1. Trang chủ
  2. » Công Nghệ Thông Tin

Analysing & searching information potx

15 700 0
Tài liệu được quét OCR, nội dung có thể không chính xác
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 15
Dung lượng 294,49 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

NETWORK SECURITY SEARCHING & ANALYSING INFORMATION MAI Xuan Phu xuanphu150@gmail.com... © Network devices L] Overview of network security Definitions Tasks of Network Security Attack

Trang 1

NETWORK SECURITY

SEARCHING & ANALYSING INFORMATION

MAI Xuan Phu xuanphu150@gmail.com

Trang 2

Last lecture

L] Review

© OSI model

© TCP/IP

© Collision domain & broadcast domain

© Well-known protocols

® HTTP, FTP, DNS, SMTP, POP, IMAP, TCP, UDP, IP, ARP

© Network devices

L] Overview of network security

Definitions

Tasks of Network Security

Attacks, services and mechanisms

security attacks

Security services

Methods of Defense

OOWOO0O0D0 A model for Internetwork Security

Trang 3

Today

L] Introduction

_Ì Footprinting

LÌ Scanning

_Ì Enumeration

Trang 4

Thanks

L] Some contents of this course are referenced from:

William Stallings, Cryptography and Network Security, slides by Lawrie Brown

Henric Johnson, Network Security, Blekinge Institute of Technology, Sweden

J Wang, Computer Network Security Theory and Practice, Springer, 2009

Security+ Guide to Network Security Fundamentals, Third Edition

Jim Kurose & Keith Ross, “Computer Networking: A Top-Down Approach’, 5th edition,

Addison Wesley, 2009

Jean-Pierre Lips, Sécurité des Sécurité des Systemes d'information, Université de Nice-

sophia Antipolis

Certified Ethical Hacker (CER), 7th Version

Renaud BIDOU, Security Training

Thank i Ou

Trang 5

Contents

L] Introduction

_Ì Footprinting

LÌ Scanning

_Ì Enumeration

Trang 6

Information

LÌ Information as a concept has numerous meanings, from everyday usage to

technical settings

LJ Generally speaking, the concept of information is closely related to notions of constraint, communication,

control, data, form, instruction, knowledge, meaning, mental stimulus, pattern, perception, and representation (source: wikipedia)

_| Where are information?

Trang 7

Business

L]Ì Information to banks?

L] Information to enterprise?

L] Information to military, to government?

Trang 8

System

L]Ì Information to a server?

L]Ì Information to an administrator?

Trang 9

Gathering information

UL] How to gather information?

L] What will we process these information?

Trang 10

Contents

L]Ì Introduction

_Ì Footprinting (CEH v/, chapter 2)

UL] scanning

_Ì Enumeration

Trang 11

Contents

L] Introduction

_} Footprinting

L} scanning (CEH v/, chapter 3)

_Ì Enumeration

Trang 12

Contents

L] Introduction

_Ì Footprinting

L] Scanning

_Ì Enumeration (CEH v7, chapter 4)

Trang 13

Heferences

L] William Stallings, Network Security Essentials, 2Nd edition

L] William Stallings, Cryptography and Network Securtty, Ath Edition

_I Mike Pastore & Emmett Dulaney, CompTIA Security+ - Study guide, 3° edition,

Wiley Publishing, 2006

L} Cryptography and Network Security Principles and Practices

L} Jie Wang, Computer Network Security - Theory and Practice, Springer

_Ì Justin Clarke & Nitesh Dhanjani, Network Security Tools, O'Reilly, April 2005

L] Certified Ethical Hacker, 7th version: chapter 2,3 &4

LJ iso 17799

Trang 14

Discussion

L] Questions?

L] Ideas?

UL] Suggestions?

Trang 15

Lab 1

L] List all information of this university network

O Server

O IP

O DNS

© So

_Ì Work in group

_Ì Sending task to xuanphu150@gmail.com

Ngày đăng: 15/03/2014, 16:20