StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

New Fishing Trojan - Book Report/Review Example

Cite this document
Summary
The paper "New Fishing Trojan " discusses that users with laptops should only access vital information remotely from the server and no important information left on the laptop. Penalties are a way to encourage employees with laptops to follow company policy…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.5% of users find it useful
New Fishing Trojan
Read Text Preview

Extract of sample "New Fishing Trojan"

The Trojan actually appears to be doing the opposite that it was created for. A Trojan has never taken advantage of this way to export personal users’ information before. It is scary to know that system administrators may not be used to seeing ICMP ping packets going outbound from a network. This new way of hacking information is not really surprising to me because hackers are always coming up with new methods to hack information. System administrators are usually the ones tasked to prevent this kind of activity, but if the information is not sent through using HTT post or emailing, then they likely won’t notice it. Also, it is interesting to know that firewalls stop any incoming ICMP ping packets, but do not do so going out. Because these packets are unique, then it is likely that some software could be made to detect any malicious ICMP ping packets.

I also learned that the company Immunity has a new product that is a handheld penetrative testing tool. This product may come in handy against these malicious kinds of attacks because it can scan all the computers on a wireless network and then give details about any file shares or anything of interest.

One thing that I did not previously know about was Offensive Computing, which was launched by a pair of independent researchers. It is an open-source search engine that contains information and analysis on 40,000 hostile files from around the security industry. This could be helpful in identifying files that may be malware. IT departments can work together to combat the threat of viruses and malware. The female on the tape said that this type of collaboration may negatively affect anti-virus software, and I agree that it could be a problem in the future.

Another thing that I learned was how easy it is to get information off a laptop because it is relatively unprotected. I agree that corporate policy, such as not allowing sensitive information to be stored on a laptop, and hard drive encryption, such as encrypting files that contain sensitive information, are some of the ways to combat this. Databases should not be stored on laptops and instead on a server. Security policies should be implemented to help protect valuable information from being stolen.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Sploitcast Book Report/Review Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1599566-sploitcast
(Sploitcast Book Report/Review Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/information-technology/1599566-sploitcast.
“Sploitcast Book Report/Review Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1599566-sploitcast.
  • Cited: 0 times

CHECK THESE SAMPLES OF New Fishing Trojan

The Iliad Story after the Trojan War

The story handles a few occurrences after the trojan War.... The story handles a few occurrences after the trojan War.... Achaeans attack trojan-allied town and manage to capture two beautiful women, Briseis and Chryseis.... The Iliad is a book containing a story, divided into subtitles, each known as a book....
4 Pages (1000 words) Essay

Comparing Classic Greek Literature with the Leadership Style of Martin Luther King, Jrs Book

Publication of the book was done by Harper & Row, Publishers, new York, Evanston, and London1967.... He worked on the original manuscript for almost a month, and then sent chapters to Stanley Levison in new York for revisions.... King warned that continued racism and the dawning awareness that African American demands shall lead to structural changes in society had generated a new phase of white resistance in North and South (King, 12).... King maintains that there is no real progress for African Americans unless the whole of America turns over a new turn toward greater economic justice' (King, 50)....
6 Pages (1500 words) Research Paper

Response paper Questions for Virgil, Aeneid

Insert name Tutor Course Date The Aeneid by Virgil Question # 1 Vergil's depiction of a trojan soldier is of a dependable person in the Ancient Greek society.... hellip; A trojan soldier is expected to demonstrate their immortality and skills as the protectors of their community's interest.... The trojan leader prepares his troops for befitting send off ceremony following the deaths of soldiers in a war.... The Book depicts a trojan soldier as being glorified for falling in the battle (61)....
3 Pages (750 words) Essay

Tragedies: The heart of Grecian verses. Women of Troy

When Paris decided to snatch Helen from under the nose of Menelaus the Spartan king that is when things took a wrong turn for Troy and for the trojan women.... When Paris decided to snatch Helen from under the nose of Menelaus the Spartan king that is when things took a wrong turn for Troy and for the trojan women.... The trojan War as depicted in Euripides's ‘The trojan Women' displays the plight of trojan women and furthermore the plight of Trojans when the Achaeans besiege Troy for almost ten years and finally plundering the city through the ingenious wooden horse....
6 Pages (1500 words) Research Paper

Literary Analysis of the Iliad by Homer

After his death, the Greeks entered trojan through a hollow wooden house and destroyed the citadel at troy.... Literary Analysis of the Iliad The Iliad is a classic epic of poems written by Homer.... Homer's history is unclear since he is considered as a mysterious writer in history....
6 Pages (1500 words) Research Paper

Discuss the concept of national identiy in the Iliad and the Aeneid

The epic poem Iliad, which was written by Homer in 8th or 7th century BC about the trojan war and Aeneid, written by Virgil in the first century BC is about the Roman ancestor Aeneas (he was already a character in Iliad) and the war involved have many commonalities.... Here it is the Roman nation, though provisional, against other ethnicities like trojan, Italian, Greek and Carthaginian....
4 Pages (1000 words) Essay

World literature Research paper

Achilles became one of the highlights in the trojan War (Hunter).... Some versions glorify Achilles' fighting skills while others question his participation in the trojan War.... The poem Iliad accounted the life events of a half-god, half mortal hero.... Achilles became an epic hero when he fought for his homeland....
2 Pages (500 words) Essay

Honor and Justice in the Homeric Iliad

Polydamas interprets this sign to the effect that even though the trojan army is superior to their enemy any attempt by them to storm the Achaean vessels with fire would result in their defeat.... Ancient readers and contemporary minds alike have been lured to the fine details of the phenomenon both its role in slowing the pace of the plot and its… As Strabo airs his discontent at the timing of the efforts at building the wall, which is a decade into the war, raises some sense of disorganization on the builders, especially with regard to their proximity to Troy where they have been lying vulnerable It is upon this Achaean Wall that the quest for honor and justice prevails....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us