Andmeturve: tehnoloogia, koolitus ja reeglid: erinevus redaktsioonide vahel
Allikas: KakuWiki
Mine navigeerimisribaleMine otsikasti
WikiHaldur (arutelu | kaastöö) Resümee puudub |
WikiHaldur (arutelu | kaastöö) |
||
15. rida: | 15. rida: | ||
==== Pettused ==== | ==== Pettused ==== | ||
* Levinumad skeemid | |||
* Scambaiting | |||
==== Häktivism ==== | ==== Häktivism ==== |
Redaktsioon: 26. november 2016, kell 18:15
Sissejuhatuseks
Pealkirjaks oleva lause andmeturbe kolmest komponendist on öelnud kunagine USA tagaotsituim inimene, keda FBI tulutult mitu aastat üle kogu riigi jahtis: Kevin Mitnick. Nüüdseks on temast saanud turvaekspert, kes ilmselt teab, millest räägib. Mitnicki sõnul on ka tegemist kolme komponendi korrutise, mitte summaga - kui üks neist on null või nullilähedane, on seda ka kogutulemus. Tänases teemas vaatlemegi andmeturbe eri aspekte.
Probleemid
Pahavara
- Viirused
- Trooja hobused
- Ussid
- Lunavara
Identiteedivargus
Pettused
- Levinumad skeemid
- Scambaiting
Häktivism
Kübersõda
Lahendused
Tehnoloogia
Koolitus
Reeglid
Viited
- ALDER, Raven et al. Stealing the Networkː How to Own an Identity. Syngress 2005.
- ALLSOPP, Wil. Unauthorised Accessː Physical Penetration Testing for IT Security Teams. John Wiley & Sons 2009.
- ANDREJEVIC, Mark. iSpy: Surveillance and Power in the Interactive Era. University Press of Kansas 2007
- GOLDSTEIN, Emmanuel. The Best of 2600: A Hacker Odyssey. Wiley 2008.
- Sarah GRANGER. Social Engineering Fundamentals, Part I: Hacker Tactics. SecurityFocus, December 18 2001
- Sarah GRANGER. Social Engineering Fundamentals, Part II: Combat Strategies. SecurityFocus, January 9 2002.
- HAGER, Nicky. Secret Power - New Zealand's Role in the International Spy Network. Craig Potton Publishing 1996. http://www.nickyhager.info/ebook-of-secret-power
- LONG, Johnny. No Tech Hacking - A Guide to Social Engeering, Dumpster Diving, and Shoulder Surfing. Syngress Publishing 2008 (a chapter is available at http://www.hackersforcharity.org/files/NTH_SAMPLE.pdf)
- MCCARTHY, Linda. IT Security: Risking the Corporation. Prentice Hall 2003.
- MITNICK, Kevin D.,SIMON, William L. (2002). The Art of Deception. John Wiley & Sons 2002
- MITNICK, Kevin D.,SIMON, William L. (2005). The Art of Intrusion. John Wiley & Sons 2005
- O'CONNOR, TJ. Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers. Syngress 2012
- OLLMANN, Gunter. The Phishing Guide: Understanding and Preventing Phishing Attacks. TechnicalInfo.net 2005
- STERLING, Bruce. Hacker Crackdown: Law and Disorder on the Electronic Frontier. Bantam Books 1992. http://www.mit.edu/hacker/hacker.html
- STOLL, Cliff. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage. Pocket Books 2005
- VITALIEV, Dmitri. Digital Security and Privacy for Human Rights Defenders. Front Line 2007. http://www.frontlinedefenders.org/esecman/
- WINTERFELD, Steve, ANDRESS, Jason. The Basics of Cyber Warfare. Syngress 2013.
- Attrition.org: security. http://attrition.org/security/
- The Honeynet Project: Know Your Enemy. http://old.honeynet.org/papers/honeynet/
- SANS Information Security Resources. http://www.sans.org/security-resources/
- SANS Reading Room. http://www.sans.org/security-resources/
- http://www.whatsthebloodypoint.com
- http://www.scamorama.com
- http://www.419eater.com