Bảo mật hệ thống mạng part 2 ppsx

Bảo mật hệ thống mạng part 2 ppsx

Bảo mật hệ thống mạng part 2 ppsx

... employee, he may have access to rooms or offices that hold filing cabinets. Desk file draw - Figure 2- 2. Eavesdropping B ad things can happen to an organization’s information or computer systems in many ... of through the front door. Chapter 1: What Is Information Security? 13 CHAPTER 2 Types of Attacks 15 Copyright 20 01 The McGraw-Hill Companies, Inc. Click Here for Terms of Use. This...
Ngày tải lên : 02/07/2014, 18:20
  • 9
  • 322
  • 0
Bảo mật hệ thống mạng part 5 ppsx

Bảo mật hệ thống mạng part 5 ppsx

... CHAPTER 3 Information Security Services 27 Copyright 20 01 The McGraw-Hill Companies, Inc. Click Here for Terms of Use. CDs, and so on). Second, ... the copies to interested parties makes it difficult to successfully change all of the documents at the same time. Chapter 3: Information Security Services 31 Figure 3 -2. Encryption coupled with ... and au- thentication must be used to determ...
Ngày tải lên : 02/07/2014, 18:20
  • 7
  • 276
  • 0
Bảo mật hệ thống mạng part 6 ppsx

Bảo mật hệ thống mạng part 6 ppsx

... or a network within the control of the organization. What if the file is to be copied to other parties or organizations? In this case, it is clear that the access controls on a single computer ... unauthorized change has been made to the file. That mechanism is a digital signature (see Chapter 12 for more detail on digital signatures). A digital signature on a file can identify if the file ....
Ngày tải lên : 02/07/2014, 18:20
  • 8
  • 286
  • 0
Bảo mật hệ thống mạng part 44 ppsx

Bảo mật hệ thống mạng part 44 ppsx

... to get the message to display the way you want it to. 29 2 Network Security: A Beginner’s Guide Chapter 15: Unix Security Issues 28 9 #rusersd /2- 3 tli rpc/datagram_v,circuit_v wait root /usr/lib/netsvc/rusers/rpc.rusersd ... files: hosts.allow: #Allow telnets from my internal network (10.1.1.x) in.telnet: 10.1.1.0 /25 5 .25 5 .25 5.0 #Allow ftp from the world in.ftpd: 0.0.0.0/0.0.0.0 host...
Ngày tải lên : 02/07/2014, 18:20
  • 13
  • 266
  • 0
Bảo mật hệ thống mạng part 52 ppsx

Bảo mật hệ thống mạng part 52 ppsx

... advisories were about problems on Unix systems. It was not until 19 92 that a CERT advisory men - tioned Windows systems (CA- 92. 02) . This advisory was not about attacks against Win - dows systems ... large portions of the Internet. Has any Windows virus done that? And just recently (late 20 00, early 20 01), the Ramen worm made an ap - pearance. This worm was capable of scanning target...
Ngày tải lên : 02/07/2014, 18:20
  • 8
  • 168
  • 0
Bảo mật hệ thống mạng part 1 potx

Bảo mật hệ thống mạng part 1 potx

... modeling eventually lead to United States Department of Defense Standard 520 0 .28 , The Trusted Computing System Evaluation Criteria (TCSEC, also Figure 1 -2. Electronic signals bypass encryption This ... Minimal Protection or Unrated C1 Discretionary Security Protection C2 Controlled Access Protection B1 Labeled Security Protection B2 Structured Protection B3 Security Domains A1 Verified D...
Ngày tải lên : 02/07/2014, 18:20
  • 10
  • 377
  • 0
Bảo mật hệ thống mạng part ppt

Bảo mật hệ thống mạng part ppt

... off-site Information on paper in the office Mainframe Figure 2- 1. Places where access attacks can occur CHAPTER 2 Types of Attacks 15 Copyright 20 01 The McGraw-Hill Companies, Inc. Click Here for Terms ... on a system or if the attacker is allowed to connect her own system to the network (see Figure 2- 2). Sniffers can be configured to capture any information that travels over the netw...
Ngày tải lên : 02/07/2014, 18:20
  • 7
  • 333
  • 0
Bảo mật hệ thống mạng part 4 pps

Bảo mật hệ thống mạng part 4 pps

... the electronic mail system to verify the identity of the sender. Chapter 2: Types of Attacks 25 Chapter 2: Types of Attacks 21 MODIFICATION ATTACKS A modification attack is an attempt to modify ... just that it is much easier to conduct a DoS attack in the electronic world. Chapter 2: Types of Attacks 23 Information on Paper Information that is physically stored on paper is subject t...
Ngày tải lên : 02/07/2014, 18:20
  • 7
  • 264
  • 0
Bảo mật hệ thống mạng part 7 pps

Bảo mật hệ thống mạng part 7 pps

... them, that action is allowed under this law. Access to Electronic Information (18 US Code 27 01) 18 US Code 27 01 prohibits unlawful access to stored communications but it also prohibits preventing ... defines the crime as the intentional access of a computer without authorization to do so. A second part of the statute adds that the individual accessing the computer has to obtain informat...
Ngày tải lên : 02/07/2014, 18:20
  • 5
  • 257
  • 0
Bảo mật hệ thống mạng part 8 ppt

Bảo mật hệ thống mạng part 8 ppt

... crime is an area of continued research and develop - ment. If you have specific questions about a particular statute, consult your organiza - tion’s general counsel or local law enforcement. Chapter
Ngày tải lên : 02/07/2014, 18:20
  • 6
  • 315
  • 0