Bảo mật hệ thống mạng part 1 potx

Bảo mật hệ thống mạng part 1 potx

Bảo mật hệ thống mạng part 1 potx

... in- cluded the German Green Book in 19 89, the Canadian Criteria in 19 90, the Information Technology Security Evaluation Criteria (ITSEC) in 19 91, and the Federal Criteria in 19 92. Each of these efforts ... encrypted form. In the 19 50s, it was learned that access to messages could be achieved by looking at the electronic signals coming over phone lines (see Figure 1- 2). Figure 1-...
Ngày tải lên : 02/07/2014, 18:20
  • 10
  • 377
  • 0
Bảo mật hệ thống mạng part 11 potx

Bảo mật hệ thống mạng part 11 potx

... this part of the procedure is to identify the organiza - tion’s objectives before an incident occurs. Event Identification The identification of an incident is perhaps the most difficult part ... Beginner’s Guide Chapter 5: Policy 71 NOTE: It is never a good idea to retaliate. This may be an illegal act and is not recommended in any situation. Authority An important part of the IRP is...
Ngày tải lên : 02/07/2014, 18:20
  • 7
  • 261
  • 0
Bảo mật hệ thống mạng part 15 potx

Bảo mật hệ thống mạng part 15 potx

... useful. However, we may not necessarily have knowledge of a directed or specific threat against some part of the organization. If we assume a generic threat (somebody probably has the access, knowledge, ... or replace systems ■ Cost of experts to assist ▲ Employee overtime As you can see from just this partial list, the costs of a successful penetration can be large. Some of these costs wil...
Ngày tải lên : 02/07/2014, 18:20
  • 7
  • 255
  • 0
Bảo mật hệ thống mạng part 22 potx

Bảo mật hệ thống mạng part 22 potx

... (ports 21 and 22) Allows employee to transfer files Telnet (port 23) and SSH (port 22) Allows employees to create interactive sessions on remote systems POP-3 (port 11 0) and IMAP (port 14 3) Allows ... password). If some content on the site is restricted or 13 4 Network Security: A Beginner’s Guide CHAPTER 9 Internet Architecture 13 3 Copyright 20 01 The McGraw-Hill Companies, Inc. Cli...
Ngày tải lên : 02/07/2014, 18:20
  • 6
  • 260
  • 0
Bảo mật hệ thống mạng part 26 potx

Bảo mật hệ thống mạng part 26 potx

... addresses: ▼ 10 .0.0.0 – 10 .255.255.255 (10 .0.0.0 with an 8-bit mask) ■ 17 2 .16 .0.0 – 17 2. 31. 255.255 (17 2 .16 .0.0 with a 12 -bit mask) ▲ 19 2 .16 8.0.0 – 19 2 .16 8.255.255 (19 2 .16 8.0.0 with a 16 -bit mask) The ... Architecture 16 5 Rule Number Source IP Destination IP Service Action 1 Partner network Partner DMZ Appropriate for partnership Accept 2 Partner network Any...
Ngày tải lên : 02/07/2014, 18:20
  • 8
  • 134
  • 0
Bảo mật hệ thống mạng part 27 potx

Bảo mật hệ thống mạng part 27 potx

... two sites. The two Chapter 10 : Virtual Private Networks 17 3 Figure 10 -4. Site-to-site VPN across the Internet CHAPTER 10 Virtual Private Networks 16 7 Copyright 20 01 The McGraw-Hill Companies, ... each is distinct from the others and separated by the encryption. Chapter 10 : Virtual Private Networks 16 9 Figure 10 -1. VPNs handle multiple protocols simpler but administrators mu...
Ngày tải lên : 02/07/2014, 18:20
  • 7
  • 219
  • 0
Bảo mật hệ thống mạng part 29 potx

Bảo mật hệ thống mạng part 29 potx

... the past but that may now be performed cheaper. A 18 2 Network Security: A Beginner’s Guide CHAPTER 11 E-Commerce Security Needs 18 1 Copyright 20 01 The McGraw-Hill Companies, Inc. Click Here for ... account when e-commerce is discussed. That is availability. No longer is the Chapter 11 : E-Commerce Security Needs 18 3 18 4 Network Security: A Beginner’s Guide Web site just for infor...
Ngày tải lên : 02/07/2014, 18:20
  • 5
  • 173
  • 0
Bảo mật hệ thống mạng part 30 potx

Bảo mật hệ thống mạng part 30 potx

... Chapter 11 : E-Commerce Security Needs 18 9 CLIENT-SIDE SECURITY Client-side security deals with the security from the customer’s desktop system to the e-commerce server. This part of the system ... customer’s computer and browser software and the communications link to the server (see Figure 11 -1) . Within this part of the system, we have several issues: ▼ The protection of informati...
Ngày tải lên : 02/07/2014, 18:20
  • 8
  • 283
  • 0
Bảo mật hệ thống mạng part 50 potx

Bảo mật hệ thống mạng part 50 potx

... analysis continues for some period of time after the information gathering is com - plete. During this part of the task, the team will attempt to assimilate all of the informa - 346 Network Security: ... gathered and to rank the risks to the organization. Measuring the risk is often the most difficult part of this task as the cost of a successful exploitation of a vulner - ability may be...
Ngày tải lên : 02/07/2014, 18:20
  • 5
  • 224
  • 0
Bảo mật hệ thống mạng part 2 ppsx

Bảo mật hệ thống mạng part 2 ppsx

... door. Chapter 1: What Is Information Security? 13 CHAPTER 2 Types of Attacks 15 Copyright 20 01 The McGraw-Hill Companies, Inc. Click Here for Terms of Use. This page intentionally left blank. Chapter 1: ... on a conversation that they are not a part of, that is eavesdrop - ping. To gain unauthorized access to information, an attacker must position himself at a 16 Network Security:...
Ngày tải lên : 02/07/2014, 18:20
  • 9
  • 322
  • 0

Xem thêm

Từ khóa: