References:
Note:
15.1 The Security Problem
Figure 15.1 - Standard security attacks. Show
15.2 Program Threats
15.3 System and Network Threats
15.4 Cryptography as a Security Tool
15.5 User Authentication
15.6 Implementing Security Defenses
15.7 Firewalling to Protect Systems and Networks
Figure 15.10 - Domain separation via firewall.
15.8 Computer-Security Classifications ( Optional )
15.9 An Example: Windows XP ( Optional )
15.10 SummaryWhen a computer is subject of an attack?4. When can a computer be a subject and an object of an attack respectively? When a computer is the subject of attack, it is used as an active tool to conduct theattack. When a computer is the object of an attack, it is the entity being attacked.
Which term describes a subject or object's ability to use manipulate modify or affect another subject or object?Access. A subject of object's ability to use, manipulate, modify, or affect another subject or object, authorized users have legal access to a system, whereas hackers must gain illegal access to a system. Access controls regulate this ability. Exposure.
Which attack is used when a copy of the hash of the user's password has been obtained?A rainbow attack is used when a copy of the hash of the user's password has been obtained. When a match is found, the password has been cracked.
Which e mail attack occurs when an attacker routes large quantities of e mail to the target system?A mail bomb is a form of a denial-of-service (DoS) attack designed to overwhelm an inbox or inhibit a server by sending a massive number of emails to a specific person or system.
|