Free Essay

Spam Report

In:

Submitted By paper11
Words 3115
Pages 13
ÁÒ×Ø ØÙØ Ø ÓÖ Å Ø Ñ Ø
ËÝ

Ò×

Ø ÐÓ

ÍÒ Ú Ö× Ø Ø Ø¸ Ç

ËÔ Ñ ¹ Ú Ö Ý Ò
Å ½

Ó

Ø

Ò×

× Ò

ÓÖ Ö ¾¼¼

Ó Ë ÑÓÒ× Ò¸ ¼½¹¼¾¹½

¿

Ö

ÁÆ

ÁÒ

½

Ó Ë ÑÓÒ× Ò¸

ÀÇÄ

Å ½ ÈÖÓ

Ø

ÓÐ

ÓÖÓÖ

¾

¾ ËÔ Ñ ¹ ÔÖÓ Ð Ñ Ø
¿ ÆÙÚ Ö Ò

¾

Ñ ØÓ

Ö

¾

ÃÁÅ
º½

Ë Ò
º½

Ì

¿
Ò ×

Ø Ð

Ö

º º º º º º º º º º º º º º º º º º º º º º º º º

Ø Ð

Ö

º º º º º º º º º º º º º º º º º º º º º º º º º

ÖÁ
Ì

Ò ×

ÆÙÚ Ö Ò

×Ø ØÙ×

ÃÓÒ ÐÙ× ÓÒ
ÊÙØ

Ö Ñ ÓÖ ÑÓ Ø

Ð×

Ñ ÐÑ

ÊÙØ

Ö Ñ ÓÖ ÑÓ Ø

Ð×

Ñ ÐÑ

ÓÑ Ò Ý × Ò ØÙÖ
ÓÑ Ò Ý

ÆË Ö
ÓÖ

½

ÃÁÅ
Ë Ò

ÖÁ

Ó Ë ÑÓÒ× Ò¸

½

Ø

ÓÖÓÖ
ÒÒ

Ö ÔÔÓÖØ

Ñ ØÓ

Ö

Ö

¾

× Ö Ú Ö Ñ ØÓ

Ð Ú Ö

Ø ÓÒ

× Ò

Ö Ø Ð

ÑÔ Ð×

ËÈ

ÒÝØØ Ø Ø Ð ÓÖÑ Ð Ø¸ Ñ Ò ÔÖ Ñ
Ö × ÖÚ Ö Ò ÓÖ Ø

Ÿ

Ú׺ ÒÙÚ

ÖØ Ñ ØÓ

Ö

Ö Ò

ÚÓÖ

Ò Ú Ö¹

׺

ËÔ Ñ ¹ ÔÖÓ Ð Ñ Ø

ËÈ

Å ´ ÓÖÑ ÐØ Í

×ÓÑ Ú

Ö Ò

××

Ø Ð

Ö

Ô

Ö

Ò

ÐØÖ Ö

Ð Ó ×

Ð

ÓÒØÓµ¸

Ú Ð

× ÑØ ÒÓ Ð

Ú Ö ×ÓÑ

ÒØ ÖÒ Ø ÓÖ

Ò

ÒÙÚ

Ö Ò



Ý ×

Ø
Ò

Ý

Ö

Ñ ØÓ

×ÔÙÒ Ø

Ö

℄¸ ×ÓÑ
Ò

Ø × ×

Ñ

× Ò ×ÝÒ Ð

ÓÖ

ÛÓÖ

ÖÓÙÔµ¸

Ø Ð ÐÐ

ÔÖÓ ÒØ

ÒÒ

ÒÑ

Ò

ÖÙÔÔ º

Ò

Ö
ËÈ

ÚÓØ

Ò

Å

Ô

Ö

Ú Ö

Ò ÑÓ Ø

Ð Ú Ö

Ø Ð

½℄

Ö

Ð×

Ö

Ø

Ú ×

ØØ Ö

Ñ

Ò ØÖ
Ø Ð

ÈÏ

ÙÐ ÑÔ Ö Ú

Ð× ×

Ø

Ø Ð

Ÿ

ÒØ ÐÐ Ø

Ò

ÓÖ ËÈ

ÖÙ Ø Ô

׸
Ö ×

ź

Ö

Ö

Ö Ö

Ø
Ò

Ú

ÓÖ

ÖÙ Ø

× Ò ×ÝÒ Ð

ÖØ Ð

ÑÔ Ð×

Ø Ñ Ø Ñ Ø ×

ÖÙÒ Ð

ËÈ

Å

¸ Ò ØÓÔ

× Ø ÓÖ º

P r(words|spam)P r(spam)
P r(words)
Ò

Ò
ÓÖ

Ñ ØÓ

× Ö Ø Ô

Ö × Ò ×ÝÒ Ð
Ò

×

Ö ËÈ
Ñ

Ø Ñ ×

Ñ ×Ø

ÐØ Ö×

× Ò ×ÝÒ Ð

Öº Ô

ÒØÐÝ×
Ö

P r(spam|words) =
ËÓÑ

Ö Ú

×Ø

ÙÖ ½ × ×
Ò

Ð Ú Ö Ö ÔÔÓÖØ Ö Ø Ø Ð

ÓÑÑ Ö

ÓÖ Ñ Ú

Ý × Ø

Ö

Ö

Ð ÑÓ Ø

Ø Ð Ö

ÖÚ

ÆÙÚ Ö Ò

ÙÒ

Ð×

Ù

Ø

Ö

Ð× ¸

×

Ò Ø

Ø Ö

×Ô Ñº

´Ñ Ò

Ö× Ñ

Ö

ØÖ

¹Ñ

Ñ

е

ÒØ ¹Ô

ÈÏ

Ö ÔÔÓÖØ Ö Ò

ÖÙ

¹Ñ

´

Ø Ð

×Ô Ñ Ñ

Ö

ÓÖ Ò×Ø ÐØÒ Ò

¿

Ð ×Ø ×

×Ø

Ð

Ø ÓÖÑ ÒØÐ

ÓÖ×

ÒØ ÐÐ Ø

Ä Ò Ø

ÖÙ

Ò

ÔÖÓÑ ÐÐ µ

ÙÖ ½

ÓÑÑ Ö

ÔÖÓ Ð Ñº ÀÚ × Ú

×
Ö

Ó

´ ÓÖÑ ÒØÐ

ÓÚ Ö ÝÐ Ø

¹ ÍÒ×ÓÐ Ø

Ø ÚÓ × Ò

Ö ÔÔÓÖØ Ö

È

Å ½ ÈÖÓ

××
Ú Ð

ÓÖ ×Ô Ñ
ÓÖ

Ò ×ÓÑ

¾

Ú Ø ÒÓ Ð

Ò ×Ô Ñ Ñ
Ð×Ø

¹Ñ

Ð

ÓÖ

Ð

Ñ

Ð ÑÙÐØ ÔÐ Ö Ø

Ö ×Ô Ñ

Ú

Ö Ø

Ó Ë ÑÓÒ× Ò¸

Ñ

× Ò ×ÝÒ Ð

Ñ

к Ë ÐÚ

Ú׺

Ð ××

Ò

Ø Ö

к º

Ö

ÒÓ Ð

Ø

Ñ

ÒØ ÐÐ Ø

ÅÓÞ ÐÐ

Ö

Ö ¸

ÓÖ

Ò

ÖÙ

ÖÚ

P r(spam)

Ö ÑÓ Ø
Ú Ð

Ø

ÐØ Ñ

Ú

Ð

× ÖÚ Ö ×

Ö

Ò ×ÓÑ
Ò Ö

×Ø
ÒÒ

Ò Ñ

×Ø

¹

Ø

ÐØ Ö

ÖÙ Ø

¹

P r(words)

Ö

ØÝÔ

Ä ×Ø ´Ê
º

ÆË ÓÔ×Ð

ĵ ¹
Ö Ñ

× Ò

к º ×Ô Ñ

Ð×Ø

ÐØ Ö Ø¸

Ö × Ò ×ÝÒ Ð

Ö ÑÓ

׺

Ò

Ú Ð
Ö×Ø ØÖ

Ö Ò

Ø

ÒÝØØ ×

¹Ñ

Ð
Ð

Òغ

×× ×× Òº

Ê

Ô

××
Ø

Ð× ×ÓÑ ×Ô Ñ¸
× ÑØ
Ð×

Ø ÙÒ

ÒÝØØ × Ó ×

ËÔ Ñ

Ò
× Ú

¹Ñ

Å Ò



ÓÖ

Ò ÓÖ Ø

P r(words|spam)

ÓÖ

ÐØ

Ò

ÐØ Ö Ò

Å ½ ÈÖÓ

ÒÒ

Ñ ØÓ

ÐØ Ö Ò × ÔÖÓ Ö ÑÑ Ø

ÒÝØØ × Ô

Ð × ÖÚ Ö Ò× Ô ×Ð × ÓÔ Ú

× ÖÚ Ö ×
Ð

Ò¸

Ò

ÆË

ÓÔ×Ð

62.242.216.110 ⇒ 110.216.242.62.relays.ordb.org
ÀÚ ×

ÆË ÓÔ×Ð

Ø ÐÝ

×

Ö

Ð Ú Ö

Ð Ú Ø Ö ÔÔÓÖØ Ö Ø
× ÑÔ Ð
Ö Ð Ý× ¸

Ö

×Ô ÑÑ Ö



Ö

Ú Ð

¹

Ñ

ØØ

ÒÒ

Ö ÔÐ

× Ø Ð

Ò

Ñ ØÓ

Á ÓÚ Ò×Ø

Ò

Ñ

Ö¸

Ú Ö

× Ö Ò

Ú Ð

ÓÚ Ò×Ø

Ò

ØØ

Ñ

Ø

Ö

Ö
Ø

××

Ñ ØÓ

Ð Ú

Ú ×ظ

¸

Ú Ð

Ê

××

Ñ

Ö

Ö

Ò

Ö

Ò

Ð× ÖÚ Ö׸ ×ÓÑ

ËÅÌÈ ÔÖÓØÓ ÓÐÐ Ò¸ ×ÓÑ
Ð Ñ

Ö

Ð ÖØ

Ø Ö Ú Ð

×× Ò× Ò
Ø

Ò

غ

Ö

× Ò

Ö

Ø

Ú׺

Ö×Ø

Ö Ò ÔÖ Ú

Ø ×Ô ÑÑ Ö
Ñ

Ð× ÖÚ Ö

Ö¸

Ö Ø Ô

ÒÓ

³ Òº

× Ò

Ñ ØÓ

Ö

Ò Ñ

¾½ ¾℄º

Ð×

Ð Ú Ö

Ø Ñ Ò

Ú ×

Ê

ÓÔÒ Ö Ñ Ò Ò ÑÐ

Ò

Ò

Ú Ð ÓÚ Ö ÓÐ
Ñ ØÓ

Ø

Ôº Á ÓÚ Ò×Ø

Ð× ÖÚ Ö

ÒÒ Ñ

Ù ÒÝØØ Ö

Ö× Ð¸

׸ Ú Ð

Ø ×

ÐÐ Ö×

Ð Ð ×Ø Ø¸
ÒÒ

ÙÒ Ð ×Ø Ö Ñ

Ò × Ò

× Ö Ú Ø

Ö

ÁÈ

Ú × Ù ÒÝØØ Öº

Ð Ò × Ò

Ò ´

×ÓÑ

ÐÐ

ÒÝØØ × Ø Ð ÔÓ×Ø ÓÚ Ö
Ò

Ò ÓÑØ ÐØ

× Ò Ø ×Ô Ñ Ö

ÒÝØØ Ø ÇÊ

Ø Ú Ð ×

Ò ØÙÖÐ

Ö ÝÐ ×Ø Ò

Ö

Ö × ÖÚ Ö Ò

Ö

Ú Ö

ÑÔ Ö ×Ô Ñ ½¼¼±º Å

Ø Ñ Ò Ò ÑØ
Ö ÑÙÐ

е

Ò ×Ô ÑÑ Ö¸

Ò
Ú Ð

Ø

غ

Å

Ò ×ÔÓÖ

Ò

ÃÁÅ
ÃÁÅ ´
Ø Ð

Ø Ú Ö

ÓÑ

Ò Ã Ý Á

Ö

× Ò

ÈÖ Ò ÔÔ Ø



× Ò



Ö

Ö × ÖÚ Ö Ò Ú

ÓÑ

Ò

Ý

Ö × ÖÚ Ö Ò Ó
Ö

× Ò

Öº Á
Ò

ÒØ

ÒÒ

×
×

Ö Ò Ú

Ö

Ð

Ð

Ò Ø

ÔÖ Ú Ø»Ó

Ò× Ó

Ò ×
Ò

ØØ ×
Ö

Ò ×

¹½µ ÓÚ Ö ÒÓ Ð

Ö¸

Ò ÓÐ
Ö Øº

Ò

Ù Ú

ÒØÐ

Ò

Ð Ø
Ð

×
Ó»

