Understanding Computer Security: From Worms to Encryption

Classified in Computers

Written at on English with a size of 1.91 KB.

Understanding Computer Security

Common Threats

  • Worm: Designed to replicate itself, a worm operates as a standalone application, unlike a virus.
  • Trojan: Disguised as a legitimate program (e.g., a screensaver), a Trojan operates covertly to inflict damage.
  • Phishing: Attackers impersonate trustworthy entities to steal sensitive information, exploiting social engineering tactics.

Network and Security Concepts

  • Simple Mail Transfer Protocol (SMTP): A standard for email communication, SMTP is known for its lack of robust security.
  • Sandboxes: Software environments that isolate programs to prevent them from harming the host system, commonly used in web browsers.

Wireless Security

  • Wireless Internet (Wi-Fi): Enables wireless communication between devices, forming local area networks (LANs) using radio waves.
  • Service Set Identifier (SSID): The name of a Wi-Fi network, visible when connecting devices.
  • Wired Equivalent Privacy (WEP): An outdated encryption standard for Wi-Fi, known for its vulnerabilities.
  • Wi-Fi Protected Access 2 (WPA2): The recommended security protocol for Wi-Fi, employing stronger encryption for data transmission.

Internet Protocols

  • Transmission Control Protocol (TCP): Ensures reliable data transmission over the internet.
  • Internet Protocol (IP): Responsible for routing data packets across the internet, with IPv4 and IPv6 being the major versions.

Cryptography

  • Asymmetric Cryptography: Employs a key pair (private and public keys) for secure communication. The private key remains confidential, while the public key can be shared.

Entradas relacionadas: