Hub: engineering

Part of the series

The Security Problem

Program Threats

  1. Trojan horse
  2. Trap door
  3. Logic bomb
  4. Stack and buffer overflow
  5. Viruses

System and Network Threats

  1. Worms
  2. Port scanning
  3. Denial of service

Cryptography as a Security Tool

  1. Encryption
  2. Implementation of Cryptography
  3. An Example: SSL

User Authentication

  1. Passwords
  2. Password vulnerabilities
  3. Encrypted passwords
  4. One-time passwords
  5. Biometrics

Implementing Security Defenses

  1. Security policy
  2. Vulnerability assessment
  3. Intrusion detection
  4. Virus protection
  5. Auditing, accounting and logging

Firewalling to protect systems and networks

Computer Security Classifications

An Example: Windows XP