M A H D IH A M E D I M A H D IH A M E D I

Transcription

M A H D IH A M E D I M A H D IH A M E D I
MAHDI HAMEDI ©
Denial or Degradation of Service(*)
Trashing or Dumpster diving(*)
Eavesdropping on Emanations
Inference
MAHDI HAMEDI ©
Wiretapping
Leakage
Masquerading(*)
Piggybacking
MAHDI HAMEDI ©
Social Engineering
Harassment
Software Piracy
Child Pornography
Hate Crime
MAHDI HAMEDI ©
Unauthorized Copying of Data
Traffic Analysis
Covert Channels
Trap Doors(*)
Session Hijacking
Tunneling
Timing Attacks
Trojan Horses(*)
Viruses and Worms
Salamis(*)
Embezzlement
Logic Bombs
Espionage
MAHDI HAMEDI ©
IP Spoofing
Password Sniffing(*)
Scanning (war dialing)
Excess Privileges
Data Diddling
(False Data Entry)
MAHDI HAMEDI ©
Access
Control
Communication
Security
Availability
Non
repudiation
Data Integrity
Data
Confidentiality
Privacy
MAHDI HAMEDI ©
Authentication
password, ACL, firewall
MAHDI HAMEDI ©
role based access control
MAHDI HAMEDI ©
shared secret, PKI, digital signature,
digital certificate
MAHDI HAMEDI ©
obligation
intent
commitment
data orgin
ownership
resource
system logs, digital signatures
encryption
MAHDI HAMEDI ©
Security Communication
VPN, MPLS, L2TP
MAHDI HAMEDI ©
MAHDI HAMEDI ©
MD5, digital signature, anti-virus software
MAHDI HAMEDI ©
IDS/IPS, network
redundancy, BC/DR
MAHDI HAMEDI ©
NAT, encryption
MAHDI HAMEDI ©
MAHDI HAMEDI ©
MAHDI HAMEDI ©
MAHDI HAMEDI ©
MAHDI HAMEDI ©
www.cert.org
www.nw3c.org
www.HTCIA.org
www.hightechcrimecops.org
www.NTCP.org
www.NAAG.org 24/7 point of contact
www.cybercrimes.net state prosecutors
www.nlectc.org/links/lelinks.html
www.coe.fr/index.asp
MAHDI HAMEDI ©
www.fata.ir
www.afta.ir
www.amnafzar.com
www.itna.ir
www.simorgh-ev.com
www.itrc.ac.ir
nsc.sharif.edu
www.mehransecurity.com
www.sgnec.net
www.srco.ir
MAHDI HAMEDI ©
This document was created with Win2PDF available at http://www.daneprairie.com.
The unregistered version of Win2PDF is for evaluation or non-commercial use only.

Similar documents