tailieunhanh - Lecture Information systems security - Chapter 2: Identifying potential risks

After studying this chapter you should be able to differentiate among various systems’ security threats: Privilege escalation, virus, Worm, Trojan, Spyware, Spam, Adware, Rootkits, Botnets, Logic bomb,. For further information, inviting you to refer lecture. | Identifying Potential Risks Contents Differentiate among various systems’ security threats: Privilege escalation Virus Worm Trojan Spyware Spam Adware Rootkits Botnets Logic bomb 3 4 5 6 7 8 9 10 11 Contents Implement security applications. Differentiate between the different ports and protocols, their respective threats and mitigation techniques. Antiquated protocols TCP/IP hijacking Null sessions Spoofing Man-in-the-middle Replay DoS DDoS Domain Name Kiting DNS poisoning Contents Explain the vulnerabilities and mitigations associated with network devices. Privilege escalation Weak passwords Back doors DoS Carry out vulnerability assessments using common tools. Vulnerability scanners Password crackers Index Attack Strategies Recognizing Common Attacks Identifying TCP/IP Security Concerns Understanding Software Exploitation Surviving Malicious Code Other Attacks and Frauds Attack Strategies Access attack, someone who should not be able to wants to access your resources. Its purpose is to gain access to information that the attacker isn’t authorized to have Modification and repudiation attack, someone wants to modify information in your systems Denial-of-service (DoS) attack Access Attack Types Eavesdropping Eavesdropping is the process of listening in on or overhearing parts of a conversation, including listening in on your network traffic This type of attack is generally passive Snooping Occurs when someone looks through your files hoping to find something interesting The files may be either electronic or on paper Access Attack Types Interception can be either an active or a passive process Intercept (v): to stop something or someone that is going from one place to another before they get there In a networked environment, a passive interception would involve someone who routinely monitors network traffic. Active interception might include putting a computer system between the sender and receiver to capture information as it’s sent. The process is usually covert. . | Identifying Potential Risks Contents Differentiate among various systems’ security threats: Privilege escalation Virus Worm Trojan Spyware Spam Adware Rootkits Botnets Logic bomb 3 4 5 6 7 8 9 10 11 Contents Implement security applications. Differentiate between the different ports and protocols, their respective threats and mitigation techniques. Antiquated protocols TCP/IP hijacking Null sessions Spoofing Man-in-the-middle Replay DoS DDoS Domain Name Kiting DNS poisoning Contents Explain the vulnerabilities and mitigations associated with network devices. Privilege escalation Weak passwords Back doors DoS Carry out vulnerability assessments using common tools. Vulnerability scanners Password crackers Index Attack Strategies Recognizing Common Attacks Identifying TCP/IP Security Concerns Understanding Software Exploitation Surviving Malicious Code Other Attacks and Frauds Attack Strategies Access attack, someone who should not be able to wants to access your resources. Its purpose is

crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.