabilities each threat may exploit, and area of the system effected by the threats:…

    • 745 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1244 Words
    • 5 Pages

    Analysis and explanation of the threat and vulnerability pairs and their likelihood of occurrence. The chart explains the aspects of the vulnerabilities and threats. b\Because we have no data on these threats on the amount of occurrences we cannot assign an impact rating or a probability rating in which is high medium an low (reference page 121 of book)…

    • 1244 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    In this assignment we are asked to identify the major threats and security concepts from a whitepaper located on the internet: http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xv_04-2010.en-us.pdf. This report stated that: “There are a number of recent and growing trends in the threat activity landscape that were observed by Symantec in 2009.” These threats are identified as:…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Identify risks that could lead to an information security breach, Identify vulnerabilities in system security, software operation, network design or employee procedures that could lead to a network failure.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Stealing or hacking of personal devices, malware or virus, eavesdropping, sniffing through endpoints, web Session Hijacking…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    wk 4 lab 2

    • 403 Words
    • 1 Page

    1. Unauthorized network probing and port scanning. IP router, firewall and network appliance operation system vulnerability.…

    • 403 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking – it is the act of bypassing ones account or database and hacking involves stealing of identity and use it in his/her own interest.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Anyone who knowingly hacks into a computer with intent to steal information is going against this act. Anyone who misuses the computer in this way is going against the law as they are using it for criminal acts.…

    • 1633 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Ethics Of Dumpster Diving

    • 396 Words
    • 2 Pages

    Based on the nature of the disposal, a computer hacker may acquire an array of details and information from improperly disposed materials and equipment, such as electronic equipment and computers. For example, if a computer is not properly wiped and securely disposed of, computer hackers who obtain such may be able to recover any and/or all data…

    • 396 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    CSS350 IP5

    • 6832 Words
    • 19 Pages

    In today’s world it is an indisputable fact that computers and digital devices are a part of our everyday lives. As such they are a part of our society whether they are used for business or for personal reasons. There are many uses for computers. We can use them to track our finances, keep databases of information about our clients, and use them to save pictures and documents. Sometimes computers are used in the commission of a crime like hacking systems for credit card information or launching computer viruses against a target. Sometimes they are used to communicate with others about the details of a crime, plan a crime, or share illegal media like child pornography. Other times computers can be misused and lead to loss or theft of data resulting in system downtime or monetary losses for an organization.…

    • 6832 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    The Computer Misuse Act (1990) made vital changes to security of someone’s computer after a rise in theft of identity or information or ‘hacking’ into another’s computer. The Act made the following illegal: Unauthorized Access to Computer Material, Unauthorized Access to Computer systems with intent to commit another offense and Unauthorized Modification of Computer Material. It was made to prevent loss of information like in large businesses or a person’s personal information.…

    • 72 Words
    • 1 Page
    Good Essays
  • Powerful Essays

    Identity Theft In America

    • 1339 Words
    • 6 Pages

    Identity theft is a criminal offense that violates of federal law (“Identity theft is America’s”). It occurs when a person transfers or uses another person’s means of identification with the intent to commit any unlawful activity (“Identity theft is America’s”). Although, it differs from other types of less calculated fraud such as a juvenile using a fake id to purchase alcohol (Lease). More precisely identity theft occurs “when an individual with access to identity information decides to misuse it” (McNally 12). When a person’s identity information is stolen it can unlock two main doors to his or her life (McNally 17). The first door leads to personal affair, and the second opens all of the possibilities available to the person in the future…

    • 1339 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Computer Fraud Act Essay

    • 549 Words
    • 3 Pages

    Information contained in a financial record of a financial institution, or contained in a file of a consumer reporting agency on a consumer.…

    • 549 Words
    • 3 Pages
    Good Essays