中国高校课件下载中心 》 教学资源 》 大学文库

Network and System Security Risk Assessment(PPT讲稿)Introduction

文档信息
资源类别:文库
文档格式:PPT
文档页数:21
文件大小:187KB
团购合买:点击进入团购
内容简介
Network and System Security Risk Assessment(PPT讲稿)Introduction
刷新页面文档预览

Network and System security Risk assessment Introduction

Network and System Security Risk Assessment --Introduction

Outline Why to begin this subject? 口 Network Security a System Security What is in this course? a Network protocols and problems a System security configuration and programming 知己知彼,百战不殆

Outline ◼ Why to begin this subject? ❑ Network Security ❑ System Security ◼ What is in this course? ❑ Network protocols and problems ❑ System security configuration and programming ◼ 知己知彼,百战不殆

some interesting examples Conan Kevin mitnick And other hackers

some interesting examples ◼ Conan ◼ Kevin Mitnick ◼ And other hackers

An interesting movie clip Phreaking a is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks

An interesting movie clip ◼ Phreaking ❑ is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks

An interesting interview Kevin mitnick interview Kevin mitnick attack in 1994

An interesting interview ◼ Kevin Mitnick interview ◼ Kevin Mitnick attack in 1994

Purpose of the course provide a basic introduction on common network and system security vulnerabilities Cultivate basic networking and system programming skills

Purpose of the Course ◼ provide a basic introduction on common network and system security vulnerabilities; ◼ Cultivate basic networking and system programming skills;

Content of the course Analysis of packet structure a Packet sniffing a Port scanning a Introduction to a number of threats and vulnerabilities of TCP/P pr rotocol stack 口 ARP poison a TCP SYN Flooding

Content of the Course ◼ Analysis of packet structure ❑ Packet sniffing ❑ Port scanning…. ❑ …. ◼ Introduction to a number of threats and vulnerabilities of TCP/IP protocol stack: ❑ ARP poison… ❑ TCP SYN Flooding ❑ …

Content of the course Cover some computer system security problems and programming Firewall: iptables& netfilter 口 Kernel module 口 Rootkit

Content of the Course ◼ Cover some computer system security problems and programming ❑ Firewall: iptables & netfilter ❑ Kernel module ❑ Rootkit ❑ …

Experiments Write simple programs o backdoor 口 sniffer 口 Firewall 口 Rootkit;

Experiments ◼ Write simple programs: ❑ backdoor; ❑ sniffer; ❑ Firewall; ❑ Rootkit; ❑ …

Expectation Get an in-depth understanding of TCP/IP protocol stack Familiarize with usage of various network commands and tools Master socket programming, netfilter, etc

Expectation: ◼ Get an in-depth understanding of TCP/IP protocol stack ◼ Familiarize with usage of various network commands and tools ◼ Master socket programming, netfilter, etc

共21页,试读已结束,阅读完整版请下载
刷新页面下载完整文档
VIP每日下载上限内不扣除下载券和下载次数;
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
相关文档