Đang chuẩn bị liên kết để tải về tài liệu:
Lecture Data security and encryption - Lecture 27: Malicious Software

Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ

The contents of this chapter include all of the following: problem of intrusion, behavior and techniques; intrusion detection (statistical & rule-based); password management; various malicious programs; trapdoor, logic bomb, trojan horse, zombie; viruses; worms; distributed denial of service attacks. | Data Security and Encryption (CSE348) Lecture slides by Lawrie Brown for “Cryptography and Network Security”, 5/e, by William Stallings, briefly reviewing the text outline from Ch 0, and then presenting the content from Chapter 1 – “Introduction”. Lecture # 27 Review have considered: problem of intrusion, behavior and techniques intrusion detection (statistical & rule-based) password management Chapter 20 summary. Chapter 21 – Malicious Software Opening quote. Viruses and Other Malicious Content Computer viruses have got a lot of publicity One of a family of malicious software Effects usually obvious Have figured in news reports, fiction, movies Getting more attention than deserve Are a concern though This chapter examines malicious software (malware), especially viruses and worms, which exploit vulnerabilities in computing systems. These have been given a lot of (often uninformed) comment in the general media. They are however, of serious concern, and are perhaps the most sophisticated types of threats to computer systems. We begin with a survey of various types of malware, with a more detailed look at the nature of viruses and worms. We then turn to distributed denial-of-service attacks. Malicious Software The terminology used for malicious software presents problems because of a lack of universal agreement on all terms and because of overlap. Stallings Table 21.1, and this diagram from 3/e, provide a useful taxonomy. It can be divided into two categories: those that need a host program (being a program fragment eg virus), and those that are independent programs (eg worm); alternatively you can also differentiate between those software threats that do not replicate (are activated by a trigger) and those that do (producing copies of themselves). Will now survey this range of malware. Malicious Software The terminology used for malicious software presents problems Because of a lack of universal agreement on all terms | Data Security and Encryption (CSE348) Lecture slides by Lawrie Brown for “Cryptography and Network Security”, 5/e, by William Stallings, briefly reviewing the text outline from Ch 0, and then presenting the content from Chapter 1 – “Introduction”. Lecture # 27 Review have considered: problem of intrusion, behavior and techniques intrusion detection (statistical & rule-based) password management Chapter 20 summary. Chapter 21 – Malicious Software Opening quote. Viruses and Other Malicious Content Computer viruses have got a lot of publicity One of a family of malicious software Effects usually obvious Have figured in news reports, fiction, movies Getting more attention than deserve Are a concern though This chapter examines malicious software (malware), especially viruses and worms, which exploit vulnerabilities in computing systems. These have been given a lot of (often uninformed) comment in the general media. They are however, of serious .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.