Wednesday, 9 January 2019

System & Network Threats Security

  • Worms - use spawn mechanism; standalone program
  • Internet worm
 - Exploited UNIX networking features (remote access) and bugs in finger and send-mail programs. (See next slide)
          - Grappling hook program uploaded main worm program
  • Port scanning
          - Automated attempt to connect to a range of ports on one or a range of IP addresses
  • Denial of Service
           - Overloaded the targeted computer preventing it from doing any useful work.
           - Distributed denial-of-service (DDOS) come from multiple sites at once.



0 Comments:

Post a Comment

Popular Posts

Categories

100 Python Programs for Beginner (68) AI (34) Android (24) AngularJS (1) Assembly Language (2) aws (17) Azure (7) BI (10) book (4) Books (174) C (77) C# (12) C++ (82) Course (67) Coursera (228) Cybersecurity (24) data management (11) Data Science (128) Data Strucures (8) Deep Learning (21) Django (14) Downloads (3) edx (2) Engineering (14) Excel (13) Factorial (1) Finance (6) flask (3) flutter (1) FPL (17) Google (34) Hadoop (3) HTML Quiz (1) HTML&CSS (47) IBM (25) IoT (1) IS (25) Java (93) Leet Code (4) Machine Learning (60) Meta (22) MICHIGAN (5) microsoft (4) Nvidia (4) Pandas (4) PHP (20) Projects (29) Python (944) Python Coding Challenge (388) Python Quiz (41) Python Tips (3) Questions (2) R (70) React (6) Scripting (1) security (3) Selenium Webdriver (4) Software (17) SQL (42) UX Research (1) web application (8) Web development (4) web scraping (2)

Followers

Person climbing a staircase. Learn Data Science from Scratch: online program with 21 courses