ÓÓ

ÖÝÔØ Ö Ò º

Ò
Ö

Ò ØÙÖ

Ò ÐÙ

Ð

ÒØÐ

Ò Ñ

Ð µ ×ÙÑ ´ ܺ ËÀ

× ÖÚ Ö Ò × ÐÚ Ú

Ö

Ö

Ø Ð Á

Ø Ö ×

¿

ÒØÐ

Ò

Ö

ÃÁÅ ×

Ò

Ò Ö Ø ´Ñ
Ù Ú Ð Ø
Ò

Æ˺
Ò ØÙÖ
× Ò

Ò
Ó

Ø ÓÒ

Ñ

Ð Ò×

Ö Ò× ÔÖ Ú Ø

Ö× ´×ÓÑ

Ì × ×Ô

Ò Ö Ò

Ð

¿℄ ×

× ×ÙÑÑ Ò

× Ò
Ð

Ö

ÖÓÑ
×

º

º½

Ì



Ò ×

Ø Ð

Æ Ö Ñ
Ò

Ð

Ð Ò ÑÓ Ø

ÓÔ



º½
ËÝÒØ

Ö

Ò

×

Ò ÑÓ Ø
× Ò

Ò
Ö



Ú

Ò

Ò Ö Ò

Ö

Ó

ÓÑ

Ö

Ð× Ò

Ò

ÒÒ

Ý ×

¹

ÒÓ

×

Ò ØÙÖ

Ð Ò¸
Ñ

Ø Ö Ú Ö

ÐÐ Ö×

Ð Ò

×

Ö

Ò ×ÙÑ

º
Ø ÓÒ

Ò ØÙÖ × Ö × Ð

Ò ØÙÖ

Ö

½¸

½ Ø Ð Ù Ö
Ò ×Ô

ÉÙ ÖÝ Ñ Ø Ó

ܺ

Ñ

Ú Ð

Ò Ò

ÐØ ×

¹

ØÝ

× Ö Ú Ø

ܺ Ö× ¹×

ËÀ

×Ø Ô

• Õ

Ö

× Ù

ºº Õ ºº ºº × ºº

ÃÁÅ ×

Ð ÓÖ ØÑ
×

×ÙѸ Ó

ÒØÐ

Ù Ú Ð Ø

ÔÔ Ò

ܺ

´

ÔÔ Ò

Ü

× ÑÔ Ðµ

ÐØ

Ö ÓÖ

Ö Ò× Ó

Ö

ÓÑ ÒÃ Ý¹Ë Ò ØÙÖ
ºº ºº
Ú

× Ò

Ø

Ö × ÖÚ Ö Òº

Ö Ñ ÓÚ Ö ÑÓ Ø

Ø Ð

Å ½ ÈÖÓ

Ò Ö ×ÙÑÑ Ò ÓÚ Ö

Ö × Ð Ú Ö × Ñ

Ò Ñ Ò Ñ Ð

Ø

Ö × ÖÚ Ö Ò ×Ð ×

Ö × ÖÚ Ö Ò Ù Ö

Ò Ú Ö

Ò ×

× Ò ÓÖ

Ó× ÑÓ Ø

Ø Ö

Ø ÖÙØ

Ì

ÓÖ

Ó

Ö ÑÓ Ø

ÀÚ × ×ÙÑÑ Ò

Ö × ×

×

Æ˸ ÑÓ Ø

Ö׸
Ö

Ó Ë ÑÓÒ× Ò¸

Ö

ºº

Ö

Ð

Ò

´ ÐÐ

Ø

Ò

Ö

Ð

ÒÝØØ × ÊË

¿℄µ
Ø

ØÝ

Ö

×ÙѺ À ÖÚ

Ð

Ö ×Ø Ò

Ö

Ø Ð
Ò ×

Ò Ö Ò » ÖÝÔØ Ö Ò º
Æ˸

Ð Ò

Ú׺

Ò Ó

ÒØÐ

Ò

Ð

ÒØ × Ú

Æ˺



Ö× Ö



Ò ×



Ò Ö

ÒÓÒ

Ø ÓÒ

ÓÖØÓÐ
Ø ÐÐ

Ö׺
Ö Ò

×ÙÑÑ Ò
ÓÖ

Ø

× ÑØ

ÐÐ

ÖÌ

¹

Ò

Ì Ö
ÓÖ

Ò

ÓÔ×Ð

Ø Ú Ð

º

Ú Ð

Ò

Ð Ú

Ø ÓÒ Ö¸

ÆË ÓÔ×Ð

× Ø Ð

×

Ú Ö

Ú Ð × ÐÚÓÑ

Ð

Ø

Ò

Ð Ú Ö

ÛÖ ÔÔ Ø

×

ÒÝØØ ×

Ö×

Ð ×Ð × ÓÔº

ÓÑ
Ú

Ò
Ð

ݺ
Ò

Ò

Ð ÓÖ ØÑ

ÒÓ Û×

Ö ÑÓ

Ö

Ø Ù Ö

Ò Ö Ø ÙÒ

Ø

Ó×Ø ¹Ø ØÜØ × Ð
ØÓÖ º
Ê ×ÙÐØ Ø Ø

Ò
Ó

××

Ò ÑÓ

ÓÖ Ø
Ø

×ÙÑ

Ö Ù Ú

Ö

Ö ÓÚ Ö
Ö

Ð Ò

×ÙÑÑ Ò Ñ

×Ø Ò

ÒÝØØ × Ø Ð
Ö× Ð Ò
Ø Ð

Ö

ÓÖ Ø

ÓÑ

×ÝÒØ

ÓÐ
Ñ

Ø

Ò

Ø Ð Á
Ð ×

ÔÔ Ò

Ì

Ð

Ú Ö

Ú Ö×

×Ô

׸ Ôغ

Ø ÓÒ ¿℄

Ò Ð × Ô
Ü

× ÑÑ

Ö

ÊË

ÒÒ

µº

ÒÝØØ ×
ØÝ

Ñ

Ô

Ö

Ö × ÐÚ

Ò
Ò

Ø

Ö

×Ô

Ð

Ò

Ò Øµ¸
Ñ

º

Ò
×

ÙÒ Ý ÓÖ

Ø Ú Ö

º

Ø Ú Ö

´ ÓÑ

° Ó×Ø ¹Ø ØÜØ Ø º ÓÑ Ò Ýº Ñ Ðº
ÓÑ
Ø º ÓÑ Ò Ýº Ñ Ðº
ÓÑ ×
Ö ÔØ Ú Ø ÜØ Ø ºº
