• Security + Certification - Chapter 7: Security Administration for the System - AthenaSecurity + Certification - Chapter 7: Security Administration for the System - Athena

    Firewalls  Hardware or software devices that provides a means of securing a computer or network from unwanted intrusion • Dedicated physical device that protects network from intrusion • Software feature added to a router, switch, or other device that prevents traffic to or from part of a network Three firewall technolog  Packet filteri...

    pdf76 trang | Chia sẻ: candy98 | Ngày: 27/11/2020 | Lượt xem: 905 | Lượt tải: 0

  • Security + Certification - Chapter 6: Email and Web Security - AthenaSecurity + Certification - Chapter 6: Email and Web Security - Athena

    Protect e-mail systems  List World Wide Web vulnerabilities  Secure Web communications  Secure instant messaging Protecting E-Mail Systems E-mail has replaced the fax machine as the primary communication tool for businesses  Has also become a prime target of attackers and must be protected Use two Transmission Control Protocol/Interne...

    pdf48 trang | Chia sẻ: candy98 | Ngày: 27/11/2020 | Lượt xem: 919 | Lượt tải: 0

  • Security + Certification - Chapter 5: Wireless Security - AthenaSecurity + Certification - Chapter 5: Wireless Security - Athena

    Wireless Application Protocol (WAP) Provides standard way to transmit, format, and display Internet data for devices such as cell phones  A WAP cell phone runs a microbrowser that uses Wireless Markup Language (WML) instead of HTML • WML is designed to display text-based Web content on the small screen of a cell phone • Because the Intern...

    pdf20 trang | Chia sẻ: candy98 | Ngày: 27/11/2020 | Lượt xem: 783 | Lượt tải: 0

  • Security + Certification - Chapter 4: Remote Access - AthenaSecurity + Certification - Chapter 4: Remote Access - Athena

    Users needing access to networks from remote locations is increasing, along with the associated security issues.  The need to identify who is trying to access a specific port on a network has lead to the development of the 802.1x standard. Users needing access to networks from remote locations is increasing, along with the associated secur...

    pdf54 trang | Chia sẻ: candy98 | Ngày: 27/11/2020 | Lượt xem: 915 | Lượt tải: 0

  • Bài giảng Mã hóa và an ninh mạng - Chương 1: Mở đầuBài giảng Mã hóa và an ninh mạng - Chương 1: Mở đầu

    an ninh máy tính: tập hợp các công cụ được thiết kế để bảo vệ dữ liệu và chống hackers  an ninh mạng: các phương tiện bảo vệ dữ liệu khi truyền chúng  an ninh Internet: các phương tiện bảo vệ dữ liệu khi truyền chúng trên tập các mạng liên kết với nhau

    pdf27 trang | Chia sẻ: candy98 | Ngày: 27/11/2020 | Lượt xem: 1101 | Lượt tải: 1

  • Security + Certification - Chapper 3: Attacks and Malicious Code Part 2- AthenaSecurity + Certification - Chapper 3: Attacks and Malicious Code Part 2- Athena

    Man-in-the-Middle Applications Web spoofing  TCP session hijacking  Information theft  Other attacks (denial-of-service attacks, corruption of transmitted data, traffic analysis to gain information about victim’s network) ARP poisoning (Hunt)  ICMP redirects – Router sends redirect packet to host, saying a better route exists for certa...

    pdf43 trang | Chia sẻ: candy98 | Ngày: 27/11/2020 | Lượt xem: 969 | Lượt tải: 0

  • Bài giảng Bảo mật CSDL - Chap 5: Access Control Role-based models RBACBài giảng Bảo mật CSDL - Chap 5: Access Control Role-based models RBAC

    Many organizations base access control decisions on “the roles that individual users take on as part of the organization”. They prefer to centrally control and maintain access rights that reflect the organization’s protection guidelines. With RBAC, role-permission relationships can be predefined, which makes it simple to assign users to the prede...

    pptx22 trang | Chia sẻ: candy98 | Ngày: 27/11/2020 | Lượt xem: 1227 | Lượt tải: 0

  • Bài giảng Bảo mật CSDL - Chap 12: XML SecurityBài giảng Bảo mật CSDL - Chap 12: XML Security

    The web is becoming the main informaiton dissemination means for many organizations Strong need for models and mechanisms enabling the specification and enforcement of security policies for web data protection and release In the web environment, information distribution often takes the form of documents that are made available at Web servers, or...

    pptx66 trang | Chia sẻ: candy98 | Ngày: 27/11/2020 | Lượt xem: 1010 | Lượt tải: 0

  • Bài giảng Bảo mật CSDL - Chap 11: SQL InjectionBài giảng Bảo mật CSDL - Chap 11: SQL Injection

    Injection attacks trick an application into including unintended commands in the data send to an interpreter. Interpreters Interpret strings as commands. Ex: SQL, shell (cmd.exe, bash), LDAP, XPath Key Idea Input data from the application is executed as code by the interpreter. App sends form to user. Attacker submits form with SQL exploit d...

    pptx37 trang | Chia sẻ: candy98 | Ngày: 27/11/2020 | Lượt xem: 1484 | Lượt tải: 0

  • Bài giảng Bảo mật CSDL - Chap 9: Auditing Database ActivitiesBài giảng Bảo mật CSDL - Chap 9: Auditing Database Activities

    Several types of activities: Application activities: SQL statements issued against application tables Administration activities: commands issued for maintenance and administrative purposes Database events: events that occur when a specific activity occurs Audit program provides: Audit trail for all activities Opportunity for using process con...

    pptx46 trang | Chia sẻ: candy98 | Ngày: 27/11/2020 | Lượt xem: 1092 | Lượt tải: 0