We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2
COMPUTER & NETWORK SECURITY GUIDE
* data and information
* privacy and secrecy * define threat, Microsoft Corporation threat model * notes on Security policy * about automated security policy * discuss how senior management is responsible for Protecting the asset of an organization * goals of computer security * In our computing labs and departments, print billing is often tied to the user's login. People login, they print, they (or their department) get a bill. Sometimes people call to complain about bills for printing they never did only to find out that the bills are, indeed, correct. Explain what you think might have gone wrong? * design an attack tree by an attacker “Get Password". * How can you protect yourself from a fraudster who has use your credit card number to make purchases * notes on Accountability, single sign-on, availability, non-repudiation, and reliability * Two different offices on campus are working to straighten out an error in a correct employee’s bank account due to a direct deposit mistake. Office #1 emails the account and deposit information to office #2, which promptly fixes the problem. The wrong employee confirms with the bank that everything has, indeed, been straightened out. What is with this scenario?