Network and System Security Risk Assessment(PPT讲稿)Introduction

Network and System security Risk assessment Introduction
Network and System Security Risk Assessment --Introduction

Outline Why to begin this subject? 口 Network Security a System Security What is in this course? a Network protocols and problems a System security configuration and programming 知己知彼,百战不殆
Outline ◼ Why to begin this subject? ❑ Network Security ❑ System Security ◼ What is in this course? ❑ Network protocols and problems ❑ System security configuration and programming ◼ 知己知彼,百战不殆

some interesting examples Conan Kevin mitnick And other hackers
some interesting examples ◼ Conan ◼ Kevin Mitnick ◼ And other hackers

An interesting movie clip Phreaking a is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks
An interesting movie clip ◼ Phreaking ❑ is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks

An interesting interview Kevin mitnick interview Kevin mitnick attack in 1994
An interesting interview ◼ Kevin Mitnick interview ◼ Kevin Mitnick attack in 1994

Purpose of the course provide a basic introduction on common network and system security vulnerabilities Cultivate basic networking and system programming skills
Purpose of the Course ◼ provide a basic introduction on common network and system security vulnerabilities; ◼ Cultivate basic networking and system programming skills;

Content of the course Analysis of packet structure a Packet sniffing a Port scanning a Introduction to a number of threats and vulnerabilities of TCP/P pr rotocol stack 口 ARP poison a TCP SYN Flooding
Content of the Course ◼ Analysis of packet structure ❑ Packet sniffing ❑ Port scanning…. ❑ …. ◼ Introduction to a number of threats and vulnerabilities of TCP/IP protocol stack: ❑ ARP poison… ❑ TCP SYN Flooding ❑ …

Content of the course Cover some computer system security problems and programming Firewall: iptables& netfilter 口 Kernel module 口 Rootkit
Content of the Course ◼ Cover some computer system security problems and programming ❑ Firewall: iptables & netfilter ❑ Kernel module ❑ Rootkit ❑ …

Experiments Write simple programs o backdoor 口 sniffer 口 Firewall 口 Rootkit;
Experiments ◼ Write simple programs: ❑ backdoor; ❑ sniffer; ❑ Firewall; ❑ Rootkit; ❑ …

Expectation Get an in-depth understanding of TCP/IP protocol stack Familiarize with usage of various network commands and tools Master socket programming, netfilter, etc
Expectation: ◼ Get an in-depth understanding of TCP/IP protocol stack ◼ Familiarize with usage of various network commands and tools ◼ Master socket programming, netfilter, etc
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 复旦大学:Trapping in scale-free networks with hierarchical organization of modularity.pptx
- 电子工业出版社:《计算机网络》课程教学资源(第五版,PPT课件讲稿)第十章 下一代因特网.ppt
- 卷积码的概率译码(PPT讲稿).ppt
- 《ASP动态网页设计实用教程》教学资源(PPT课件讲稿)第8章 Web数据库基础.ppt
- Lower bound for sorting, radix sort.ppt
- 数据传送类指令(PPT讲稿).ppt
- 长春工业大学:《电子商务》课程教学资源(PPT课件)第9章 网络鞋城前台页面.ppt
- 因特网多媒体技术(PPT讲稿).ppt
- International Trade Forms.ppt
- 香港理工大学:Building Robust Wireless LAN for Industrial Control with DSSS-CDMA Cell Phone Network Paradigm.ppt
- 香港浸会大学:《Experiencing Cluster Computing》Class 8 Case Studies.ppt
- 中国科学技术大学:《计算机体系结构》课程教学资源(PPT课件讲稿)动态调度(Cont)、推断执行和ILP.ppt
- 《多媒体教学软件设计》课程PPT教学课件:第13章 多媒体教学软件中脚本编程技巧.ppt
- 山西国际商务职业学院:《网页设计与制作》课程教学资源(PPT课件)第一章 网页设计基础知识.ppt
- 《算法设计技巧与分析》课程教学资源(PPT讲稿)Lecture 8 贪婪法则 Greedy Approach.ppt
- 山东大学:《计算机图形学》课程PPT教学课件(Programming with OpenGL)Part 3:Three Dimensions.ppt
- Integrated analysis of regulatoryand metabolic networks revealsnovel regulatory mechanisms inSaccharomyces cerevisiae.ppt
- 基于语义关联和信息增益的TFIDF改进算法研究.ppt
- 《C程序设计》课程PPT教学课件(电子教案)第六章 函数.ppt
- 安徽理工大学:《汇编语言》课程教学资源(PPT课件讲稿)第五章 循环与分支程序设计.ppt
- 香港科技大学:Latent Tree Models.pptx
- 《汇编语言程序设计》课程教学资源(PPT课件讲稿)循环与分支程序设计.ppt
- ARM Tachnology:Chapter 3 STM32 Clock and Configuration.ppt
- 《软件工程简介》课程PPT教学课件(可行性研究、需求分析、总体设计、详细设计).ppt
- 利用NetRiver实验系统实现IP协议交互和TCP协议交互.ppt
- 江苏海洋大学(淮海工学院):《Java面向对象程序设计》课程教学资源(PPT课件讲稿)第3章 Java 面向对象编程 3.1 面向对象软件开发概述.pptx
- 《数字图像处理 Digital Image Processing》课程教学资源(PPT课件讲稿)第2章 图像的基本知识及运算.ppt
- 西安电子科技大学:《操作系统 Operating Systems》课程教学资源(PPT课件讲稿)Chapter 02 进程和线程 Processes and Threads.ppt
- 《计算机辅助设计 Computer Aided Design》课程PPT教学课件:第一篇 CAD技术 第一章 几何造型方法介绍和分类.ppt
- 清华大学:高校信息门户建设(PPT讲稿).ppt
- 《汇编语言》课程PPT教学课件:第三章 80x86寻址方式和指令系统.ppt
- 《网站设计与建设 Website design and developments》课程教学资源(PPT课件讲稿)第一部分 Web基础知识 第3章 图形与Web设计.ppt
- 香港城市大学:Introduction to Real-Time Systems(Design and Analysis of Algorithms).pptx
- 《编译原理》课程教学资源(PPT课件讲稿)第五章 语法分析——自下而上分析.ppt
- 香港科技大学:Advanced Topics in NextGeneration Wireless Networks.ppt
- 复旦大学:《数据库基础与应用》课程PPT教学课件(Access案例教程)第1章 数据库基础知识.pptx
- Transport Layer Identification of P2P Traffic.ppt
- 上海交通大学:Basic Raster Graphics Algorithms for Drawing 2D Primitives.ppt
- 《编译原理》课程教学资源(PPT课件讲稿)第七章 中间代码生成.ppt
- 《MATLAB应用基础》课程教学资源(PPT课件讲稿)第4章 MATLAB的数值计算.ppt