Section+2+-+Week+9+-+Security+&+Privacy

Key Words
 * Phishing - Trying to obtain personal information over the internet. A security attack that relies on social engineering.
 * Worm - A software program capable of reproducing itself that can spread from one computer to the next over a network
 * VPN - Enables a host computer to send and receive data across shared or public networks as if it were a private network with all the functionality, security and management policies of the private network.
 * PGP - A data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication
 * Audit Log - A security-relevant chronological record, set of records, or destination and source of records that provide documentary evidence of the sequence of activities that have affected at any time a specific operation, procedure, or event
 * Availability- A general term that is used to describe the amount of time over a one-year period that the system resources is available in the wake of component failures in the system
 * Encryption - The translation of data into a secret code. It is the most effective way to achieve data security. To read one of these files, you must have access to a password that enables you toe decrypt it.
 * Wireless N - An extension to 802.11 specification developed by the IEEE for wireless LAN technology
 * <span style="color: #333333; font-family: 'Helvetica Neue',Arial,'Liberation Sans',FreeSans,sans-serif;">Backbone - <span style="color: #444444; font-family: 'Lucida Grande',Arial,sans-serif;">Another term for bus, the main wire that connects to nodes. The term is often used to describe the main network connections composing the Internet
 * <span style="color: #333333; font-family: 'Helvetica Neue',Arial,'Liberation Sans',FreeSans,sans-serif;">Router - <span style="background-color: #f5f5f5; color: #444444; font-family: 'Lucida Grande',Arial,sans-serif;">A device that forwards data packets along networks. It is connected to at least two networks and are located at gateways, the places where two or more networks connect
 * <span style="color: #333333; font-family: 'Helvetica Neue',Arial,'Liberation Sans',FreeSans,sans-serif;">Relevance - <span style="color: #444444; font-family: 'Lucida Grande',Arial,sans-serif;">Denotes how well a retrieved documents or set of documents meets the information need of the user
 * <span style="color: #333333; font-family: 'Helvetica Neue',Arial,'Liberation Sans',FreeSans,sans-serif;">Torrent - <span style="background-color: #f5f5f5; color: #444444; font-family: 'Lucida Grande',Arial,sans-serif;">A file distribution system used for transferring files across a network of people. As you download a file, BitTorrent places what you download on upload for other users.
 * <span style="color: #333333; font-family: 'Helvetica Neue',Arial,'Liberation Sans',FreeSans,sans-serif;">Packet Jam - <span style="color: #444444; font-family: 'Lucida Grande',Arial,sans-serif;">Refers to packets that are delayed resulting in a document that cannot be reassembled or displayed.
 * <span style="color: #333333; font-family: 'Helvetica Neue',Arial,'Liberation Sans',FreeSans,sans-serif;">Buffer Overflow - <span style="background-color: #f5f5f5; color: #444444; font-family: 'Lucida Grande',Arial,sans-serif;">When data transferred to a buffer exceeds the storage capacity of the buffer and some of the data "overflows" into another buffer, one that the data was not intended to go in. This can cause corrupt data.
 * <span style="color: #333333; font-family: 'Helvetica Neue',Arial,'Liberation Sans',FreeSans,sans-serif;">Logic Bomb - <span style="color: #444444; font-family: 'Lucida Grande',Arial,sans-serif;">Programming code added to the software of an application or operating system that lies dormant until a predetermined period of time or event occurs, triggering the code into action. Typically are malicious in intent, acting in the same ways as a virus of Trojan horse once activated.
 * <span style="color: #333333; font-family: 'Helvetica Neue',Arial,'Liberation Sans',FreeSans,sans-serif;">Social Engineering - <span style="background-color: #f5f5f5; color: #444444; font-family: 'Lucida Grande',Arial,sans-serif;">The act of obtaining or attempting to obtain otherwise secures data by conning an individual into revealing secure information.