ÀÚÓÖ

× ÑÔÐ

Ö Òº

´× Ð
ØÓÖµ × ÑØ
ØØ

º

Ø ×Ø Ò

Ö Ø Ñ
Ú Ö Ò
Ð Òº

Ð

ºº
¸

Ð Ó
ØÝÔ Ò ´

Ô ºº

Ú Ð

Ø

Ú Ö

Ò¹

Ö Ø

× ÑÔ Ð Ø

Ó Ë ÑÓÒ× Ò¸

Ë Ò
Ë Ò

» ËÈ



Ö Ñ Ö

Ö

Ö Å
ÖÓ×Ó Ø× Ñ ØÓ

× ÑÔ Ð

ÒÝØØ ×

ÖÝÔØÓ Ö

× Ò



Æ Ö
Ñ



Ò Ñ

Ò

Ö × ×

ÒØÐ

Ö

× Ò

Ö Ò× ÁÈ

Ö Ð ×Ø Ø

Ö

ËÈ

ËÓÑ

Ø ÖÙØ

Ö Ñ ÓÚ Ö ÑÓ Ø

Ò ×

Ò

Ø Ð
ÓÚ Ò×Ø

×× Ò× Ò

×ÓÑ × Ö ×

ÇÚ Ò×Ø

Ò

Ö
ÓÖ

Ð× Ò

ÓÖ Ð Ö Ò ¸
Ö Á

º

ØØ

Ò¸

Ñ

Ö ËÈ

Ö

ÔØ Ö × Ñ

Ð Ú

ÖÙ

´Ë Ò

Ò×

Ø

Ð Ò¸

Ë Ò

Ö ÔÓÐ
Ý

ÐÑ Ò

Ð

Ó¹

ÐÐ Ö×

ÖÁ

Ö Ñ ÛÓÖ µ

ÆË Ì

Ó

Å

Ö
ÓÖ

Ó×ØÒ Ñ

Ô

Ö

ØÝ

Ö Á

ÔÖ Ò

Ú Ð
Ö

Ø
Ø

Ú ×

Ö ÔÔÓÖØ Ö

ÓÑ

Ò

Å Ò

Ò

Ò Ó ×

ÓÖ

Ø

Ö × ËÈ

Ò
Ú Ø

×

Ð

Ò Ô

Ì Ö
ÓÖ ¸

Ø

ÁÈ

Ò

Ñ

Ö Ô

Òµº Å Ò
Ú × Ú

Ö ×× Ö

Ú׺

Ø

Ò
ÐÙ

Ú ×

ÓØÑ

Á
Ö
Ö

Ö

Ö

Ê

Ú

Ò

ÐÐ Ö

Ò Óѹ

×

Ö×

Ò Ô
ÐØ

Ô

℄ ÒÓØ Ø ÓÒ Ò Üº
º¼º¼¹¾

ÓÚ Ò×Ø

Ò

º

¸ Ú Ð

Ð ×Ý×Ø Ñ Ø

Ø

Ú Øº
ÁÈ

Ö ×× Ö

Ö ÓÚ Ö Ñ Ò

Ñ

Ö Ñ

Ð × ÖÚ Ö º

× Ù

Ö

Ö
ÓÖ ¸

Ò Ñ Ü Ñ Ð Ð

Ò

Ò

Ö Ñ Ò

×
Ö ÔØ Ú Ø ÜØ Ú ×Ô ½ Ò
ÐÙ
ØÝ

Ö

Ò Ø ´ Ú׺

Ö ÓÔ Ø Ð Ñ

¹ ÐÐ Ú
Ö Ö

× Ò

ÓÖØ

ÒØ ÖÚ ÐÐ Ø ½ ¾º½
Ø

Ö Üº

к
ÓÑ

Ö
ÓÖ

ÓÑ

Ò Ó ×

Ö × ÖÚ Ö Ò
и

ÐÐ
ÒÒ

Ö Ô
Ô

ÔØ Ö ×º ÀÚ ×

× Ö × Ð

Ò ËÈ
Ö

× Ò

Ò ×ÓÑ Üº

Ö
ÓÖ

ÐÐ

Ò ×Ó Ø

ÒÝØØ

ÓÑ

ÓØÑ Ðº
ÓÑ
ºº ÐÐ

ÐØ

º ÓÑ
Ö

Ò × ¸

Ö
ÓÖ

¸ Ô Ö Ò
ØÝ

ÑÜ ÔØÖ

Ñ ×Ø

Ø Ú

£ ÐÐ

Ö
ÓÖ ×

Ò

Ú × ÁÈ³× Ö Ú Ö×

º¼º¼»¾

ÇÚ Ò×Ø

Ö

Òº Ë ÑØ

× Ú

½ ¾º½

Ò

Ú Ð Ú

Ö ×× Ö¸ ×ÓÑ

×Ð × ÓÔ Ø Ð

Ö

ÓÖ

Ö

Ë Ò

Ö
ÓÖ

ÓÑ

× Ò

Ò

Ò Ù

Ò

ÁÈ

Ö

Ö
ÓÖ

Æ˺

Ó ± Ó×Ø ¹Ø ØÜØ
ÛÓÖÐ º
ÛÓÖÐ º
×
Ö ÔØ Ú Ø ÜØ Ú ×Ô ½

Ë Ò

Ö

Òº

Ø × ×

Ö
ÓÖ

Ö Ò

ÒÒ
Ö Ñ ÓÖ

Ü

Ì

Ø ÐØ

Ö Á

Ù

Æ˺

Ö × ÖÚ Ö Ò ËÈ

× Ò

Ÿ

ÁÈ Ò Ú

Ë Ò

Ö
ÓÖ

׸ ×Ð Ö ÑÓ Ø

ËÈ

Ö × Ô

ÔÖ Ò Ô

ËÈ

Ø Ñ

ÑÔ Ð×

Ö Ú Ö

Ø ÓÚ ÖÓÖ Ò

Ö Ô ×Ø Ö

Ú × ×

ÔÔ Ò

º

Ð × Ò

Ø Ð

ÃÁŸ

× Ò

ÀÚ ×

º½

Ò

Ö × ÖÚ Ö Ó



Ø

Ö Á

Ö Á

Ñ ØÓ

Å ½ ÈÖÓ

Ò

ÒÚ ×Ò Ò

Ö ×
Ò

Ð

´ ½¾

Ø Ð

ÒÝØØ ×º
ÝØ ×

×Ô ¹ º ÓØÑ

к
ÓÑ

×Ô ¹ º ÓØÑ Ðº
ÓÑ
Ö×
Ò ÓÐ

Ò Ø Ð
Ø Ð ¿℄µº

