CS101: Introduction to Computing
Networking and the Internet: Security
Denial of Service Attacks
- Aim to disrupt a company's operations by overwhelming it with messages.
- Attackers use compromised computers ('botnet') to generate messages when signaled.
- Users should disconnect PCs from the internet when not in use due to the risk of exploitation.
Spam
- Proliferates unwanted email; rarely overwhelms systems but overwhelms users.
- Often used for phishing and spreading malware.
Proxy Servers
- Intermediaries between clients and servers, providing a layer of protection for clients.
- Prevent servers from directly recognizing clients, which protects internal structure.
- Capable of filtering messages (e.g., antivirus checks).
Auditing Software
- Helps system administrators monitor traffic, detect irregularities, and manage firewalls.
- Essential for proactive identification and resolution of issues.
Antivirus Software
- Detects and removes viruses but requires regular updates to prevent new threats.
- Users should practice caution (e.g., avoid unknown attachments).
Public Key Encryption
- Uses pairs of keys for secure communication; enables authentication (digital signatures).
- Ensures that messages can be verified by the holder of the corresponding private key.
Legal Approaches to Network Security
- Laws include the US Computer Fraud and Abuse Act, Prevention of Electronic Crimes Ordinance.
- Various acts address cybersecurity, data protection, and electronic transactions.
Algorithms
- Basic operations involve fetching, decoding, and executing instructions uniquely.
Algorithm Representation
- Can be expressed through pseudocode, which provides an intuitive notation during the development process.
Logic and Control Structures
- Various control statements facilitate programming, including loops and conditional statements (if-else).
Artificial Intelligence
- Encompasses autonomous systems, intelligent agents, and different methodologies that enhance decision-making processes.