Page 146 - DCAP516_COMPUTER_SECURITY
P. 146

Computer Security




                    Notes          Password Cracking: It means decrypting a password or bypassing a protection scheme breaking
                                   a password.
                                   Sparse Infector: The term ‘sparse infector’ is used for a virus that infects only occasionally.

                                   Spoofed e-mail: It is an e-mail that appears to originate from one source but has actually emerged
                                   from another source.
                                   Tempest: It is the ability to monitor electro-magnetic emissions from computers in order to
                                   reconstruct the data.
                                   Virus hoax: It generally appears as an e-mail message that describes a particular virus that does
                                   not exist.

                                   11.5 Review Questions

                                   1.  What is Hacking?
                                   2.  Define Unauthorised Access.

                                   3.  What is Tempest Attack?
                                   4.  What are Trojan horses? What are the most common types of Trojan horses?
                                   5.  What are Viruses? Discuss some major types of viruses.
                                   6.  What are E-mail related threats?
                                   7.  What are denial of service tools?

                                   8.  What are the reasons for the vulnerability of computers?
                                   9.  Explain different threats to networks.

                                   Answers: Self Assessment

                                   1.  hacking                           2.   unauthorized access
                                   3.  Tempest                           4.   Password cracking

                                   5.  guess                             6.   unchecked buffer overflow
                                   7.  RATs                              8.   Password Trojans
                                   9.  Packet Sniffing                   10.  viruses
                                   11.  active                           12.  occasionally

                                   13.  macro                            14.  virus hoax
                                   15.  spoofed e-mail

                                   11.6 Further Readings




                                   Books       Managing Enterprise Information Integrity: Security, Control and Audit Issues, IT
                                               Governance Institute.

                                               Risks of Customer Relationship Management: A Security, Control, and Audit Approach,
                                               PricewaterhouseCoopers Llp.





          140                               LOVELY PROFESSIONAL UNIVERSITY
   141   142   143   144   145   146   147   148   149   150   151