ØØ

Ö

ÚÓÖ
Ø Ì

Ö
Ì

Ó Ë ÑÓÒ× Ò¸

ÆÙÚ Ö Ò
ØÓ ÓÑØ ÐØ



Ñ



Ñ ØÓ

Ö

Ö Ô

к
ÓÑ

ÇÚ Ò×Ø

ÒÙÚ

ÒÝØØ Ö

Ö Ò

ÒÝØØ Ö

ÀÓØÑ

к
ÓÑ

Ò

Ø

×Ø ØÙ×

ÓÓº
ÓÑ



Å ½ ÈÖÓ

Ø

×ÔÙÒ Ø ÑÔÐ Ñ ÒØ Ö Ø

ÃÁÅ Ó

Ë Ò

Ö Á

Ó×

º

ÃÁź

ÒÝØØ Ö Ë Ò

Ö ÒÓ Ð

Ö Á

×Ø Ö×Ø

º

Ù

Ý

Ö

Ö Ø ×

¹Å

Ð

Ö ×× Öº

ÃÓÒ ÐÙ× ÓÒ
ÃÁÅ

Ö

Ò Ñ

Ö ÙÐ ÑÔ Ö
Ö×

Ø
ÓÖÑ

Ò Ö Ò »Ú Ö

Ñ Ö

Ú Ò Ö Ø Ñ ØÓ

Ò ÑÑ

ÓÑÔÐ

Ö Ò

Ø ×ÔÓÖ

Ò

Ë Ò

Ö

× ÖÚ Ö Ò
Ë Ò

Ø

Ö Á

ØÓ Ö

Ð

ÙÒ

¸ Ñ Ò

ÓÑ

Ö Ô

ÔÓÖØ ¾

Ø Ð

ÓÒØÖÓÐ Ô
Ö Ò

Ð×

Ñ

Ö Ú Ð Ú

Å Ô

Ö ÒØ
Ó
Ñ
Ò Ñ
Ý ×

Ö
Ò

ÓÑ
Ð

Ò

Ö Ú Ö
Ò

Ö

ÐØ Ö¸

Ó Ë ÑÓÒ× Ò

Ø Ò× Ø

Ú Ö

Ð ÓÚ Ö

Ö

×

Ö

Ø Ñ Ò

Ò

ÐØ

Ò Ó

ØØ
Ö× Ð

Ö ×Ô Ñ¹
Ø

ÓÑ

Ò

Ö

Ò

× Ò

Ö

Ö Ñ×

× ÖÚ Öº
Ò Ú Ö

ÒØÐ

Ö

Ö

ËÈ

Ö

Ö
ÓÖ

Ò

Ö

Òº
ÖÝÔ¹

Ø

ÖÙ

Ö

ÓÖ ×Ð

×

ص¸

ÓÑÔÐ

Ö

Ò

Ò

ÒÙÚ

ÒÝØØ
Ú ×

Ò

Ò

Ò

Ý ×

¸

Ö

Ò ÔÓÖØ

ÖÒ

ÒÝØØ Ö

Ø ËÈ

ÓÑ

Ö Ò

Ò

ÖÙ

Ø ÓÒ Ö¸

Ú Ø

× Ò ×ÝÒ Ð

Ð
ÓÖ

Ö

ÓÖ

Ò

Ò ØÙÖº

ÓÖØ

Ò

¸ × ÑØ Ð ×Ø Ö Ñ Ò

Ð Ú Ö

Ö ÒÓ

Ò

Ø º

Ø ×

Ö

Ö

¸ Ñ Ò Ñ ØÓ

Ö ÓÔ×Ø
Ö

¹Ñ

º

Ùº
Ö¸

Ö

Ö

ÓÖÖ

ÐÐ
Ò

×ÔÙÒ Ø

ÐÚ Ð

ÖÙÒ Ð

ÓÖ

Ö

Ö Ò Ñ

Ð

ÆË ÔÓ ×ÓÒ Ò

ÁÈ Ò Ú
Ø

Ö ×¸ × ÑØ

Ñ ØÓ
ÐØ Ö Ø ËÈ

¸

Ö Ò
ÓÖ

Ñ ØÓ
ÒÙÚ

× Ò

Ò Ú Ö

Ò

ÐÑ Ò

ÃÁŸ

Ò Ö

× Ò

× Ø Øµ¸ Ñ Ò ÓÑÚ Ò Ø

ÑÑ Ð

Ö ÓÚ Ö

Ú

´ÔÓÖØ

Ø

×

Ö

Ø Ð

× ÓÑÔÐ

× ÑÔ Ð Ñ ØÓ

Ö

× Ö

ÐÓØ

Ò ÙÐ ÑÔ

Ð Ð Ú
ÓÐ

Ø Ú Ö

ÓÖ ÓÐ

Ø

ÒÝØØ Ö

Ò Ñ Ö

Ö Ñ Ö

Ö

Ú ×

Ð ¸ ×ÓÑ ×
Ö Á

× Ø Ø ´

Ò

Ò ×ÔÓÖ ×º ÀÚ × Ñ Ò ×
ÔÖ Ú Ø

Ø Ð

Ý»Ë Ò

Ö Ø

Ö Á

Ò

׸

º

Ò

ÒØ Ò Ú

ÐÐ Ö× Ú Ð Ñ

Ð Ò

Ø Ñ Ò
Ò×
ÓÑ
Ð Ú

ÒÝØØ Ö

Ø×Ñ
Ò

Ý

ÙÒ

Ö×

××

Ý ×
Ñ

ÐÐ Ö Ë Ò
Ø

Ò

Ú ÐÐ
Ö Á
Ý ×

ÐØ Ö× × ÑÑ Ò
Ú

Ö ¸

Ú Ð
Ò

ÐØ Öº

Ò

Ø
ÓÖ

Ú ×

ÄÁÌÌ

Ê

Ó Ë ÑÓÒ× Ò¸

ÌÍÊ

Å ½ ÈÖÓ

Ø

Ä ØØ Ö ØÙÖ
½℄

ÒØ ¹È

¾℄ Ê

×

Ò

ÏÓÖ

Ò

¾½ ¹ ËÅÌÈ ÔÖÓØÓ
ÓÐ Ò ¹

ØÑÐ
¿℄ Á

Ì

´Ì
ÓÑ

Ö Ø¹
Ý ×

℄ Á



ÁÒØ ÖÒ Ø

Ò

×

ØØÔ »»Ö
º×ÙÒ× Ø º
Ò

Ö Ò

Ì ×

Ò ºÓÖ »
»Ö
»Ö ¾½º

ÓÖ µ

×Ô

Ò

Ò

Ý

ÐØ Ö ¹

¹

ØØÔ »» ÒºÛ

Ô

ºÓÖ »Û

»

Ý ×

Ò

Ì
×Ô
Ø ÓÒ
ÓÑ
ËÈ
¹
ØØÔ »»ÛÛÛº
ÒØ ÖÒ Ø¹ Ö Ø×» Ö Ø¹× Ð Øع×Ô ¹
Ð ××
¹¼¾ºØÜØ
Á

Ê ¹

ÊÓÙØ Ò
ÊÙØ

Ø ÓÒ

ØØÔ »»ÛÛÛº Ø ºÓÖ » ÒØ ÖÒ Ø¹ Ö
Ð Òݹ ÓÑ Ò Ý×¹ × ¹¼ ºØÜØ

ÓÑ



ØØÔ »»ÛÛÛº ÒØ Ô

ÖÓÙÔ ¹

ØØÔ »» ÒºÛ

Ô

ºÓÖ »Û

Ö Ñ ÓÖ ÑÓ Ø

Ø×»

ÐØ Ö
Ø ºÓÖ »

» Ð ××Ð ×× ÁÒØ Ö¹ ÓÑ Ò

Ð×

Ñ

ÐÑ

ÃÁÅ

Ó Ë ÑÓÒ× Ò¸

ÊÙØ

Ö Ñ ÓÖ ÑÓ Ø

Ð×

Ñ

ÐÑ

Å ½ ÈÖÓ

Ë Ò

Ø

Ö

Á

ÓÑ

Ò

Ý ×

Ò ØÙÖ

ÓÑ ÒÃ Ý¹Ë Ò ØÙÖ
Ö× ¹× ½ Õ Ò× ÒÓ Û× × Ø
Ñ Ðº
ÓÑ
Ö Ú Ñ ×× ¹
Ø ÖÓÑ ØÓ ×Ù
Ø Ñ Ñ ¹Ú Ö× ÓÒ
ÓÒØ ÒعØÝÔ
ØÀ ½Û¿ÂÀ Ì»ÁÆ ÆÕ À ý
ÁÄ Ã Ê ÖÌ ÍÕ ¿È ×Ù Á ÚÑ»ÁÅ Ý
ÜÏ Õ½ ÂÏÙÂ ÅÊ Ñ ½ Ú Ï ¾ Þ
¿Í ÆÅÔÈÊÁ ÈÜ ÝÒ
ÕÁÖ Ê ÒÙ ÁÒ Ç ¼Ð
ÙÄ Ú· Û »Ò ÙÒ¿ ·Ù×·ÆÃÑ
ÓÑ

Ò

Ý

° Ó×Ø ¹Ø ØÜØ Ø º
Ø º ÓÑ Ò Ýº Ñ
ËÁ ¿ É ÉÍ
Æ
ÃÂÆÐÉÃѽ¼ ØÅÜ È Æ
ÐÄ ÓÍÁÌÖ ÚÃ ÂÆÇÄ

ÆË Ö
ÓÖ

ÓÑ Ò Ýº Ñ Ðº
ÓÑ
к
ÓÑ ×
Ö ÔØ Ú Ø ÜØ Ø Ý
Ö×
Ô ÅÁ Å ¼ ËÕ
ÉÃ É ÌÍÊ Æ¿ÓÆ Þ· »Ñ¿ ÖØ È Ò×ÃÑΠͽ
Û¾ ÒÜ
ÙÌʽ
Ù ÕØÞѾÖÏÃ Ä ÅÂÕ ÓÉ
ÛÉÞ Ã½ÞÔ»Å
ÏÅ
Ø Ü ¾Ý»Ê À ×ÛÃÃÝÎ ËÈ Ò Ê× »Á Ö Ô ÙÉÁ É

Similar Documents

Free Essay

Russian Hackers Attack the White House

...| Russian hackers attack the white house | | | Michae haven | 4/27/2015 | | On April 8, 2015 CNN did a report on a security breach involving the white house and the state department. This attack was done allegedly by Russian hackers in an attempt to gain states secrets. The hackers had gained access to the state departments computers via a phishing email attack. The attack was found out by suspicious activity that was happening on the white house computers. This attack allowed them full access to the state department’s computers and eventually they were able to convince someone to give them access to the white house’s non classified systems where sensitive information like the presidents non-published schedule and other information. The state department had been battling the hackers for months on trying to keep the hackers out but with no success at doing so. The systems were taken off line in an attempt to purge the mal-ware that was installed that gave the access to the systems and for new security measures to be put into place to help prevent future attacks on the systems. (Prokupecz, 2015) The attack was done by using a phishing scam. The way this works is first someone sends a message to a user, in this case it was by an email, trying to convince the user that they are someone from inside their work place, representing an event from the work place, or represents themselves as a trusted source. They then get the user to click on a web link that takes...

Words: 891 - Pages: 4

Free Essay

Vut2 Task 1

...To: Boss From: Brandon Moore Date: August 1, 2011 Subject: Social Engineering Attack on the Company Recently several of our user's have reported slowness of their computers. Not coincidentally, each of these users had also received a suspicious email reporting a problem with a particular item on the company website. This email contained a URL which, upon clicking, directed the user to a page in which nothing appeared out of the ordinary. It is my conclusion that both these events are intertwined and the users have contracted a computer virus, specifically a Trojan virus, which allows this attacker to gain access to the computer systems it infects. The attacker was able to accomplish this by manipulating our employees into believing they had a legitimate issue to raise with the company. Once they clicked on the link in the email, they were likely directed to a site that appeared to look the same as the company’s website, or they were sent to another site which downloaded the virus and were quickly redirected to a legitimate page before the user would ever notice. Additionally, the email address that contained the malicious URL had a “made-up” email address configured as the “Reply-To” so that when a user attempted to reply the email would not get anywhere. In conclusion, the actions that ultimately took place are as follows: ← User's received an email that appeared to be legitimate, but instead came from an attacker looking to gain access into...

Words: 1096 - Pages: 5

Free Essay

Stormhoek Vineyards

...Resumen Del Caso Stormhoek Vineyards es un pequeño viñedo localizado en África del Sur. La compañía tuvo ventas anuales en el 2005 de solo $3 millones, sin embargo con la tecnología Web 2.0 las ventas aumentaron a $10 millones en el 2007 y proyectaban que iban a llegar a $30 millones en el 2010. La compañía ideo una campana de mercadeo llamada “100 Geek Dinners in 100 Days”. Cada cena iba a estar organizada por una persona. La cena se iba a usar para catar vinos por varias docenas de invitados en el Reino Unido y Estados Unidos. La pregunta que se hacían era como iban a conseguir 100 personas que organizaran una cena para catar vinos y como iban a conseguir que asistieran de 40 a 60 invitados a cada evento. La contestación a su pregunta fue la implementación de la tecnología Web 2.0. El plan de la compañía consistía en lo siguiente: • “Blogging”- El CEO de la compañía matriz de Stormhoek, Orbital Wines, en colaboración con Hugh Macleod, un muy conocido “blogger”, escribieron docenas de “blogs” sobre el evento, solicitándole a voluntarios que sirvieran de organizadores del evento. Entre las personas incluyeron a otros “bloggers” y a entusiastas de vino. • “Wiki”- Usando tecnología “wiki” le proveyeron a cada voluntario la información del contacto y localización. La tecnología “wiki” era principalmente usada para relaciones de gestión de clientes. Esta incluía caricaturas y otro tipo de promoción. • “Podcasts”- Usaron Web de contenido RSS para enviarle noticias y análisis...

