DMC ITSY 2430 - Systems Threats and Risks (40 pages)

Previewing pages 1, 2, 3, 19, 20, 38, 39, 40 of 40 page document View the full content.
View Full Document

Systems Threats and Risks



Previewing pages 1, 2, 3, 19, 20, 38, 39, 40 of actual document.

View the full content.
View Full Document
View Full Document

Systems Threats and Risks

149 views

Lecture Notes


Pages:
40
School:
Del Mar College
Course:
Itsy 2430 - Intrusion Detection
Intrusion Detection Documents

Unformatted text preview:

1428340661 ch02 REV2 qxd 6 18 08 5 37 PM Page 39 2 chapter Systems Threats and Risks After completing this chapter you should be able to do the following Describe the different types of software based attacks List types of hardware attacks Define virtualization and explain how attackers are targeting virtual systems 39 1428340661 ch02 REV2 qxd 40 Chapter 2 6 18 08 5 37 PM Page 40 Systems Threats and Risks Today s Attacks and Defenses What do spam and HIV have in common According to one Microsoft researcher knowledge of how spam works may help find a cure for HIV HIV human immunodeficiency virus affects the human immune system and causes the disease known as AIDS acquired immunodeficiency disorder In many ways HIV is like a crafty spammer After attacking a cell it injects its own genetic material and then manufactures thousands of copies of the virus Although some of the cell copies are mistakes each mistake launches mutant viruses into the system Some of these mutant viruses survive and are able to resist drugs because they have changed and thus the drugs can no longer recognize them Spam is unsolicited e mail that typically urges users to purchase cut rate watches or send their bank account number to a Nigerian general To stop spam from reaching the user s inbox spam filters look for signs that indicate the message is spam such as the presence of the word Viagra However once a spammer sees that their spam with Viagra is being blocked they alter it to V1agra V1agr a and Vi ag ra Because there are so many variations of the word that can circumvent a spam filter the filter needs to look for more than just the presence of a single word Such characteristics as fonts e mail addresses or even types of punctuation are possible clues to detect spam Because each decision can involve many variables in complex combinations it is necessary to study the statistical relationships between these variables to determine which combinations of clues result in the highest likelihood of



View Full Document

Access the best Study Guides, Lecture Notes and Practice Exams

Loading Unlocking...
Login

Join to view Systems Threats and Risks and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Systems Threats and Risks and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?