intTypePromotion=1

Network Security Monitoring and Behavior Analysis

Chia sẻ: Cao Cẩn | Ngày: | Loại File: PDF | Số trang:61

0
39
lượt xem
2
download

Network Security Monitoring and Behavior Analysis

Mô tả tài liệu
  Download Vui lòng tải xuống để xem tài liệu đầy đủ

In this example, the intruder gains access to username/password information and sensitive routing protocol data using an Ethernet packet decoder such as EtherPeek. The data packets being sent are captured by the laptop running EtherPeek; the program decodes the hex data into human-readable form. After obtaining access to information, the intruder can use this information to gain access to a machine and then possibly copy-restricted, private infor- mation and programs. The intruder may also subsequently have the capability to tamper with an asset; that is, the intruder may modify records on a server or change the content of the routing information....

Chủ đề:
Lưu

Nội dung Text: Network Security Monitoring and Behavior Analysis

ADSENSE
ADSENSE

CÓ THỂ BẠN MUỐN DOWNLOAD

 

Đồng bộ tài khoản
2=>2