Lecture Security and Control



Download 0.85 Mb.
View original pdf
Page2/13
Date23.03.2021
Size0.85 Mb.
#56158
1   2   3   4   5   6   7   8   9   ...   13
securing information systems
cable modems or DSL

Lack of encryption with most Voice over IP (VoIP)

Widespread use of email and instant messaging
(IM)
Management Information Systems
Lecture 10 Security and Control
SYSTEM VULNERABILITY AND ABUSE
Internet Vulnerabilities
Why Systems Are Vulnerable (Continued)


Radio frequency bands are easy to scan

The service set identifiers (SSID) identifying the
access points broadcast multiple times
Management Information Systems
Lecture 10 Security and Control
SYSTEM VULNERABILITY AND ABUSE
Wireless Security Challenges


SYSTEM VULNERABILITY AND ABUSE
Wi-Fi Security Challenges

Download 0.85 Mb.

Share with your friends:
1   2   3   4   5   6   7   8   9   ...   13




The database is protected by copyright ©ininet.org 2024
send message

    Main page