Introduction to Information Security



Download 1,39 Mb.
bet30/44
Sana01.04.2022
Hajmi1,39 Mb.
#522548
1   ...   26   27   28   29   30   31   32   33   ...   44
Bog'liq
CSS

Mobile Code

  • It refers to program/script/macro that runs unchanged
  • to heterogeneous collection of platforms.

  • It also applies to situations involving a large homogeneous collection (E.g. Microsoft Windows).
  • It is transmitted from remote system to local system & then executed on local system.
  • It often acts to inject virus, worm, or Trojan horse.
  • In other cases, mobile code takes advantage of vulnerabilities to perform own exploits such as unauthorized data access, root compromise.

Multiple-Threat Malware

  • Malware may operate in multiple ways.
  • Multipartite virus infects in multiple ways.
  • E.g. multiple file types

  • Blended attack uses multiple methods of infection or transmission , to maximize the speed of contagion and severity of attack.
  • It may include multiple types of malware
  • E.g. Nimda has worm, virus, mobile code

Zombie

  • It is the program which secretly takes over another networked computer.
  • It uses indirectly to launch attacks.
  • It is often used to launch distributed denial of service (DDOS) attacks.
  • Develops known faults in network systems.

Computer Systems Security


Information systems security audit

Defining IT Security Audit

IT Audit

  • Independent assessment of an organization’s internal policies, controls, and activities. You use an audit to assess the presence and effectiveness of IT controls and to ensure that those controls are compliant with stated policies. In addition, audits provide reasonable assurance that organizations are compliant with applicable regulations and other industry requirements.
  • Address the risk exposures within IT systems and assess the controls and integrity of information systems
  • Shouldn’t be confused with Penetration Testing
    • pen test is a very narrowly focused attempt to look for security holes in a critical resource, such as a firewall or webserver.

Download 1,39 Mb.

Do'stlaringiz bilan baham:
1   ...   26   27   28   29   30   31   32   33   ...   44




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish