Professional Documents
Culture Documents
Security and Ethics: Understanding Operating Systems, Fourth Edition
Security and Ethics: Understanding Operating Systems, Fourth Edition
Figure 11.4: (a) Uninfected file; (b) file infected with a virus; (c) a
Trojan horse or worm consists entirely of malicious code
• Packet filtering:
– Firewall reviews header information for incoming and
outgoing Internet packets to verify authenticity of
source address, destination address, and protocol
• Proxy server:
– Hides important network information from outsiders
by making network server invisible
– Determines if request for access to the network is
valid
– Proxy servers are invisible to users but are critical to
the success of the firewall
• Biometrics:
– The science and technology of identifying individuals
based on unique biological characteristics of each
person
– Current research focuses on
• Analysis of the human face, fingerprints, hand
measurements, iris/retina, and voice prints
– Positively identifies the person being scanned
– Critical factor is reducing the margin of error
– Presently, biometric authentication is expensive