当前位置:高等教育资讯网  >  中国高校课件下载中心  >  大学文库  >  浏览文档

Network and System Security Risk Assessment(PPT讲稿)Introduction

资源类别:文库,文档格式:PPT,文档页数:21,文件大小:187KB,团购合买
点击下载完整版文档(PPT)

Network and System security Risk assessment Introduction

Network and System Security Risk Assessment --Introduction

Outline Why to begin this subject? 口 Network Security a System Security What is in this course? a Network protocols and problems a System security configuration and programming 知己知彼,百战不殆

Outline ◼ Why to begin this subject? ❑ Network Security ❑ System Security ◼ What is in this course? ❑ Network protocols and problems ❑ System security configuration and programming ◼ 知己知彼,百战不殆

some interesting examples Conan Kevin mitnick And other hackers

some interesting examples ◼ Conan ◼ Kevin Mitnick ◼ And other hackers

An interesting movie clip Phreaking a is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks

An interesting movie clip ◼ Phreaking ❑ is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks

An interesting interview Kevin mitnick interview Kevin mitnick attack in 1994

An interesting interview ◼ Kevin Mitnick interview ◼ Kevin Mitnick attack in 1994

Purpose of the course provide a basic introduction on common network and system security vulnerabilities Cultivate basic networking and system programming skills

Purpose of the Course ◼ provide a basic introduction on common network and system security vulnerabilities; ◼ Cultivate basic networking and system programming skills;

Content of the course Analysis of packet structure a Packet sniffing a Port scanning a Introduction to a number of threats and vulnerabilities of TCP/P pr rotocol stack 口 ARP poison a TCP SYN Flooding

Content of the Course ◼ Analysis of packet structure ❑ Packet sniffing ❑ Port scanning…. ❑ …. ◼ Introduction to a number of threats and vulnerabilities of TCP/IP protocol stack: ❑ ARP poison… ❑ TCP SYN Flooding ❑ …

Content of the course Cover some computer system security problems and programming Firewall: iptables& netfilter 口 Kernel module 口 Rootkit

Content of the Course ◼ Cover some computer system security problems and programming ❑ Firewall: iptables & netfilter ❑ Kernel module ❑ Rootkit ❑ …

Experiments Write simple programs o backdoor 口 sniffer 口 Firewall 口 Rootkit;

Experiments ◼ Write simple programs: ❑ backdoor; ❑ sniffer; ❑ Firewall; ❑ Rootkit; ❑ …

Expectation Get an in-depth understanding of TCP/IP protocol stack Familiarize with usage of various network commands and tools Master socket programming, netfilter, etc

Expectation: ◼ Get an in-depth understanding of TCP/IP protocol stack ◼ Familiarize with usage of various network commands and tools ◼ Master socket programming, netfilter, etc

点击下载完整版文档(PPT)VIP每日下载上限内不扣除下载券和下载次数;
按次数下载不扣除下载券;
24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
共21页,试读已结束,阅读完整版请下载
相关文档

关于我们|帮助中心|下载说明|相关软件|意见反馈|联系我们

Copyright © 2008-现在 cucdc.com 高等教育资讯网 版权所有