Words: 1420 - Pages: 6

Free Essay

Sec 280 Week 4

...your information. There are techniques that these attackers use to access information on your system. Potential security threats start with people; people who create these threats are to blame. These people are called hackers and predators. Hackers and predators create security threats and malware. They are computer programmers who use these security threats and malware to victimize other people by breaking into their systems to steal, change or destroy information. This is known as cyber-terrorism. Due to these hackers and predators computers are vulnerable at any time. These people create things like. Computer virus threats, Spyware threats, Phishing threats, Internet Worms, Rootkit, Zombies, Browser Hijacker, Email Virus, Mousetrapping, Spam, and Adware. Out of all the computers security threats out there the most well known is computer virus threats. The virus is a program that alters how a computer operates. The virus replicates and executes itself, this usually does damage to your computer. Spyware threats are an undercover cop in a way because it monitors your online activity or it can install software without your permission to gain personal information. It does all that without you even knowing. Phishing threat is when a hacker attempts to steal information through email or instant messaging. They send emails or instant messages that look real to people or businesses. The hackers attempt to steal...

Words: 734 - Pages: 3

Free Essay

Developments in Hacking, Cybercrime and Malware

...decover information about the company and its personnel which usally comes from social networking sites and create special phishing email. SQL-injection attack.- malicious code designed to gather sensitive information from the network, easy access to the network and is web based Fragus,18 Eleonore,19 and Neosploit.20. come bundled with a variety of different exploits, including some exploits for older vulnerabilities. Because an older vulnerability is likely to be included, older vulnerabilities see a vast amount of exploitation, These exploit and attack kits are often frequently used in conjunction with some of the crimeware kits available in the underground, that don’t make it very hard to obtain mostly free of charge. Zeus kit use spam to lure users to a website that uses social engineering or that exploits a Web browser vulnerability to install the bot on a victim’s computer, mosly through remote access. Summary The above mentioned threats are important issues, the fact of the matter is people have their personal information in everything they do from education to bill paying. Everything is connected to our lives one way or another and must be protected at all cost, social networking sites like facebook do a very poor job at protecting the users information along with email sites such as yahoo and google even though they are making major changes in the security of the website. All these threats are evolving; the creators are getting more creative, these threats can...

Words: 314 - Pages: 2

Free Essay

Advantage and Disadvanatge of Modern Tec

...Unemployment With the advancement of technology business processes have become more streamlined. This creates job redundancy , downsizing and out sourcing For example: In a factory, skilled technicians and machinists can be replaced by computer-controlled robots which can work faster, for longer and more consistently Before a company employed many typist and now can be replaced by a sigle person with a word processor Privacy Though information technology made communication quicker , easier and more convient it also brought along privacy issues. From cell phone signal interception to email hacking . Microchip dust – also known as smart dust can be virtually embedded in everything that we buy, wear, drive and read, allowing retailers and law enforcement to track consumer items — and, by extension, consumers — wherever they go, from a distance. Overriding Cultures While ICT may have made the world a global village, it has also contributed to one culture consuming another weaker one. For example, it is now argued that teenagers in the US influence how most young teenagers all over the world now act, dress, and behave. Languages too have become overshadowed, with English becoming the primary mode of communication for business and everything else. Reliance on Technology People technology to remember things and less use of their own memory, the poorer it becomes People don’t bother learning to spell because they use spell-checker, or need a calculator do perform minor...

Words: 319 - Pages: 2

Premium Essay

Ndividual- Network Based Threat Research

...Individual: Network Based Threat Research There are so many people who are connected to network and with the passing time, the amount of people connected through network is increasing even more. As the network connectivity is increasing, the threats to security are also increasing. Network security and network-based threats are the most significant vulnerabilities that need to be maintained as it involves information, which is transferred between computers. There are several pieces of information, which is case sensitive and is vulnerable to outside attack. The network security is also exposed to hackers attack and is subject to various malicious threats that can endanger the sensitivity of information and pose a threat to network. The various network-based threats are pumped into the network all over the world and are a significant matter for consideration at the moment (Godbole, 2008). Network based threats There are various network-based threats some of which are explained below: * Viruses and Worms: Virus is a coded program or coded information that is transmitted or loaded into the computer unintentionally and run on the system. It exploits the system without the knowledge and wish of the system owner and can create huge damage and harm to the computer. Freezing or hanging of computer after opening a mail or coded information is an example of virus attack through network. The downloading of virus onto the computer system will affect the entire computer network...

Words: 789 - Pages: 4

Free Essay

Google Inc.

...Análisis Caso: Google Inc. Curso: Estrategia de Negocios Catedrático: Miguel Hernández Contents Introducción 3 Reseña Histórica 4 Entorno de la Industria 5 Productos y Competencia 7 Estrategia 8 Desempeño Financiero 10 Conclusiones 13 Bibliografía 14 Introducción Hablar de Google es hablar de un enfoque de negocio encaminado hacia el gana-gana en el cual los usuarios reciben un servicio gratuito y a la vez la información es utilizada para fines estadísticos con los cuales se pueden construir negociaciones con personas interesadas. Google ha demostrado ser una empresa pujante que se ha caracterizado por aprovechar la filosofía del internet encaminándola hacia servicios de utilidad y beneficio para personas interesadas, clientes o usuarios. Esta caso fue bastante motivante ya que al estudiar la evolución de Google también está involucrado el avance tecnológico de internet. Reseña Histórica Google es una empresa que nace en 1996 cuando Larry Page y Sergey Brin se unieron para desarrollar un buscador llamado BackRub con la capacidad de clasificar los sitios web por su relevancia determinando los links que previamente apuntaban a ese sitio, la popularidad de este buscador se dio por su exactitud en las búsquedas. Posteriormente en 1998 el cofundador de Yahoo, David Filo, convenció a Page y Brin para que se centraran en la creación de una empresa basada en la tecnología que ellos habían desarrollado para las búsquedas en internet. El buscador BackRub...

