[go: up one dir, main page]

0% found this document useful (0 votes)
212 views24 pages

16 16 February February 2012 2012 1 1

The document discusses information security concepts including confidentiality, integrity, and availability. It describes common security threats and attacks such as breaches of physical security, software piracy, data attacks, software attacks like viruses and Trojan horses, and breaches of operations like IP spoofing and password sniffing. The document also mentions identification, authentication, access control, data confidentiality, integrity, and non-repudiation as important information security measures. It provides some references for further information on computer forensics management, university computing security, and ethical hacking career training resources.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
212 views24 pages

16 16 February February 2012 2012 1 1

The document discusses information security concepts including confidentiality, integrity, and availability. It describes common security threats and attacks such as breaches of physical security, software piracy, data attacks, software attacks like viruses and Trojan horses, and breaches of operations like IP spoofing and password sniffing. The document also mentions identification, authentication, access control, data confidentiality, integrity, and non-repudiation as important information security measures. It provides some references for further information on computer forensics management, university computing security, and ethical hacking career training resources.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 24

-

: 20085
16 February 2012

:
.
1

2 16 February 2012

(Intranet) (Internet) ...... ..... :


3 16 February 2012

-1

: -1 . . . . . -2 -3 -4 -5

4 16 February 2012

: : . : . : Threats : Vulnerabilities .

5 16 February 2012

: Risks Risk analysis Process . Attacks

6 16 February 2012

7 16 February 2012

-:

CONFIDENTIALITY

INTEGRITY

AVAILABILITY
8 16 February 2012

-1 -2

: .

9 16 February 2012

: . : . : . :.
10 16 February 2012

-1 -

-2

-3

-4

Breaches of Physical security


Dumpster diving

-:


. -: Wiretapping . : Eavesdropping on Emanations . -: Denial or Degradation of Service


11 16 February 2012

-: Breaches of Personnel security


-:

-: Masquerading

Software Piracy

12 16 February 2012

-:
Breaches Of Communications and Security

-: Data Attacks -:Unauthorized Copying of Data . -: Traffic Analysis -1 

-:Covert Channels
13 16 February 2012

Software Attacks
-: Trap Doors . -:Tunneling . Timing attacks . Malicious Code Warms

Trojan

Viruses

Horses

14 16 February 2012

Breaches of Operations -:Data Diddling

-: -: Security .

-:(

) IP Spoofing . -: Password Sniffing ( ) .

128

15 16 February 2012

ware dialer -

-: Scanning ( demon dialer processes

-: Excess Privileges

16 16 February 2012

: Identification and Authentication . . : Access Control . ..... ( (

-1

) )

- 2

:Data and message Confidentiality

- 3

.
17 16 February 2012

.
Data and message ( ) - 4 :Integrity

. :Non-repudiation . ( ) -5

18 16 February 2012

.
Data and message ( ) - 4 :Integrity

. :Non-repudiation . ( ) -5

19 16 February 2012

(124-93 )

(233 -195) : 4/2003/ 26 : : 4: 28/4/2003 : /

20 16 February 2012

. : .1 . .2 . . . .4 .5 . .3

21 16 February 2012

. : .1 . .2 . . . .4 .5 . .3

22 16 February 2012

1418 . , 2002 . , 2005 , , . 2010 , , , : : . 1417

: : , 15 : : 51

-1 . -2 -4 -6 -9

http://computerforensicsmanagement.com/InformationSecurity.html http://www.upenn.edu/computing/security/index.php http://www.hackersenigma.com/ethical-hacking/information-securitytraning-for-better-career/


23 16 February 2012

You might also like