Icon Crear Crear

Session 03-Intrusion Detection

Completar frases

Subject : Security and Privacy Risks in Computer & Internet Applications
Lecturer: Assoc. Prof. Dr. James Joshi
Faculty: Graduate School of Information Technology
Siam University, Bangkok, Thailand

Descarga la versión para jugar en papel

Edad recomendada: 21 años
1 veces realizada

Creada por

Tailandia

Top 10 resultados

Todavía no hay resultados para este juego. ¡Sé el primero en aparecer en el ranking! para identificarte.
Crea tu propio juego gratis desde nuestro creador de juegos
Compite contra tus amigos para ver quien consigue la mejor puntuación en esta actividad

Top juegos

  1. tiempo
    puntuacion
  1. tiempo
    puntuacion
tiempo
puntuacion
tiempo
puntuacion
 
game-icon

Completar frases

Session 03-Intrusion DetectionVersión en línea

Subject : Security and Privacy Risks in Computer & Internet Applications Lecturer: Assoc. Prof. Dr. James Joshi Faculty: Graduate School of Information Technology Siam University, Bangkok, Thailand

por Prince Parham
1

destination TCP overloading hijacked signatures sniffing suspicious firewall

1 . Common security attacks and their countermeasures :
Finding a way into the network
Firewalls
Exploiting software bugs , buffer overflows
Intrusion Detection Systems
Denial of Service
Ingress filtering , IDS
hijacking
IPSec
Packet
Encryption ( SSH , SSL , HTTPS )
Social problems
Education

2 . A is like a castle with a drawbridge
Only one point of access into the network
This can be good or bad . It can be hardware or software

3 . Intrusion Detection :
Used to monitor for " activity " on a network and it can protect against known software exploits , like buffer overflows .

4 . Intrusion detection :
Uses " intrusion "
Well known patterns of behavior
Ping sweeps , port scanning , web server indexing , OS fingerprinting , DoS attempts , etc .

5 . Denial of Service Attack :
Purpose : Make a network service unusable , usually by the server or network
Many different kinds of DoS attacks
SYN flooding
SMURF
Distributed attacks
Mini Case Study : Code - Red

6 . TCP attacks :
Recall how IP works ?
End hosts create IP packets and routers process them purely based on address alone
Problem : End hosts may lie about other fields which do not affect delivery

7 . If an attacker learns the associated TCP state for the connection , then the connection can be !

educaplay suscripción