Easttom PPT 01 Final
Easttom PPT 01 Final
Fundamentals
Chuck Easttom
!"#$%&'()(*+%',-./%0,+(%,(%,(!,1$.%&'(2&/.'0%3
Chapter 1 Objectives
q Middle ground.
q Trojan horse
q Spyware
q Logic Bomb
Virus
q One of the two most common types
q Usually spreads through e-mail
q Uses system resources, causing slowdown or
stoppage
Spyware
q The most rapidly growing types of malware
n Cookies
n Key logger
Logic Bomb
q Lays dormant until some logical condition is met,
often a specific date.
Intrusions
q Attacks that break through
system resources
n Hackers
n Crackers
n Social engineering
n War-driving
People:
q Hackers
n White hats
n Black hats
n Gray hats
q Script kiddies
q Sneakers
q Ethical hackers
Devices
q Firewall
n Filters network traffic
q Proxy server
n Disguises IP address of internal host
q Intrusion Detection System
n Monitors traffic, looking for attempted attacks
Activities
q Authentication
q Auditing
n CERT
q www.cert.org
n Microsoft Security Advisor
q www.microsoft.com/security/default.mspx
n F-Secure
q www.f-secure.com
n SANS
q www.sans.org