Академический Документы
Профессиональный Документы
Культура Документы
--------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------
Types of Attacks:
--------------------------------------------------------------------------------------------------------
Browser Technologies used as attacking holes
--------------------------------------------------------------------------------------------------------
Adaware / Grayware / Spyware
--------------------------------------------------------------------------------------------------------
Types of Network Attacks:
TCP-IP Attcaks:
--------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------
Password Protection
Password Policy
Data Backups
All file systems keep track of resources, but only file systems with journals
can log access by user, date, and time. The FAT 32 file system, shown in
Figure 3, which is used in some versions of Windows, lacks both
journaling and encryption capabilities. As a result, situations that
require good security are usually deployed using a file system such as
NTFS, which is part of Windows 2000 and Windows XP. If increased
security is needed, it is possible to run certain utilities, such as CONVERT,
to upgrade a FAT 32 file system to NTFS. The conversion process is not
reversible. It is important to clearly define your goals before making the
transition.
Wireless Security:
Google: Honeypot