- 3
- 0
- 约7.26千字
- 约 61页
- 2018-03-13 发布于湖北
- 举报
Network Security - elista - elearning ista网络安全——埃利斯塔-电子学习ISTA
Port scanning Nmap Which application running * Network Mapping Icmp Ping traceroute * Limiting Published Information Disable unnecessary services and closing port netstat –nlptu Xinetd Opening ports on the perimeter and proxy serving edge + personal firewall * Securing from Rootkit, Spoofing, DoS * Rootkit Let hacker to: Enter a system at any time Open ports on the computer Run any software Become superuser Use the system for cracking other computer Capture username and password Change log file Unexplained decreases in available disk space Disk activity when no one is using the system Changes to system files Unusual system crashes * Spoofprotect Debian way to protect from spoofing /etc/network/options Spoofprotect=yes /etc/init.d/networking restart * DoS preventive IDS IPS Honeypots firewall * Intrusion Detection Software (IDS) Examining system logs (host based) Examining network traffic (network based) A Combination of the two Implementation: snort * Intrusion Preventions Software (IPS) Upgrade application Active reaction (IDS = passive) Implementation: portsentry * Honeypots () * Securing from Malware * Malware Virus Worm Trojan horse Spyware On email server : Spamassassin, ClamAV, Amavis On Proxy server Content filter using squidguard * Securing user and password * User and password Password policy Strong password Password file security /etc/passwd, /etc/shadow Password audit John the ripper Password management software Centralized password Individual password management * Securing Remote Access * Remote access Telnet vs SSH VPN Ipsec Freeswan Racoon CIPE PPTP OpenVPN * Wireless Security Signal bleed insertion attack Signal bleed interception attack SSID vulnerabilities DoS Battery Exhaustion attacks - bluetooth * Securing Wireless-LAN * 802.11x security WEP – Wired Equivalency Privacy 802.11i security and WPA – Wifi Protected Access 801.11 authentication EAP (Extensible Authentication Protocol) Cisco LEAP/PEAP authentication Bluetooth security – use m
您可能关注的文档
- Introduction to Radial Basis Function Networks:径向基函数神经网络导论.ppt
- HOLLiAS—MACSV系统培训教程系列之基础培训课程1.ppt
- J2EE 课程设计实训项目——《蓝梦网上商城》——应用DWR框架实现对购物车信息无刷新页面的实时显示.doc
- J2EE 课程设计实训项目——《蓝梦网上商城》——利用Spring 框架AOP技术实现对购物车中是否有购物信息的检查.doc
- James Joyce Araby 主题情节人物及背景分析[方案].doc
- Introductory Chemistry, 2nd Edition Nivaldo Tro化学导论,第二版尼瓦尔多周转率.ppt
- Java Web应用开发实用教程资源-龚永罡 陈秀新 等《Java Web应用开发实用教程》练习答案.doc
- KAB创业计划书-心意陶吧(可编辑).doc
- KBZ2-200、40馈电开关说明书(更改).doc
- L-天门冬氨基酸纳米螯合钙的综述.doc.doc
原创力文档

文档评论(0)