Wednesday, April 13, 2011

F5108 -CHAPTER 1 -cont INTERNET SERVICES n ATTACK

INTERNET SERVICES


ELECTRONIC MAIL AND NEWS

  • ways for people exchanging information without requiring immediate n interactive response.

FILE TRANSFER

  • exchange files.

REMOTE ACCESS TO HOST

  • log on from a distant location

REAL TIME CONFERENCING SERVICES

  • Online (video conference)

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


ATTACK


1. information theft

:: allow attacker to get data without directly use our computers. ::


how >> - dumpster diving n steal email

used for>> - to access bank account or to make loan



2. unauthorized disclosure


::employees leaking confidential information to attacker or attacker planted spies in order to steal information ::


how>> -planting virus, trojan horse or snooping software



3. information warfare



::remotely disabling target using software , disinformation >> false /inaccurate information that is spread deliberately ::



4. Accidental data loss



::caused by coincidently delete wrong file , usually causing by careless employee or untrained employee::


++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


SECURITY THREAT


categories :

  1. data disclosure - exposure data to third parties. key point to ensure that disclosure are relevant and necessary
  2. data modification
  3. data availability

activities :

  1. hacking - modifying computer hardware n software
  2. cracking -breaks into someone computers system pr bypass password or licence in computer programs.




No comments:

Post a Comment