Levels Tought:
Elementary,Middle School,High School,College,University,PHD
Teaching Since: | Apr 2017 |
Last Sign in: | 9 Weeks Ago, 4 Days Ago |
Questions Answered: | 4870 |
Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
Write a report on the hardware technologies and software techniques Used to secure Distributed Computer Systems.
Â
1. IntroductionIn this chapter:• Threats, vulnerabilities, and controls• Confidentiality, integrity, and availability• Attackers and attack types; method, opportunity, and motive• Valuing assetsOn 11 February 2013, residents of Great Falls, Montana received the following warningon their televisions [INF13]. The transmission displayed a message banner on the bottomof the screen (as depicted inFigure 1-1).FIGURE 1-1Emergency Broadcast WarningAnd the following alert was broadcast:[Beep Beep Beep:the sound pattern of the U.S. government EmergencyAlert System. The following text then scrolled across the screen:]Civil authorities in your area have reported that the bodies of the dead arerising from their graves and attacking the living. Follow the messages onscreen that will be updated as information becomes available.Do not attempt to approach or apprehend these bodies as they areconsidered extremely dangerous. This warning applies to all areasreceiving this broadcast.[Beep Beep Beep]The warning signal sounded authentic; it had the distinctive tone people recognize forwarnings of serious emergencies such as hazardous weather or a natural disaster. And thetext was displayed across a live broadcast television program. On the other hand, bodiesrising from their graves sounds suspicious.
-----------