0% found this document useful (0 votes)
9 views

Computer & Network Security Guide

FBC

Uploaded by

Umarr A Sesay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Computer & Network Security Guide

FBC

Uploaded by

Umarr A Sesay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

COMPUTER & NETWORK SECURITY GUIDE

* data and information


* privacy and secrecy
* define threat, Microsoft Corporation threat model
* notes on Security policy
* about automated security policy
* discuss how senior management is responsible for Protecting the asset of an
organization
* goals of computer security
* In our computing labs and departments, print billing is often tied to the user's
login. People login,
they print, they (or their department) get a bill. Sometimes people call to
complain about bills for
printing they never did only to find out that the bills are, indeed, correct.
Explain what you think
might have gone wrong?
* design an attack tree by an attacker “Get Password".
* How can you protect yourself from a fraudster who has use your credit card
number to make purchases
* notes on Accountability, single sign-on, availability, non-repudiation, and
reliability
* Two different offices on campus are working to straighten out an error in a
correct employee’s
bank account due to a direct deposit mistake. Office #1 emails the account and
deposit information
to office #2, which promptly fixes the problem. The wrong employee confirms
with the bank that
everything has, indeed, been straightened out. What is with this scenario?

You might also like