 * <span style="color: #333333; font-family: 'Helvetica Neue',Arial,'Liberation Sans',FreeSans,sans-serif;">Strong Passwords - <span style="color: #444444; font-family: 'Lucida Grande',Arial,sans-serif;">A passwords that is difficult to detect by both humans and computer programs. Consists of at least six characters that are a combination of letters, numbers and symbols, and is case-sensitive.
 * <span style="color: #333333; font-family: 'Helvetica Neue',Arial,'Liberation Sans',FreeSans,sans-serif;">Confidentiality - <span style="background-color: #f5f5f5; color: #444444; font-family: 'Lucida Grande',Arial,sans-serif;">Discretion in keeping secret information
 * <span style="color: #333333; font-family: 'Helvetica Neue',Arial,'Liberation Sans',FreeSans,sans-serif;">Authentication - <span style="color: #444444; font-family: 'Lucida Grande',Arial,sans-serif;">The process of identifying and individual, usually based on a username and password. Ensures that the individual is who he/she claims to be.
 * <span style="color: #333333; font-family: 'Helvetica Neue',Arial,'Liberation Sans',FreeSans,sans-serif;">Wireless G - <span style="background-color: #f5f5f5; color: #444444; font-family: 'Lucida Grande',Arial,sans-serif;">A 54 Mbps wireless networking standard that has become popular due to its speed advantage over the widely used Wireless-B standard
 * <span style="color: #333333; font-family: 'Helvetica Neue',Arial,'Liberation Sans',FreeSans,sans-serif;">Switch - <span style="color: #444444; font-family: 'Lucida Grande',Arial,sans-serif;">In networks, a device that filters and forwards packets between LAN segments. These operate at the data link layer and sometimes the network layer of the OSI Reference Model and therefore support any packet protocol.
 * <span style="color: #333333; font-family: 'Helvetica Neue',Arial,'Liberation Sans',FreeSans,sans-serif;">Internet 2 - <span style="background-color: #f5f5f5; color: #444444; font-family: 'Lucida Grande',Arial,sans-serif;">A testing-ground networking environment where universities, companies, and government laboratories work together and develop advanced Internet technologies such as telemedicine, digital libraries and virtual laboratories.
 * <span style="color: #333333; font-family: 'Helvetica Neue',Arial,'Liberation Sans',FreeSans,sans-serif;">TCP/IP - <span style="color: #444444; font-family: 'Lucida Grande',Arial,sans-serif;">The suite of communications protocols used to connect hosts on the Internet.
 * <span style="color: #333333; font-family: 'Helvetica Neue',Arial,'Liberation Sans',FreeSans,sans-serif;">Popularity - <span style="background-color: #f5f5f5; color: #444444; font-family: 'Lucida Grande',Arial,sans-serif;">The term used to describe the value of a web site.
 * <span style="color: #333333; font-family: 'Helvetica Neue',Arial,'Liberation Sans',FreeSans,sans-serif;">Broadband - <span style="color: #444444; font-family: 'Lucida Grande',Arial,sans-serif;">The term used to describe a type of data transmission in which a single wire can carry several channels at once.
 * <span style="color: #333333; font-family: 'Helvetica Neue',Arial,'Liberation Sans',FreeSans,sans-serif;">IP address - <span style="background-color: #f5f5f5; color: #444444; font-family: 'Lucida Grande',Arial,sans-serif;">An identifier for a computer or device on a TCP/IP network.
 * <span style="color: #333333; font-family: 'Helvetica Neue',Arial,'Liberation Sans',FreeSans,sans-serif;">Virus - <span style="color: #444444; font-family: 'Lucida Grande',Arial,sans-serif;">A software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer
 * <span style="color: #333333; font-family: 'Helvetica Neue',Arial,'Liberation Sans',FreeSans,sans-serif;">Firewall - <span style="background-color: #f5f5f5; color: #444444; font-family: 'Lucida Grande',Arial,sans-serif;">Used to prevent unauthorized Internet users from accessing private networks connected to the Internet. It can either be a packet filter, application gateway, circuit-level gateway, or a proxy sever.
 * <span style="color: #333333; font-family: 'Helvetica Neue',Arial,'Liberation Sans',FreeSans,sans-serif;">Spam - <span style="color: #444444; font-family: 'Lucida Grande',Arial,sans-serif;">Electronic junk mail
