CS101: Introduction to Computing

Networking and the Internet: Security

  • Denial of Service Attacks

    • Aim to disrupt a company's operations by overwhelming it with messages.
    • Attackers use compromised computers ('botnet') to generate messages when signaled.
    • Users should disconnect PCs from the internet when not in use due to the risk of exploitation.
  • Spam

    • Proliferates unwanted email; rarely overwhelms systems but overwhelms users.
    • Often used for phishing and spreading malware.
  • Proxy Servers

    • Intermediaries between clients and servers, providing a layer of protection for clients.
    • Prevent servers from directly recognizing clients, which protects internal structure.
    • Capable of filtering messages (e.g., antivirus checks).
  • Auditing Software

    • Helps system administrators monitor traffic, detect irregularities, and manage firewalls.
    • Essential for proactive identification and resolution of issues.
  • Antivirus Software

    • Detects and removes viruses but requires regular updates to prevent new threats.
    • Users should practice caution (e.g., avoid unknown attachments).
  • Public Key Encryption

    • Uses pairs of keys for secure communication; enables authentication (digital signatures).
    • Ensures that messages can be verified by the holder of the corresponding private key.
  • Legal Approaches to Network Security

    • Laws include the US Computer Fraud and Abuse Act, Prevention of Electronic Crimes Ordinance.
    • Various acts address cybersecurity, data protection, and electronic transactions.
  • Algorithms

    • Basic operations involve fetching, decoding, and executing instructions uniquely.
  • Algorithm Representation

    • Can be expressed through pseudocode, which provides an intuitive notation during the development process.
  • Logic and Control Structures

    • Various control statements facilitate programming, including loops and conditional statements (if-else).
  • Artificial Intelligence

    • Encompasses autonomous systems, intelligent agents, and different methodologies that enhance decision-making processes.