информационная безопасность

  • Published on
    11-Nov-2014

  • View
    13.833

  • Download
    2

Embed Size (px)

DESCRIPTION

 

Transcript

  • 1.

2. 3. 4. 5Julius Caesar 5. 6Caesar cipher 6. 7distribution of English letters 7. 8Tabula recta 8. ZDXWWW HTSVTV YHJYEQ CKHVEX QXAUIP CRWVHI EXFIPJ9EJKAWO RRYYEG TDLCQT VXYVCS PXZQIJ FRNTQW KICASQFECIFE EXNCGA HZBSIZ WOGAAZ JIUWYH AJVWRT IOUQTPWSNZIP GGQVRF IRZDYS OUVVON COVWMJ ACAKRD ZSGXGHPXPKIY FHZCIB RBYJFZ GCNEVR UZOJHL OZKIIB YTYCTIOne-time padURMZHI EWLGGR AIRCWI LMBLYB DWHPER VIQGBK BAZSTNJZTLBC BZXQDQ UCVXTW SBDCDC UBSRUJ IJCWHF JKMFXIYLGDYJ DGGIAK YKPQMK PCGVJX HGAAPR GTTSSE RERYWE 9. Information Security There is no security on this earth, there is only opportunity. General Douglas MacArthur US WWII general & war hero (1880 - 1964) 10. Cybersecurity 11. CyberINsecurity 12. Cybercrime Hacker / Cracker Black/Gray/White Hat13 13. Vulnerability hardware software network personnel site organizational 14 14. Spam15 15. Cyberstalking stalking on the net for abuse16 16. 17Malware Virus Trojan horse Dancing Pigs Rootkit Backdoor Grayware / Adware Spyware Dialer Joke Browser hijacking 17. Information warfare Cyberterrorism Cyberwarfare18 18. Denial-of-service19 19. Exploit Zero-day Full Disclosure Shellcode20 20. Eavesdropping Computer and network surveillance Fiber tapping Keystroke logging Man-in-the-middle attack21 21. Social Engineering Hoax Fraud Phishing = phreaking + fishing phreaking = phone + freaking22 22. Indirect Attack Proxy Tor Anonymizers23 23. Backdoor Trojan horse Trapdoor Worms Cryptography Hardware Direct Access24 24. Cybersecurity 25. Cybersecurity (1) Authentication Authorization / Access Controls ACL Mandatory Access Control Capability26 26. Cybersecurity (2) Chain of trust Cryptography Firewalls Antivirus Application whitelisting / blacklisting 27 27. Cybersecurity (3) Backups Encryption Simmetric Public key / certificates IDS/IPS/Honeypots Social Engineering Awareness End-point protection 28 28. Cybersecurity (4) Penetration testing Proactive protection Web security29 29. Jobs Security Analyst Security Engineer Security Architect Security Administrator Chief Information Security Officer Security Consultant/Expert 30 30.

Recommended

View more >