-
: 20085
16 February 2012
:
.
1
2 16 February 2012
(Intranet) (Internet) ...... ..... :
3 16 February 2012
-1
: -1 . . . . . -2 -3 -4 -5
4 16 February 2012
: : . : . : Threats : Vulnerabilities .
5 16 February 2012
: Risks Risk analysis Process . Attacks
6 16 February 2012
7 16 February 2012
-:
CONFIDENTIALITY
INTEGRITY
AVAILABILITY
8 16 February 2012
-1 -2
: .
9 16 February 2012
: . : . : . :.
10 16 February 2012
-1 -
-2
-3
-4
Breaches of Physical security
Dumpster diving
-:
. -: Wiretapping . : Eavesdropping on Emanations . -: Denial or Degradation of Service
11 16 February 2012
-: Breaches of Personnel security
-:
-: Masquerading
Software Piracy
12 16 February 2012
-:
Breaches Of Communications and Security
-: Data Attacks -:Unauthorized Copying of Data . -: Traffic Analysis -1
-:Covert Channels
13 16 February 2012
Software Attacks
-: Trap Doors . -:Tunneling . Timing attacks . Malicious Code Warms
Trojan
Viruses
Horses
14 16 February 2012
Breaches of Operations -:Data Diddling
-: -: Security .
-:(
) IP Spoofing . -: Password Sniffing ( ) .
128
15 16 February 2012
ware dialer -
-: Scanning ( demon dialer processes
-: Excess Privileges
16 16 February 2012
: Identification and Authentication . . : Access Control . ..... ( (
-1
) )
- 2
:Data and message Confidentiality
- 3
.
17 16 February 2012
.
Data and message ( ) - 4 :Integrity
. :Non-repudiation . ( ) -5
18 16 February 2012
.
Data and message ( ) - 4 :Integrity
. :Non-repudiation . ( ) -5
19 16 February 2012
(124-93 )
(233 -195) : 4/2003/ 26 : : 4: 28/4/2003 : /
20 16 February 2012
. : .1 . .2 . . . .4 .5 . .3
21 16 February 2012
. : .1 . .2 . . . .4 .5 . .3
22 16 February 2012
1418 . , 2002 . , 2005 , , . 2010 , , , : : . 1417
: : , 15 : : 51
-1 . -2 -4 -6 -9
http://computerforensicsmanagement.com/InformationSecurity.html http://www.upenn.edu/computing/security/index.php http://www.hackersenigma.com/ethical-hacking/information-securitytraning-for-better-career/
23 16 February 2012