Words: 2696 - Pages: 11

Free Essay

Gameover Zeus & Cryptolocker

...thought that the Trojan infected between 500,000 and one million computers, and syphoning over 100 million dollars into the attackers accounts. Gameover ZeuS was a Trojan that created a botnet and also carried another payload with it, Cryptolocker. Cryptolocker was a type of ransomware that prompted users to enter personal information and money to “remove” the virus (Herman, n.d.). How did these two pieces of software work together to cause so much chaos? We have established that Gameover ZeuS is a botnet and Cryptolocker is a ransomware, but what exactly is a botnet and ransomware? A botnet is best described by Margaret Rouse (2012), “...a number of internet computer that, although their owners are unaware of it, have been set up to forward spam/viruses to other computers on the internet…” Her definition is a clear statement of what to expect from...

Words: 1335 - Pages: 6

Free Essay

Princiles of Security

...Matthew Quillman (username: matthew.quillman) Attempt 1 Written: Sep 20, 2015 4:55 PM - Sep 20, 2015 5:44 PM Submission View Question 1 2 / 2 points An overflowing of water into a data center can cause direct damage to all or part of the information system. A) True B) False Question 2 2 / 2 points A mail bomb is a form of DoS. A) True B) False Question 3 2 / 2 points A timing attack involves interception and analysis of cryptographic elements to determine keys and encryption algorithms. A) True B) False Question 4 2 / 2 points A firewall is a device that keeps certain kinds of network traffic out of a private network. A) True B) False Question 5 2 / 2 points Two watchdog organizations that investigate allegations of software abuse: SIIA and NSA. A) True B) False Question 6 2 / 2 points ____ is an integrated system of software, encryption methodologies, and legal agreements that can be used to support the entire information infrastructure of an organization. A) SSL B) PKI C) PKC D) SIS Question 7 2 / 2 points Acts of ____ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter. A) bypass B) nature C) trespass D) security Question 8 2 / 2 points There are generally two skill levels among hackers: expert and ____. A) novice ...

Words: 669 - Pages: 3

Premium Essay

Nt1330 Unit 3 Term Paper

...Question 1 What is a “honeypot”? Honeypot can be viewed as a technique or a specifically designed computer system intended to find out hackers or trap them and also to identify new techniques used for hacking. It is also designed to identify any nasty undertakings happening in internet. Question 2 What is “blackholing”? Blackholing can be considered as an internet security technique against spam. It’s performed by the Internet Service Provider (ISP) which blocks the packets coming from certain domain or address thereby can prevent any types of malware and attacks and can limit the volume of spam inflowing to the system. Question 3 What is “air-gap security”? Air-gap security can be viewed as security measure for both...

Words: 1716 - Pages: 7

Free Essay

Business

...Reclamos - Consulte esta guía para aprender cómo usted puede asegurarse de que sus actividades de promoción son veraces y engañosos no. Las áreas cubiertas incluyen el uso de anotaciones en su comercialización, la publicidad dirigida a los niños, "Made in USA" etiquetas y la salud y reclamaciones ambientales. Guías para la Industria - La FTC tiene algunas reglas y guías de cumplimiento para industrias específicas, incluyendo franquicias, bienes raíces, fabricantes de ropa, entre otros. Echa un vistazo a esta guía para obtener información sobre las leyes que puedan afectar a su sector o tipo de negocio. Telemarketing - Aprende el National Do Not Call Registry y otras leyes impacto en sus esfuerzos de telemarketing y la forma de cumplirlas. SPAM E-mail - Planificación de una campaña de correo electrónico? La ley es muy específica sobre lo de correo electrónico que puede enviar ya quién. Más información en esta guía....

Words: 322 - Pages: 2

Premium Essay

Ahmed

...Question: Describe the following types of attacks. a) Computer virus A computer virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected". b) Worm A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.[1] Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program.[2] Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer. c) Trojan horse A Trojan horse, or Trojan, in computing is a non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm. A Trojan often acts as a backdoor, contacting a controller which can then have unauthorized access to the affected computer.[6] The Trojan and backdoors are not themselves easily detectable, but if they carry out significant computing or communications activity may cause the computer to run noticeably slowly. d) DOS DoS ( denial-of-service...

Words: 729 - Pages: 3

Free Essay

Bis 220 Week 2 Team Summary

...Summary of what I have learned from the previous weeks objectives. I consider myself to be somewhat knowledgeable about Information Technology, but after reading the assignment I now realize that my knowledge of IT is minimal. I’ve learned what the difference between IT Infrastructure and IT Architecture is. I always assumed that everything computer related fell under Information Technology. What I learned the most was the proper terminology for certain IT components the functions of hardware and software and what comprises and Computer Based Information System. We have all experienced a virus on our computer at one time or another and have heard the technical term “Trojan Horse”, but I never new there were so many other types of malicious software and scams. “Pharming, Phishing, logic bombs, etc” some of these were new to me. The “Cloud” I always wondered what the heck the cloud was, I had visions of my information floating around in the air and some how it was pulled down when I needed to have access to it. I didn’t know that there is such a thing as a server farm. I know there are servers but never realized that there were actual buildings exclusively for servers. As a small business owner If found information in Chapter 2 that intrigued me and will research some more; the five strategies to achieve a competitive advantage. I have been looking of ways to improve my business and bring it to the cutting edge. I found this information useful and as I mentioned...

Words: 269 - Pages: 2

Free Essay

Appreciate

...I’m an outgoing high school student whom resides in Austin Minnesota, home town of Hormel and its most famous SPAM. As anyone can tell you,I am known by my super friendly personality, never quite attitude and selflessness. I am passionate about everything I decide to participate in and I am determined to learn & grow to be the best Ms. Junior Teen Minnesota ever. I happily accepted to participate in this great experience knowing it will teach me lifelong skills to be successful in my career and in life. Besides trophies and winning prizes, scholarships, cash and awards, I will gain self-confidence to face the public, courage to tackle life's trials as well as a positive self-image. I feel the whole N.A.M. experience will assist me in developing and expanding on ideas about who I am and what I want to achieve in life. My participation in this pageant will give me a competitive career edge for succeed later in whatever path I may choose. I look forward to creating memories that will last a lifetime and it is very likely I will meet friends that will be cherished for years to come! I am very excited and ready to have fun while building valuable life skills! All we ask for is 48$, if you donate more it would be greatly appreciated. Please, support me and my dreams of being a winner.Your sponsorship in this rare opportunity REVs UP excitement and gives energy to my goal of a State Crowning and a National Pageant invitation. We will be listing all sponsors in conjunction with all...

Words: 292 - Pages: 2