CS/IS 196 Final Exam Review Final Exam: Wednesday, December 16.

Slides:



Advertisements
Similar presentations
Generic Security Concepts Review
Advertisements

Ethics, Privacy and Information Security
Crime and Security in the Networked Economy Part 4.
Database Administration and Security Transparencies 1.
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Chapter 9: Privacy, Crime, and Security
Ch.5 It Security, Crime, Compliance, and Continuity
Chapter 8 Chapter 8 Digital Defense: Securing Your Data and Privacy
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Factors to be taken into account when designing ICT Security Policies
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
UNIT 9 SEMINAR – THE LAST ONE  ! Unit 9 Chapter 9 in CompTIA Security + 1 Course Name – IT Introduction to Network Security Instructor – Jan McDanolds,
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Chapter Nine Maintaining a Computer Part III: Malware.
Information Security Information Technology and Computing Services Information Technology and Computing Services
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
Our Digital World Second Edition
1 Chapter 9 - Protecting Digital Data, Devices Computer virus types Protecting computers from viruses Hackers Firewalls Passwords (skip) Malware, Spyware.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Securing Information Systems
Chapter 19 Security Integrity Security Control –computer-based –non-computer-based PC security DBMS and Web security Risk Analysis Data protection and.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Disaster Recovery, Business Continuity, and Organizational Policies.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cyber crime & Security Prepared by : Rughani Zarana.
CMGT400 Intro to Information Assurance and Security (University of Phoenix) Lecture, Week 3 Tom Olzak, MBA, CISSP.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Configuring Electronic Health Records Privacy and Security in the US Lecture f This material (Comp11_Unit7f) was developed by Oregon Health & Science University,
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Chapter 6 of the Executive Guide manual Technology.
SEC835 Practical aspects of security implementation Part 1.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Network Security Techniques by Bruce Roy Millard Division of Computing Studies Arizona State University
Module 6: Designing Security for Network Hosts
MIS 7003 MIS Core Course The MBA Program The University of Tulsa Professor: Akhilesh Bajaj Security: Personal & Business © Akhilesh Bajaj 2004,2005, 2007,
What is Spam? d min.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Operating System Hardening. Vulnerabilities Unique vulnerabilities for: – Different operating systems – Different vendors – Client and server systems.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
CompTIA Security+ Study Guide (SY0-401) Chapter 9: Malware, Vulnerabilities, and Threats.
Securing Information Systems
Information Systems Security
CompTIA Security+ Study Guide (SY0-401)
Working at a Small-to-Medium Business or ISP – Chapter 8
CHAPTER FOUR OVERVIEW SECTION ETHICS
Chapter 6 Application Hardening
Securing Information Systems
CS/IS 196 Final Exam Review
CHAPTER FOUR OVERVIEW SECTION ETHICS
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

CS/IS 196 Final Exam Review Final Exam: Wednesday, December 16

Final Exam Overview Chapters 13 through 25 Multiple Choice Similar to questions at the end of each chapter and in the homework assignments. 50 questions You will have the full class time to complete

Chapter 13 Intrusion Detection Systems and Network Security Honeypots IDS – Host Based – Network Based Antivirus Anti-spam

Chapter 14 Baselines Baselining Good password selection Operating System Hardening Updates: – Hotfix – Patch – Service pack

Chapter 15 Types of Attacks and Malicious Software Spoofing War dialing War driving Trojan Logic Bomb Worm Buffer overflow

Chapter 16 and Instant Messaging Spam encryption – PGP – SMIME

Chapter 17 Web Components http and https Encryption algorithms Ftp and Sftp SSL/TLS Cookies

Chapter 18 Secure Software Development Secure Development Lifecycle – Phases – Minimizing the attack surface Database attacks – SQL injection Spiral method

Chapter 19 Disaster Recovery, Business Continuity, and Organizational Policies Alternate sites – Hot – Warm – Cold RAID – 0 – 1 (disk mirroring) – 5 ( data spreading with parity ) Backups – Full – Differential – Incremental – Delta

Chapter 20 Risk Management Risk Threat Assesment Purpose of risk management SLE, ARO, ALE – Compute ALE given SLE and ARO – ALE = SLE * ARO

Chapter 21 Change Management Least privilege Separation of duties Change management application to software development

Chapter 22 Privilege Management Groups MAC DAC RBAC – Role Based – Rule Based Time of day restrictions Password policies – Enforce History – Maximum Age – Minimum Length

Chapter 23 Computer Forensics Message Digests Free space Slack space Volatility of data – CPU – RAM – Hard drive – Kernel tables

Chapter 24 Legal Issues and Ethics Law – Statutory – Common – Administrative Computer trespass Computer Fraud and Abuse Act CAN-SPAM Act Sarbanes-Oxley Act

Chapter 25 Privacy Freedom of Information Act (FOIA) Cookie cutter Country with poor privacy practices Family Education Records and Privacy Act of 1974

The Final Exam Bring a #2 pencil and an eraser. Mr. Hodges will supply the scantron forms. Closed book, closed note, closed computer.

Questions Any Questions?