Information Security Fundamentals
... for information security • Define information security • Explain the importance of information security Objectives • List and define information security terminology • Describe the CompTIA Security+ ... Challenges for Information Security (continued) Identifying the Challenges for Information Security (continued) Defining Information Security • Information secu...
Ngày tải lên: 17/09/2012, 10:43
... 18 Handling Risk • Eliminate risk • Minimize risk • Accept risk • Transfer risk Information Security: The Big Picture - SANS GIAC © 2000 19 There are several ways of dealing with risk First, you ... good intentions Extremely effective in many situations Common ploys – – – – The The The The Dumb User VIP Lost Puppy Prize • Protection: know who you are dealing with In...
Ngày tải lên: 18/10/2013, 18:15
... of sensitive information may have occurred SANS GIAC Information Security KickStart ©2000 Page of 13 Term Computer Abuse Computer Fraud Computer Security Computer Security Incident Computer Security ... discretion of a system operator or information owner A Denial of Service attack that uses multiple machine to amplify the effect of the attack See Demilitarized Z...
Ngày tải lên: 18/10/2013, 18:15
Information Security: The Big Picture – Part II
... Hdr Data Information Security: The Big Picture - SANS GIAC © 2000 29 The data packet has two basic parts, the header and the payload The header is the part of the packet that contains information ... they would contact the operator at the central office and tell them the name of the person they wanted to talk to The operator would then connect the caller’...
Ngày tải lên: 22/10/2013, 16:15
Information Security: The Big Picture – Part III
... give this information to the people on the first floor The people in the first floor actually go to the store, buy all the ingredients, and bring them back to the apartment building Once the ingredients ... own information to it, then sends it to the next layer down the stack Once the packet reaches the bottom of the stack, it travels along the network wire to...
Ngày tải lên: 22/10/2013, 16:15
Information Security: The Big Picture – Part IV
... multiple parts • Fragmented parts are reassembled at destination • Attacks – Tiny fragment – Overlapping fragments – Teardrop Information Security: The Big Picture - SANS GIAC © 2000 11 In the IP ... to all the other hosts on that network, which then act as the agents for the attack Being good little agents, they want to reply to the request However the only...
Ngày tải lên: 26/10/2013, 23:15
Information Security: The Big Picture – Part VI
... Certificates have many uses – Encryption – Authentication – Verification Information Security: The Big Picture - SANS GIAC © 2000 Most of us have either a drivers license or a passport These are official ... As they are discovered, the anti-virus vendors develop methods for detecting and removing them They then put these new methods into updates to their software and d...
Ngày tải lên: 04/11/2013, 12:15