IAS-2-Part-2.pdf
Document Details
Uploaded by StrikingTriumph5608
Biola University
Tags
Full Transcript
Information Assurance and Security BENEDICTO B. BALILO JR. CS/IT Department SECURITY TRENDS SECURITY TRENDS SECURITY TRENDS SECURITY TRENDS SECURITY TRENDS SECURITY TRENDS SECURITY TRENDS SECURITY TRENDS SECURITY TRENDS SECURITY TRENDS HOW DO WE ADDRESS SECURITY TRENDS...
Information Assurance and Security BENEDICTO B. BALILO JR. CS/IT Department SECURITY TRENDS SECURITY TRENDS SECURITY TRENDS SECURITY TRENDS SECURITY TRENDS SECURITY TRENDS SECURITY TRENDS SECURITY TRENDS SECURITY TRENDS SECURITY TRENDS HOW DO WE ADDRESS SECURITY TRENDS HOW DO WE ADDRESS SECURITY TRENDS HOW DO WE ADDRESS SECURITY TRENDS SECURITY TRENDS SECURITY TRENDS TYPES OF ATTACK: BOTNET TYPE OF ATTACK: REDIRECTION (FAKE SITES TYPE OF ATTACK: REDIRECTION TYPE OF ATTACK: FAKE ANTINVIRUS TYPE OF ATTACK: KEYLOGGERS TYPE OF ATTACK: USB KEYS (AUTORUN INFECTION TYPE OF ATTACK: SPAM EMAIL TYPE OF ATTACK: SPEAR PHISHING EMAILS TYPE OF ATTACK: SQL INJECTION