TAILIEUCHUNG - Lecture Data security and encryption - Lecture 26: Intruders
The contents of this chapter include all of the following: IPSec security framework, IPSec security policy, ESP, combining security associations, internet key exchange, cryptographic suites used, problem of intrusion, behavior and techniques, intrusion detection (statistical & rule-based), password management. | Data Security and Encryption (CSE348) Lecture slides by Lawrie Brown for “Cryptography and Network Security”, 5/e, by William Stallings, briefly reviewing the text outline from Ch 0, and then presenting the content from Chapter 1 – “Introduction”. Lecture # 26 Review have considered: IPSec security framework IPSec security policy ESP combining security associations internet key exchange cryptographic suites used Chapter 19 summary. Chapter 20– Intruders Opening quote. Intruders A significant security problem for networked systems is hostile Or at least unwanted, trespass being unauthorized login or use of a system, by local or remote users; or by software such as a virus, worm, or Trojan horse One of the two most publicized threats to security is the intruder (or hacker or cracker) A significant security problem for networked systems is hostile, or at least unwanted, trespass being unauthorized login or use of a system, by local or remote users; or by software such as a virus, worm, or Trojan horse. One of the two most publicized threats to security is the intruder (or hacker or cracker), which Anderson identified three classes of: • Masquerader: An individual who is not authorized to use the computer (outsider) • Misfeasor: A legitimate user who accesses unauthorized data, programs, or resources (insider) • Clandestine user: An individual who seizes supervisory control of the system and uses this control to evade auditing and access controls or to suppress audit collection (either) Intruder attacks range from the benign (simply exploring net to see what is there); to the serious (who attempt to read privileged data, perform unauthorized modifications, or disrupt system). Intruders Which Anderson identified three classes of: Masquerader: An individual who is not authorized to use the computer (outsider) Misfeasor: A legitimate user who accesses unauthorized data, programs, or resources (insider) A significant .
đang nạp các trang xem trước