Thư viện đồ án, luận văn, tiểu luận, luận án tốt nghiệp, thạc sĩ, tiến sĩ, cao học
Firewalls Hardware or software devices that provides a means of securing a computer or network from unwanted intrusion • Dedicated physical device that protects network from intrusion • Software feature added to a router, switch, or other device that prevents traffic to or from part of a network Three firewall technolog Packet filteri...
76 trang | Chia sẻ: candy98 | Ngày: 27/11/2020 | Lượt xem: 905 | Lượt tải: 0
Protect e-mail systems List World Wide Web vulnerabilities Secure Web communications Secure instant messaging Protecting E-Mail Systems E-mail has replaced the fax machine as the primary communication tool for businesses Has also become a prime target of attackers and must be protected Use two Transmission Control Protocol/Interne...
48 trang | Chia sẻ: candy98 | Ngày: 27/11/2020 | Lượt xem: 919 | Lượt tải: 0
Wireless Application Protocol (WAP) Provides standard way to transmit, format, and display Internet data for devices such as cell phones A WAP cell phone runs a microbrowser that uses Wireless Markup Language (WML) instead of HTML • WML is designed to display text-based Web content on the small screen of a cell phone • Because the Intern...
20 trang | Chia sẻ: candy98 | Ngày: 27/11/2020 | Lượt xem: 783 | Lượt tải: 0
Users needing access to networks from remote locations is increasing, along with the associated security issues. The need to identify who is trying to access a specific port on a network has lead to the development of the 802.1x standard. Users needing access to networks from remote locations is increasing, along with the associated secur...
54 trang | Chia sẻ: candy98 | Ngày: 27/11/2020 | Lượt xem: 915 | Lượt tải: 0
an ninh máy tính: tập hợp các công cụ được thiết kế để bảo vệ dữ liệu và chống hackers an ninh mạng: các phương tiện bảo vệ dữ liệu khi truyền chúng an ninh Internet: các phương tiện bảo vệ dữ liệu khi truyền chúng trên tập các mạng liên kết với nhau
27 trang | Chia sẻ: candy98 | Ngày: 27/11/2020 | Lượt xem: 1101 | Lượt tải: 1
Man-in-the-Middle Applications Web spoofing TCP session hijacking Information theft Other attacks (denial-of-service attacks, corruption of transmitted data, traffic analysis to gain information about victim’s network) ARP poisoning (Hunt) ICMP redirects – Router sends redirect packet to host, saying a better route exists for certa...
43 trang | Chia sẻ: candy98 | Ngày: 27/11/2020 | Lượt xem: 969 | Lượt tải: 0
Many organizations base access control decisions on “the roles that individual users take on as part of the organization”. They prefer to centrally control and maintain access rights that reflect the organization’s protection guidelines. With RBAC, role-permission relationships can be predefined, which makes it simple to assign users to the prede...
22 trang | Chia sẻ: candy98 | Ngày: 27/11/2020 | Lượt xem: 1227 | Lượt tải: 0
The web is becoming the main informaiton dissemination means for many organizations Strong need for models and mechanisms enabling the specification and enforcement of security policies for web data protection and release In the web environment, information distribution often takes the form of documents that are made available at Web servers, or...
66 trang | Chia sẻ: candy98 | Ngày: 27/11/2020 | Lượt xem: 1010 | Lượt tải: 0
Injection attacks trick an application into including unintended commands in the data send to an interpreter. Interpreters Interpret strings as commands. Ex: SQL, shell (cmd.exe, bash), LDAP, XPath Key Idea Input data from the application is executed as code by the interpreter. App sends form to user. Attacker submits form with SQL exploit d...
37 trang | Chia sẻ: candy98 | Ngày: 27/11/2020 | Lượt xem: 1484 | Lượt tải: 0
Several types of activities: Application activities: SQL statements issued against application tables Administration activities: commands issued for maintenance and administrative purposes Database events: events that occur when a specific activity occurs Audit program provides: Audit trail for all activities Opportunity for using process con...
46 trang | Chia sẻ: candy98 | Ngày: 27/11/2020 | Lượt xem: 1092 | Lượt tải: 0