Establishing A Network Security Policy

Chia sẻ: La Quang | Ngày: | Loại File: PDF | Số trang:18

lượt xem

Establishing A Network Security Policy

Mô tả tài liệu
  Download Vui lòng tải xuống để xem tài liệu đầy đủ

Impersonation – Impersonation is the process of identifying yourself as a different individual by using the same credentials as that particular individual uses. There are several ways that this is done. One of the more common ways is by eavesdropping on your network and gaining access to usernames and password when these are exchanged via unsecured means. Sniffer programs, as they are commonly referred as, are small software packages that enable someone to snoop into current network conversations and extract users’ credentials....

Chủ đề:

Nội dung Text: Establishing A Network Security Policy

Đồng bộ tài khoản