Security and Privacy in a Networked World/Technology: A mighty knight with no pants: erinevus redaktsioonide vahel
Allikas: KakuWiki
Mine navigeerimisribaleMine otsikasti
WikiHaldur (arutelu | kaastöö) (Created page with "Mitnick: Technology, training, procedures == Introduction == The metaphor used in the title is unfortunately valid for many places - some (more visible) parts could be well-...") |
WikiHaldur (arutelu | kaastöö) Resümee puudub |
||
16. rida: | 16. rida: | ||
* Sniffers | * Sniffers | ||
--- | |||
== Additional reading and links == | == Additional reading and links == | ||
21. rida: | 22. rida: | ||
* ANONYMOUS. Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network. 3rd ed. Sams Publishing, 2001. | * ANONYMOUS. Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network. 3rd ed. Sams Publishing, 2001. | ||
* MCCARTHY, Linda. IT Security: Risking the Corporation. Prentice Hall 2001. | * MCCARTHY, Linda. IT Security: Risking the Corporation. Prentice Hall 2001. | ||
... |
Redaktsioon: 24. aprill 2014, kell 11:58
Mitnick: Technology, training, procedures
Introduction
The metaphor used in the title is unfortunately valid for many places - some (more visible) parts could be well-protected, while others that are not so visible are in deep neglect.
...
Tools
- Firewalls
- Vulnerability scanners
- Intrusion detection systems
- Logging and auditng
- Password checkers
- Sniffers
---
Additional reading and links
- ANONYMOUS. Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network. 3rd ed. Sams Publishing, 2001.
- MCCARTHY, Linda. IT Security: Risking the Corporation. Prentice Hall 2001.
...