TAILIEUCHUNG - Course 2830: Designing security for Microsoft networks - Module 3

Module 3 - Identifying threats to network security. In this module, you will learn how to identify possible threats to a network and understand common motivations of attackers. The module introduces the STRIDE (Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, Elevation of privilege) threat model as an effective way to predict where threats may occur in an organization. | Module 3: Identifying Threats to Network Security Overview Introduction to Security Threats Predicting Threats to Security Lesson: Introduction to Security Threats Why Network Attacks Occur Who Attacks Networks? Common Types of Network Vulnerabilities How Network Attacks Occur Difficulties in Defending Networks Reasons that attackers break into networks include: Revenge Espionage Publicity Personal satisfaction Terrorism Why Network Attacks Occur Who Attacks Networks? Ability Characteristics of attackers Novice Possess little programming experience Use tools that are made by others Intermediate Possess significant programming skills Automate tools that are created by others Advanced Are expert programmers Develop tools that others use to attack networks Corporate Headquarters External Attacker Internet Internal Attacker Common Types of Network Vulnerabilities Vulnerability Examples Weak passwords Employees use blank or default passwords Password is predictable Unpatched software Service packs are not maintained Security hotfixes are not applied Incorrectly configured hardware and software Users have too many privileges Applications run as the Local System account Social engineering Help desk administrator resets a password without verifying the identity of the caller Weak security on Internet connections Unused services and ports are not secured Firewalls and routers are used improperly Unencrypted data transfer Authentication packets are sent in clear text Important data is sent over the Internet in clear text How Network Attacks Occur Stages of attack Examples of attacker actions 1. Footprint Runs a port scan on the firewall 2. Penetration Exploits an unpatched Web server 3. Elevation of privilege Creates an account with administrator rights 4. Exploit Defaces the Web site 5. Cover-up Erases the audit trail of the exploit Corporate Headquarters Attacker 1 2 5 4 3 Parties Characteristics Attackers Can attack with very low cost Only need to .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.