Network Defense Fundamentals

Beschreibung

Networking Security (Network Defense Fundamentals) Notiz am Network Defense Fundamentals, erstellt von junhan- am 02/06/2014.
junhan-
Notiz von junhan-, aktualisiert more than 1 year ago
junhan-
Erstellt von junhan- vor fast 10 Jahre
430
0

Zusammenfassung der Ressource

Seite 1

1st Attacker: HackersHackers attempts to gain access to unauthorized resources such as Circumventing password, firewall and other security measures. 

2nd Attacker: Disgruntled EmployeesMotives:Disgruntled Employees are usually unhappy over perceived injustices. Stealing information confidentially and give to new employees.Prevention:In order to stop them, security measures are to be taken when they are terminated.

3rd Attacker: Terrorists4 reason Terrorists attack Computer System:1) Making political statement2) Achieving political goal3) Causing damage to critical systems4) Disrupting a target's financial stability 

4th Attacker: Government OperationsKnown as Spy Techniques.

1st Attack: Malicious CodeMalicious Code are Malware that uses system's well known vulnerabilities to spread.

2nd Attack: VirusesViruses are executable codes that copies itself to another location. It can be benign or harmful.The methods of spreading by:1) Running executable codes2) Sharing disk or memory sticks3) Opening email attachments4) Accessing infected web pages

3rd Attack: WormsWorms are viruses that create files  that copy themselves and consumes disk space. A Worms does not need a user intervention to be launched. Some worms installs "back doors" to gain unauthorized access to computer or other devices. Some worms also can corrupt and destroy data disk.  

4th Attack: Trojan horsingTrojans are harmful programs that appears to be something useful, it can create "back doors" for additional attacks.

Overview of "THREATS" to Network Security:- Security Problems   1) Network intrusions   2) Loss of Data   3) Loss of Privacy- Businesses must actively address information Security

"THREATS to Network Security"Knowing the types of attackers helps us to anticipate any types of intrusions.Why does attackers breaks into system?4 Motivation made them do so:1) Status2) Revenge3) Financial Gain4) Industrial Espionage

5th Attack: Macro VirusesMacro Viruses are scripts that automates repetitive task in Microsoft Word or similar application. Macro Virus runs a series of action automatically that tend to be harmful.

6th Attack: Social Engineering: The people factorAttackers try to gain access to resources through people.Employees are tricked to give out password or other type of codes.

Types of aTTACKERs (HEROeS)

Types of ATTACKs (Skills)

introduction

Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

Einstufungstest Französisch B1.2
SprachschuleAktiv
Öff. Recht - Streitigkeiten Verwaltungsrecht AT
myJurazone
Säure-Basen- Theorie
elham_riefaie
Sowjetische Expansion & Eindämmungspolitik der USA
Laura Overhoff
Karteikarten Angewandte Sozialpsychologie
Sarah Rettätsfro
Einführung in das wissenschaftliche Arbeiten
Flo Ma
WERB Univie (mögliche Fragen)
frau planlos
Fachbegriffe für den Sprachunterricht
Stefan Kurtenbach
Pädagogik Abitur 2016: Freud
Lena S.
BAS 7 - Schwimmen, Turnen, Leichtathletik
B G