SMC CS 78 - Computer security (5 pages)

Previewing pages 1, 2 of 5 page document View the full content.
View Full Document

Computer security



Previewing pages 1, 2 of actual document.

View the full content.
View Full Document
View Full Document

Computer security

98 views


Pages:
5
School:
Santa Monica College
Course:
Cs 78 - Secure Server Installation and Administration
Unformatted text preview:

Computer security David Morgan David Morgan 2008 11 Personal security so disparate it s incoherent wearing seat belts changing ATM pin taking vitamins Related only in the loosest sense Have in common only that they protect your person somehow David Morgan 2008 11 1 Computer security so disparate it s incoherent password selection firewalling log analysis Related only in the loosest sense Have in common only that they protect your computer somehow David Morgan 2008 11 Some computer security categories local security network security application security prevention detection recovery David Morgan 2008 11 2 Some elements of local security physical security BIOS security bootloader security user and group adminstration filesystem permissions process UIDs David Morgan 2008 11 More elements of local security backing up logging events updating software avoiding unneeded software encrypting data hiding data David Morgan 2008 11 3 Some elements of network security packet capture firewalling port scanning denial of service packet injection tunneling tunnel encryption remote redirection of backups and logs traffic monitoring public key cryptography for remote communication wireless communication David Morgan 2008 11 Some elements of application security stack overflow vulnerability wrapping services multiplexing services specific server program vulnerabilities file transfer service ws ftp s vulnerabilities vsftpd s vulnerabilities web service apache s vulnerabilities name service BIND s vulnerabilities David Morgan 2008 11 4 Some elements of prevention detection recovery security scanning and audit hardening programs log analysis programs intrusion detection virus detection filesystem encryption rootkits David Morgan 2008 11 Computer security broad ununified changing security system vs system security David Morgan 2008 11 5


View Full Document

Access the best Study Guides, Lecture Notes and Practice Exams

Loading Unlocking...
Login

Join to view Computer security and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Computer security and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?