Andmeturve: tehnoloogia, koolitus ja reeglid: erinevus redaktsioonide vahel

Allikas: KakuWiki
Mine navigeerimisribaleMine otsikasti
Resümee puudub
14. rida: 14. rida:
=== Viited ===
=== Viited ===


* Kevin MITNICK, William L. SIMON. The Art of Deception: Controlling the Human Element of Security. John Wiley & Sons 2002
* ALDER, Raven ''et al''. Stealing the Networkː How to Own an Identity. Syngress 2005.
* Sarah GRANGER. [http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals, Part I: Hacker Tactics]. SecurityFocus, December 18
* ALLSOPP, Wil. Unauthorised Accessː Physical Penetration Testing for IT Security Teams. John Wiley & Sons 2009.
* Sarah GRANGER. [http://www.securityfocus.com/infocus/1533 Social Engineering Fundamentals, Part II: Combat Strategies]. SecurityFocus, January 9.
* ANDREJEVIC, Mark. iSpy: Surveillance and Power in the Interactive Era. University Press of Kansas 2007
* Gunter OLLMANN. [http://www.technicalinfo.net/papers/Phishing.html The Phishing Guide: Understanding and Preventing Phishing Attacks]. TechnicalInfo.net
* GOLDSTEIN, Emmanuel. The Best of 2600: A Hacker Odyssey. Wiley 2008.
* Sarah GRANGER. [http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals, Part I: Hacker Tactics]. SecurityFocus, December 18 2001
* Sarah GRANGER. [http://www.securityfocus.com/infocus/1533 Social Engineering Fundamentals, Part II: Combat Strategies]. SecurityFocus, January 9 2002.
* HAGER, Nicky. Secret Power - New Zealand's Role in the International Spy Network. Craig Potton Publishing 1996. http://www.nickyhager.info/ebook-of-secret-power
* LONG, Johnny. No Tech Hacking - A Guide to Social Engeering, Dumpster Diving, and Shoulder Surfing. Syngress Publishing 2008 (a chapter is available at http://www.hackersforcharity.org/files/NTH_SAMPLE.pdf)
* MCCARTHY, Linda. IT Security: Risking the Corporation. Prentice Hall 2003.
* MITNICK, Kevin D.,SIMON, William L. (2002). The Art of Deception. John Wiley & Sons 2002
* MITNICK, Kevin D.,SIMON, William L. (2005). The Art of Intrusion. John Wiley & Sons 2005
* O'CONNOR, TJ. Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers. Syngress 2012
* OLLMANN, Gunter. [http://www.technicalinfo.net/papers/Phishing.html The Phishing Guide: Understanding and Preventing Phishing Attacks]. TechnicalInfo.net 2005
* STERLING, Bruce. Hacker Crackdown: Law and Disorder on the Electronic Frontier.  Bantam Books 1992. http://www.mit.edu/hacker/hacker.html
* STOLL, Cliff. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage. Pocket Books 2005
* VITALIEV, Dmitri. Digital Security and Privacy for Human Rights Defenders. Front Line 2007. http://www.frontlinedefenders.org/esecman/
* WINTERFELD, Steve, ANDRESS, Jason. The Basics of Cyber Warfare. Syngress 2013.
* http://www.whatsthebloodypoint.com
* http://www.whatsthebloodypoint.com
* http://www.scamorama.com
* http://www.scamorama.com
* http://www.419eater.com
* http://www.419eater.com

Redaktsioon: 25. november 2016, kell 22:30

Sissejuhatuseks

Pealkirjaks oleva lause andmeturbe kolmest komponendist on öelnud kunagine USA tagaotsituim inimene, keda FBI tulutult mitu aastat üle kogu riigi jahtis: Kevin Mitnick. Nüüdseks on temast saanud turvaekspert, kes ilmselt teab, millest räägib. Mitnicki sõnul on ka tegemist kolme komponendi korrutise, mitte summaga - kui üks neist on null või nullilähedane, on seda ka kogutulemus. Tänases teemas vaatlemegi andmeturbe eri aspekte.

Lahendused

Tehnoloogia

Koolitus

Reeglid

Viited