Page 146 - DCAP516_COMPUTER_SECURITY
P. 146
Computer Security
Notes Password Cracking: It means decrypting a password or bypassing a protection scheme breaking
a password.
Sparse Infector: The term ‘sparse infector’ is used for a virus that infects only occasionally.
Spoofed e-mail: It is an e-mail that appears to originate from one source but has actually emerged
from another source.
Tempest: It is the ability to monitor electro-magnetic emissions from computers in order to
reconstruct the data.
Virus hoax: It generally appears as an e-mail message that describes a particular virus that does
not exist.
11.5 Review Questions
1. What is Hacking?
2. Define Unauthorised Access.
3. What is Tempest Attack?
4. What are Trojan horses? What are the most common types of Trojan horses?
5. What are Viruses? Discuss some major types of viruses.
6. What are E-mail related threats?
7. What are denial of service tools?
8. What are the reasons for the vulnerability of computers?
9. Explain different threats to networks.
Answers: Self Assessment
1. hacking 2. unauthorized access
3. Tempest 4. Password cracking
5. guess 6. unchecked buffer overflow
7. RATs 8. Password Trojans
9. Packet Sniffing 10. viruses
11. active 12. occasionally
13. macro 14. virus hoax
15. spoofed e-mail
11.6 Further Readings
Books Managing Enterprise Information Integrity: Security, Control and Audit Issues, IT
Governance Institute.
Risks of Customer Relationship Management: A Security, Control, and Audit Approach,
PricewaterhouseCoopers Llp.
140 LOVELY PROFESSIONAL UNIVERSITY