Security Chapter 8 Objectives • Societal impact of information and information technology – Explain the meaning of terms related to computer security and crime and determine ways to protect both a business and yourself – Identify areas of computer security vulnerability and ways to protect against them – Recall the definition of encryption and apply the XOR encryption technique – Recognize good and bad passwords based on password guidelines
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Security Chapter 8Objectives
• Societal impact of information and information technology
– Explain the meaning of terms related to computer security and crime and determine ways to protect both a business and yourself
– Identify areas of computer security vulnerability and ways to protect against them
– Recall the definition of encryption and apply the XOR encryption technique
– Recognize good and bad passwords based on password guidelines
Security Resources you can use
• Protecting your computer sound byte:http://wps.prenhall.com/bp_evans_techinaction_1/0,8697,1105530-,00.html
• Norton AntiVirus Response Center Web Page
http://securityresponse.symantec.com/• Test the vulnerability of your computer:
– Gibson Research Corporation (http://www.grc.com)