 * <span style="color: #333333; font-family: 'Helvetica Neue',Arial,'Liberation Sans',FreeSans,sans-serif;">PKI - <span style="background-color: #f5f5f5; color: #444444; font-family: 'Lucida Grande',Arial,sans-serif;">A system of digital certificates, Certificate Authorities, and other registration authorities that verify and authenticate the validity of each party involved in an Internet transaction. Necessary for electronic commerce (buying stuff online)
 * <span style="color: #333333; font-family: 'Helvetica Neue',Arial,'Liberation Sans',FreeSans,sans-serif;">Integrity - <span style="color: #444444; font-family: 'Lucida Grande',Arial,sans-serif;">The assurance that information can only be accessed or modified by those authorized to do so.
 * <span style="color: #333333; font-family: 'Helvetica Neue',Arial,'Liberation Sans',FreeSans,sans-serif;">DNS - <span style="background-color: #f5f5f5; color: #444444; font-family: 'Lucida Grande',Arial,sans-serif;">An Internet service that translates domain names into IP addresses.
 * <span style="color: #333333; font-family: 'Helvetica Neue',Arial,'Liberation Sans',FreeSans,sans-serif;">Hub - <span style="color: #444444; font-family: 'Lucida Grande',Arial,sans-serif;">A common connection point for devices in a network. Commonly used to connect segments of a LAN. Contains multiple ports, and when a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all the packets
 * <span style="color: #333333; font-family: 'Helvetica Neue',Arial,'Liberation Sans',FreeSans,sans-serif;">LAN - <span style="background-color: #f5f5f5; color: #444444; font-family: 'Lucida Grande',Arial,sans-serif;">A computer network that spans a relatively small area. Each node (individual computer) in a LAN has its own CPU with which it executes programs, but it also is able to access data and devices anywhere on the LAN.
 * <span style="color: #333333; font-family: 'Helvetica Neue',Arial,'Liberation Sans',FreeSans,sans-serif;">NLR - <span style="color: #444444; font-family: 'Lucida Grande',Arial,sans-serif;">An unfettered resource for research and commercial innovation, that it is the only national fiber optic network in the world that hosts research traffic from universities and government agencies alongside data from corporations, and that this has catalyzed regional broadband development around the country
 * <span style="color: #333333; font-family: 'Helvetica Neue',Arial,'Liberation Sans',FreeSans,sans-serif;">FTP - <span style="background-color: #f5f5f5; color: #444444; font-family: 'Lucida Grande',Arial,sans-serif;">The protocol for exchanging files over the Internet. It uses the Internet's TCP/IP protocols to enable data transfer
 * <span style="color: #333333; font-family: 'Helvetica Neue',Arial,'Liberation Sans',FreeSans,sans-serif;">Bit - <span style="color: #444444; font-family: 'Lucida Grande',Arial,sans-serif;">The smallest unit of information on a machine
 * <span style="color: #333333; font-family: 'Helvetica Neue',Arial,'Liberation Sans',FreeSans,sans-serif;">P2P - <span style="background-color: #f5f5f5; color: #444444; font-family: 'Lucida Grande',Arial,sans-serif;">Peer-to-peer software that permits direct Internet-based communication. Collaboration between two or more personal computers while bypassing centralized servers.
 * <span style="color: #333333; font-family: 'Helvetica Neue',Arial,'Liberation Sans',FreeSans,sans-serif;">Cookie - <span style="color: #444444; font-family: 'Lucida Grande',Arial,sans-serif;">A message given to a Web browser by a Web server. The browser stores the message in a text file. The message is then sent back to the server each time the browser requests a page from the server.

Security Defined



How VPNS work:


 * <span style="color: #333333; font-family: 'Helvetica Neue',Arial,'Liberation Sans',FreeSans,sans-serif;">How to Achieve Computer Security
 * <span style="color: #333333; font-family: 'Helvetica Neue',Arial,'Liberation Sans',FreeSans,sans-serif;">Security principles/concepts: explore general principles/concepts that can be used as a guide to design secure information processing systems
 * Security mechanisms: explore some of the security mechanisms that can be used to secure information processing systems
 * Physical/organizational security: consider physical and organizational security measures


 * Security Defined: CIA
 * Confidentiality: prevent unauthorized disclosure of information
 * Integrity: prevent unauthorized modification of information
 * Availability: prevent unauthorized withholding of information