Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Computer Security Fundamentals - Solutions, summaries, and outlines. 2022 updated

Rating
-
Sold
-
Pages
113
Grade
A+
Uploaded on
19-02-2022
Written in
2021/2022

Description: INCLUDES Some or all of the following - Supports different editions ( newer and older) - Answers to problems & Exercises. in addition to cases - Outlines and summary - Faculty Approved answers. - Covers ALL chapters.

Show more Read less
Institution
Course

Content preview

Instructor’s Manual Materials to Accompany

COMPUTER SECURITY FUNDAMENTALS

CHAPTER 1
INTRODUCTION TO COMPUTER SECURITY

Chapter 1 objectives
When students finish reading this chapter, they will be able to:

 Identify the top threats to a computer network: intrusion, denial-of-service attacks, and malware.
 Assess the likelihood of an attack on your personal computer and network.
 Define key terms such as cracker, sneaker, firewall, and authentication.
 Compare and contrast perimeter and layered approaches to network security.
 Use online resources to secure your network.


chapter overview
This chapter, as well as the entire textbook, acquaints students with the actual threats posed to a network.
It also gives a high-level overview of the entire book, introduces topics, and references what chapters have
more detailed information. This chapter introduces students to some major terms, techniques, and
resources of network security.

The major sections in this chapter are

1. How Seriously Should You Take Threats to Network Security? Realistically assessing the risks to
your computer network.
2. Identifying Types of Threats. Covers the common threats to a computer: malware, intrusions, and
denial-of-service attacks.
3. Basic Security Terminology. Presented here are definitions of the people, devices, activities, and basic
paradigms involved in network security.
4. How Do Legal Issues Impact Network Security? Covers laws on privacy and security and their
impact on organizations.
5. Online Security Resources. Some major security organizations are presented here with links to their
sites.


chapter outline
I. Chapter 1 Objectives

II. Introduction

III. How Seriously Should You Take Threats to Network Security?

IV. Identifying Types of Threats

, Malware

Compromising System Security

Denial-of-Service Attacks

Web Attacks

Session Hijacking

DNS Poisoning

V. Assessing the Likelihood of an Attack on Your Network

VI. Basic Security Terminology

Hacker Slang

Professional Terms

VII. Concepts and Approaches

CIA Triangle

VIII. How Do Legal Issues Impact Network Security?

IX. Online Security Resources

CERT

Microsoft Security Advisor

F-Secure

SANS Institute

X. Summary

XI. Test Your Skills

XII. Exercises

XIII. Projects


key terms
Audit A check of systems security. This usually includes a review of documents, procedures, and system
configurations.

Authentication The process to verify that a user is authorized to access a given resource. This is part of the
logon system.

Black hat hackers Hackers with malicious intent; synonymous with cracker.

,CIA Triangle: Confidentiality, Integrity, and Availability.

Cookie A small file containing information from a Web site.

Cracker One who breaks into a system to do something malicious, illegal, or harmful. A hacker with
malicious intent; synonymous with black hat hacker.

Denial-of-service (DoS) An attack that prevents legitimate users from accessing a resource.

Ethical hacker A person who hacks into systems to accomplish some goal that he feels is ethically valid.

Firewall A device or software that provides a barrier between your machine or network and the rest of the
world.

Gray hat hackers Hackers who normally behave legally, but who may, for certain reasons and in limited
situations, conduct illegal activities, usually for reasons they feel are ethically compelling.

Hacker A person who tries to learn about a system by examining it in detail and reverse-engineering it.

Hacking The process to attempt to learn about a system by examining it and often exploiting flaws. This
usually involves attempts to compromise the target system in some way.

Intrusion-detection system (IDS) A system designed to detect signs of attacks in progress and to notify
the administrator.

Key logger Software that logs key strokes on a computer.

Layered security approach An approach that attempts to fortify security within the network rather than
just the perimeter.

Malware Any software that has a malicious purpose, such as a virus or Trojan horse.

Proxy server A machine or software that hides all internal network IP addresses from the outside world. It
provides a point of contact between a private network and the Internet.

Reactive security Security that simply acts after something has gone wrong.

Script kiddy A hacker term for a person who claims much greater hacking skill than he actually has.

Sneaker Someone who attempts to compromise a system to assess its vulnerability.

Social engineering Using interpersonal skills to extract information about a computer system and its
security.

Spyware Software that monitors computer use.

Trojan horse Software that appears to have a valid and benign purpose but actually has another nefarious
purpose.

Virus Software that is self-replicating and spreads like a biological virus.

War-dialing Dialing phones waiting for a computer to pick up. This is usually done via some automated
system.

, War-driving Driving and scanning for wireless networks that can be compromised.

White hat hackers Hackers who hack only for legal/ethical purposes.


Teaching notes
I. How Seriously Should You Take Threats to Network Security?

Teaching Tips: Have students assess the risk on their home computers using the formula in the In
Practice callout box (p. 5). Lead students in a discussion on how valuable they believe their data is to
someone else.

II. Identifying Types of Threats

Teaching Tips: Lead students in a discussion about why someone would write malware, break into
a system, or deny access to another system.

III. Basic Security Terminology

Teaching Tips: As with any occupation, security personnel need to understand the language used
by people in the field. In this case, there are two basic cultures. There are those that exploit systems and
those that protect systems; each may use words a little differently. Also mention to students that because
this is an extremely fast-changing field, new words are continuously invented. Words such as phishing and
blue snarfing are recent additions.

Teaching Tips: Ask students: “Who should grant permission for a sneaker to test the security of a
system? Would it be the system administrator, the head of the IT department, or a CEO? How would a
sneaker prove she has the authorization to break in?”

Teaching Tips: Not all IT security issues have technological solutions. IT Security is about one-
third technology, one-third business, and one-third sociology. Social engineering is by far the tool of choice
for most crackers. You can obtain an ID and password faster, easier, and with less risk over the phone than
by using a computer. See whether any student has ever overheard a conversation in which someone has
revealed a password.

IV. Concepts and Approaches

Teaching Tips: Good security has different layers of access. Use the example of a bank safety
deposit box. What layers of security do you need to go through to get to items stored in your safety deposit
box? The doors to the bank building have locks. The lobby may have armed guards. The vault has a big lock
on it. Each drawer of a safety deposit box also has two key locks—you have one key and the bank has the
other. How do layers improve security?

V. How Do Legal Issues Impact Network Security?

Teaching Tips: Let students understand that IT security needs to protect systems not only from
hackers, but also from untrained users, disgruntled employees, and lawyers. Lawsuits can damage a
company faster than the loss of a computer or the temporary loss of data. Lawsuits can even put CEOs in
jail if their IT department did not do “due diligence.”

Connected book

Written for

Institution
Course

Document information

Uploaded on
February 19, 2022
Number of pages
113
Written in
2021/2022
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$40.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TestBanks2022 Harvard University
Follow You need to be logged in order to follow users or courses
Sold
2172
Member since
4 year
Number of followers
1702
Documents
2238
Last sold
2 days ago

4.0

351 reviews

5
191
4
59
3
45
2
18
1
38

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions