Wednesday 9 January 2019

System & Network Threats Security

  • Worms - use spawn mechanism; standalone program
  • Internet worm
 - Exploited UNIX networking features (remote access) and bugs in finger and send-mail programs. (See next slide)
          - Grappling hook program uploaded main worm program
  • Port scanning
          - Automated attempt to connect to a range of ports on one or a range of IP addresses
  • Denial of Service
           - Overloaded the targeted computer preventing it from doing any useful work.
           - Distributed denial-of-service (DDOS) come from multiple sites at once.



0 Comments:

Post a Comment

Popular Posts

Categories

AI (27) Android (24) AngularJS (1) Assembly Language (2) aws (17) Azure (7) BI (10) book (4) Books (114) C (77) C# (12) C++ (82) Course (60) Coursera (176) coursewra (1) Cybersecurity (22) data management (11) Data Science (89) Data Strucures (6) Deep Learning (9) Django (6) Downloads (3) edx (2) Engineering (14) Excel (13) Factorial (1) Finance (5) flutter (1) FPL (17) Google (19) Hadoop (3) HTML&CSS (46) IBM (25) IoT (1) IS (25) Java (92) Leet Code (4) Machine Learning (44) Meta (18) MICHIGAN (5) microsoft (3) Pandas (3) PHP (20) Projects (29) Python (741) Python Coding Challenge (191) Questions (2) R (70) React (6) Scripting (1) security (3) Selenium Webdriver (2) Software (17) SQL (40) UX Research (1) web application (8)

Followers

Person climbing a staircase. Learn Data Science from Scratch: online program with 21 courses