Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
This slide shows the main topics we are going to cover. We will discuss the threats that are arrayed against our computer systems. To focus that discussion, we will be concerned with some of the more famous attacks that have occurred. Now, information assurance can get really complex, but these kinds of problems decompose nicely. | Information Assurance Foundations Core issues and challenges Stephen Northcutt The SANS Institute Information Assurance Foundations - SANS GIAC LevelOne 2000 2001 1 Hello. My name is Stephen Northcutt and the material we are going to cover this next hour is central to understanding the theory and practice of information security. This is a foundational course developed for the SANS LevelOne Security Essentials certification program. When you complete this course there will be a quiz available from the SANS web page to help reinforce the material and ensure your mastery of it. In the next 45 minutes or so I am going to take you on a tour of three famous attacks to see what lessons we can learn from them. Along the way we are going to discuss the three key dimensions of protection and attack. Most of you are already familiar with them. They are confidentiality integrity and availability. Throughout the LevelOne Security Essentials certification program you will be deploying countermeasures to protect confidentiality integrity and availability and you may experience attacks against these dimensions. We can think of these as the primary colors of information assurance. By mixing and matching these -- and we do mix and match because they are interrelated -- we are able to develop either a very strong attack or develop a strong defense. 1 Agenda Principles of attack and defense Three famous attacks Introduction to vulnerabilities Basic countermeasures Summary Information Assurance Foundations - SANS GIAC LevelOne 2000 2001 2 The next slide is titled Agenda . This slide shows the main topics we are going to cover. We will discuss the threats that are arrayed against our computer systems. To focus that discussion we will be concerned with some of the more famous attacks that have occurred. Now information assurance can get really complex but these kinds of problems decompose nicely. As we work our way through the material we are going to be pointing out aspects of the .