Network security protection
-
Nối tiếp phần 1, phần 2 của cuốn sách "Quản trị Windows server 2008 (Tập 2)" gồm những nội dung chính sau: Chương 14 - Triển khai Windows Deployment Services; Chương 15 - Quản trị Group Policy; Chương 16 - Network Access Protection; Chương 17 - Bảo mật hệ thống với Windows Firewall;... Mời các bạn cùng tham khảo!
139p vankhinh0210 15-10-2023 9 4 Download
-
Module 7: Advanced application and web filtering. This module explains how application and Web filtering can be used for very specific filtering of traffic that flows through the ISA Server. The module shows how to configure application and Web filtering to provide advanced protection for the internal network.
23p nomoney2 10-02-2017 50 3 Download
-
Chapter 3 - Attacks and malicious code (part 1). After reading the material in this chapter, you should be able to: Explain denial-of-service (DoS) attacks, explain and discuss ping-of-death attacks, identify major components used in a DDoS attack and how they are installed, understand major types of spoofing attacks.
43p nhanmotchut_3 20-10-2016 63 4 Download
-
Chapter 6 - Email and web security. The main contents of this chapter include all of the following: Protect e-mail systems, list World Wide Web vulnerabilities, secure web communications, secure instant messaging.
48p nhanmotchut_3 20-10-2016 55 4 Download
-
In this chapter, students will be able to understand: Password policies ensure that users choose effective passwords; user-level security requires a separate account for each user; in share-level security, all users access shares by using the same passwords; a firewall is a hardware or software product that protects a network from unauthorized access, using techniques such as packet filtering, NAT, or proxy servers;...
15p tangtuy08 21-04-2016 35 3 Download
-
Intruders Intrusion Techniques Password Protection Password Selection Strategies Intrusion Detection Viruses and Related Threats Malicious Programs The Nature of Viruses Antivirus Approaches Advanced Antivirus Techniques Recommended Reading and WEB Sites
36p muathu_102 28-01-2013 60 4 Download
-
Effective means of protection a local system or network of systems from network-based security threats while affording access to the outside world via WAN`s or the Internet.Effective means of protection a local system or network of systems from network-based security threats while affording access to the outside world via WAN`s or the Internet
53p muathu_102 28-01-2013 57 4 Download
-
Requirements - must be able to verify that: 1. Message came from apparent source or author, 2. Contents have not been altered, 3. Sometimes, it was sent at a certain time or sequence. Protection against active attack (falsification of data and transactions)
28p muathu_102 28-01-2013 46 5 Download
-
Protect web content from those who don’t have a “need to know” Require users to authenticate using a userid/password before they are allowed access to certain URLs HTTP/1.1 requires that when a user makes a request for a protected resource the server responds with a authentication request header WWW-Authenticate contains enough pertinent information to carry out a “challenge-response” session between the user and the server
13p muathu_102 28-01-2013 49 2 Download
-
Security Service – a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers RFC 2828 – a processing or communication service that is provided by a system to give a specific kind of protection to system resources; security services implement security policies and are implemented bt security mechanisms.
14p muathu_102 28-01-2013 35 2 Download
-
traditional private/secret/single key cryptography uses one key Key is shared by both sender and receiver if the key is disclosed communications are compromised also known as symmetric, both parties are equal hence does not protect sender from receiver forging a message & claiming is sent by sender
23p muathu_102 28-01-2013 46 3 Download
-
Sits between two networks Used to protect one from the other Places a bottleneck between the networks All communications must pass through the bottleneck – this gives us a single point of control.
24p muathu_102 28-01-2013 70 5 Download
-
Secure Socket Layer Protocol (SSL) Designed by Netscape in 1994 To protect WWW applications and electronic transactions Transport layer security protocol (TLS) A revised version of SSLv3 Two major components: Record protocol, on top of transport-layer protocols Handshake protocol, change-cipher-spec protocol, and alert protocol; they reside between application-layer protocols and the record protocol
32p muathu_102 28-01-2013 80 2 Download
-
LANs, WANs, WLANs are known as edge networks May be contained within businesses or homes Needs to be protected from the rest of the Internet! Why firewall? Encryption? Cannot stop malicious packets from getting into an edge network Authentication? Can determine whether an incoming IP packet comes from a trusted user However, not all host computers have resources to run authentication algorithms Host computers managed by different users with different skill levels.
38p doilan 26-01-2013 68 4 Download
-
An exploit (from the verb to exploit, in the meaning of using something to one’s own advantage) is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behaviour to occur on computer software, hardware, or something electronic (usually computerised). Such behavior frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial-of-service attack...
0p doilan 25-01-2013 46 3 Download
-
This section is dedicated to those who would like to write a virus, but don't have the knowledge to do so. First of all, writing a virus is no big deal. It is an easy project, but one which requires some basic programming skills, and the desire to write a virus! If either of these is missing, writing a virus would be tedious indeed!.
0p doilan 25-01-2013 78 4 Download
-
Assembly language is essentially the native language of your computer. Technically the processor of your machine understands machine code (consisting of ones and zeroes). But in order to write such a machine code program, you first write it in assembly language and then use an assembler to convert it to machine code.
0p doilan 25-01-2013 49 4 Download
-
A penetration test, occasionally pentest, is a method of evaluating the computer security of a computer system or network by simulating an attack from malicious outsiders (who do not have an authorized means of accessing the organization's systems) and malicious insiders (who have some level of authorized access).
0p doilan 25-01-2013 60 8 Download
-
Cryptography (or cryptology; from Greek κρυπτός, "hidden, secret"; and γράφειν, graphein, "writing", or -λογία, -logia, "study", respectively)[1] is the practice and study of techniques for secure communication in the presence of third parties (called adversaries).[2] More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries
0p doilan 25-01-2013 57 4 Download
-
In computer security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory. This is a special case of violation of memory safety.
0p doilan 25-01-2013 55 5 Download