- 7
- 0
- 约4.72千字
- 约 18页
- 2017-08-08 发布于重庆
- 举报
CIT380SecuringComputerSystems:CIT380保护计算机系统.ppt
CIT 380: Securing Computer Systems CIT 380: Securing Computer Systems Slide #* CIT 380: Securing Computer Systems Reconnaissance CIT 380: Securing Computer Systems Slide #* Topics Low Tech Reconnaissance Network Information Sources DNS Zone Transfers Network Mapping CIT 380: Securing Computer Systems Slide #* Reconnaissance Collecting security-relevant information about an organization, including: Locations Related entities Personnel: names, phone numbers, email addrs Privacy or security policies Network and system configuration Remote access methods CIT 380: Securing Computer Systems Slide #* Low Tech Reconnaissance Social Engineering Physical Break-In Dumpster Diving CIT 380: Securing Computer Systems Slide #* Social Engineering Attacker uses pretext to deceive organization member into giving out confidential information. Pretexts include personas and reasons: Personas New employee Sysadmin Manager Reasons Lost password Contact name/phone Reset password CIT 380: Securing Computer Systems Slide #* Social Engineering Defenses Security Policy Secure method for password resets. No requests for passwords. Security Awareness Program Educate personnel about social attacks. Educate personnel about security policy. CIT 380: Securing Computer Systems Slide #* Physical Break-In Methods of Entry Employment. Enter on someone else’s coat tails. Physical Access Already logged in system. System with password written down nearby. Install hardware/software key loggers. Plug in laptop to Ethernet port. Take removable media or even hard disks. CIT 380: Securing Computer Systems Slide #* Physical Defenses Security Policy Personnel cannot enter without card. No coat-tailing. Policy for ID card replacement/temporary IDs. Security Mechanisms Card reader access. Guards. Automatic screen locks after 5 minutes. Locked file cabinets/drawers. Encryption. CIT 380: Securing Computer Systems Slide #* Dumpster Diving Search trash for sensitive information Usernames and passwords, Phone
您可能关注的文档
- Bi-2212高温超导线(带)材研究进展.pdf
- Bi2O3-SiO2玻璃及玻璃陶瓷近红外发光性能的研究.pdf
- bicmos器件应用前景及其发展趋势.pdf
- BiologicalQualifierAnINNProposal-WHOWorld…:生物预选赛客栈建议-谁的世界….pdf
- BiosensorBasedonLaccaseandMulti-walledCarbon:基于漆酶生物传感器和多壁碳.pdf
- BIOS_14c_IOM.ppt
- Biotech(GMO)CropsandFoodScienceandSustainability:生物技术(转基因)作物和食品科学与可持续发展.pdf
- BipolarDisorder3Treatmentofbipolardisorder:双相情感障碍的治疗双相情感障碍3.pdf
- Bipolardisorderwithcomorbidanxietydisordersimpact:双相情感障碍共患焦虑症的影响.pdf
- BitTorrent类型P2P系统模型研究与性能分析.pdf
- 2026年全球AI教育市场自适应学习系统与教育大数据分析.docx
- 2026年全球AI教育市场数据驱动决策分析.docx
- 2026年全球AI法律合规性检查技术路线图.docx
- 2026年全球AI法律咨询市场发展机遇与挑战.docx
- 2026年全球AI法律咨询市场合同审查自动化技术政府支持政策.docx
- 智慧农业无人机作物生长监测与病虫害防治信息化平台可行性分析报告.docx
- 2025年生态旅游景区停车场新能源汽车停车需求预测报告.docx
- 2026年全球AI法律咨询市场竞争格局分析.docx
- 2026年全球AI教育市场教师技术应用案例.docx
- 2026年全球AI教育市场教师角色转型与教育创新激励机制研究.docx
最近下载
- 深度解析(2026)《GBT 15555.8-1995固体废物 总铬的测定 硫酸亚铁铵滴定法》.pptx VIP
- 新大象版科学六年级下册全册精编知识点.pdf
- 钢轨探伤正常波形及图像识读王孟君课件.pptx VIP
- 2025年食品检验工食品理化检测考试试卷:理化指标分析.docx VIP
- 超声波常见异常波形识读王孟君课件.pptx VIP
- 跨境数据流动与个人信息保护.docx VIP
- 考试2018常规理化岗位考核.pdf VIP
- 轨头核伤波形及图像识读王孟君课件.pptx VIP
- 单元工程施工质量检验表与验收表(样表:4小型蓄水工程)(SLT 336—2025)水土保持工程质量验收与评价规范.docx VIP
- 单元工程施工质量检验表与验收表(样表:3梯田工程)(SLT 336—2025)水土保持工程质量验收与评价规范.docx VIP
原创力文档

文档评论(0)