TAILIEUCHUNG - Information Assurance Foundations

This slide shows the main topics we are going to cover. We will discuss the threats that are arrayed against our computer systems. To focus that discussion, we will be concerned with some of the more famous attacks that have occurred. Now, information assurance can get really complex, but these kinds of problems decompose nicely. | Information Assurance Foundations Core issues and challenges Stephen Northcutt The SANS Institute Information Assurance Foundations - SANS GIAC LevelOne 2000 2001 1 Hello. My name is Stephen Northcutt and the material we are going to cover this next hour is central to understanding the theory and practice of information security. This is a foundational course developed for the SANS LevelOne Security Essentials certification program. When you complete this course there will be a quiz available from the SANS web page to help reinforce the material and ensure your mastery of it. In the next 45 minutes or so I am going to take you on a tour of three famous attacks to see what lessons we can learn from them. Along the way we are going to discuss the three key dimensions of protection and attack. Most of you are already familiar with them. They are confidentiality integrity and availability. Throughout the LevelOne Security Essentials certification program you will be deploying countermeasures to protect confidentiality integrity and availability and you may experience attacks against these dimensions. We can think of these as the primary colors of information assurance. By mixing and matching these -- and we do mix and match because they are interrelated -- we are able to develop either a very strong attack or develop a strong defense. 1 Agenda Principles of attack and defense Three famous attacks Introduction to vulnerabilities Basic countermeasures Summary Information Assurance Foundations - SANS GIAC LevelOne 2000 2001 2 The next slide is titled Agenda . This slide shows the main topics we are going to cover. We will discuss the threats that are arrayed against our computer systems. To focus that discussion we will be concerned with some of the more famous attacks that have occurred. Now information assurance can get really complex but these kinds of problems decompose nicely. As we work our way through the material we are going to be pointing out aspects of the .

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.