Website chia sẻ tài liệu, ebook tham khảo cho các bạn học sinh, sinh viên
Summary • Protecting basic communication systems is a key to resisting attacks • E-mail attacks can be malware, spam, or hoaxes • Web vulnerabilities can open systems up to a variety of attacks • A Java applet is a separate program stored on the Web server and downloaded onto the user’s computer along with the HTML code
48 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 1389 | Lượt tải: 0
Summary • Cable plant: physical infrastructure (wire, connectors, and cables that carry data communication signals between equipment) • Removable media used to store information include: – Magnetic storage (removable disks, hard drives) – Optical storage (CD and DVD) – Electronic storage (USB memory sticks, FlashCards)
56 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 1350 | Lượt tải: 0
Summary • Establishing a security baseline creates a basis for information security • Hardening the operating system involves applying the necessary updates to the software • Securing the file system is another step in hardening a system
39 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 1514 | Lượt tải: 0
Summary • Creating and maintaining a secure environment cannot be delegated to one or two employees in an organization • Major tasks of securing information can be accomplished using a bottom-up approach, where security effort originates with low-level employees and moves up the organization chart to the CEO • In a top-down approach, the effor...
38 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 1426 | Lượt tải: 0
Summary • Six categories of attackers: hackers, crackers, script kiddies, spies, employees, and cyberterrorists • Password guessing is a basic attack that attempts to learn a user’s password by a variety of means • Cryptography uses an algorithm and keys to encrypt and decrypt messages
46 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 1432 | Lượt tải: 0
Summary • The challenge of keeping computers secure is becoming increasingly difficult • Attacks can be launched without human intervention and infect millions of computers in a few hours • Information security protects the integrity, confidentiality, and availability of information on the devices that store, manipulate, and transmit the inform...
26 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 1347 | Lượt tải: 0
The key points covered in this chapter are as follows: • Market trends drive the need for effective remote-access security and present challenges to the IT organization. • The SSL protocol uses the cryptology concepts presented in this chapter. • Cisco SSL VPN solutions include clientless and full client tunnel modes of operation. • Cisco SSL ...
47 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 1413 | Lượt tải: 0
IOS-FW# show crypto isakmp policy Global IKE policy Protection suite of priority 1 encryption algorithm: Three key triple DES hash algorithm: Secure Hash Standard authentication method: Pre-Shared Key Diffie-Hellman group: #2 (1024 bit) lifetime: 86400 seconds, no volume limit
28 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 1443 | Lượt tải: 0
IPv6 VPNs • IPsec is mandatory for IPv6. • IPsec is native to IPv6. • Includes built-in confidentiality, integrity, authentication, and antireplay. • Offers flexibility and low overhead through extension headers. • The IPsec framework and behavior are the same as IPsec for IPv4. • Strong encryption (Suite B) and mobility enhancements (IKEv2) ...
34 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 1432 | Lượt tải: 0
The key points covered in this chapter are as follows: • A cryptosystem is made up of a combination of hashing, symmetric, and asymmetric algorithms. • Symmetric algorithms use a single key for encrypting and decrypting. Generally speaking, symmetric algorithms are the strongest and fastest algorithms and therefore are used for most encryption. ...
77 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 1706 | Lượt tải: 0