งานนำเสนอ PowerPoint - Siam Techno

งานนำเสนอ PowerPoint - Siam Techno

.. [email protected] www.charm.au.edu

.

2 (Information Systems Information Systems Intrusion Detection and Related CounterMeasures) 1. 2. 3.

4. 3 (Information Systems ) 5. 6. 7.

4 1. 1.1 1.2 1.3 5

1.1 - - - 6

(Information Systems ) - (Information Systems Recovery) - (Information Systems Firewall) 7

(Information Systems ) - (Information Systems Intrusion Detection System) - (Information Systems Access Control) 8 (Information Systems )

1) (Information Systems Availability) 2) (Information Systems Accuracy) 3) (Information Systems Authenticity) 4) (Information Systems Confidentially) 5) (Information Systems Integrity) 6) (Information Systems Utility) 7) (Information Systems Possession) 9 1.2

10 (Information Systems )

11 (Information Systems 1)

(Information Systems Senior Security Management) (Information Systems 2) (Information Systems Security Project Team) (Information Systems 3) (Information Systems Data Owners and Users) 12 (Information Systems 1)

(Information Systems Senior Security Management) (Information Systems CIO = Chief Information Officer) 13 (Information Systems )

(Information Systems CISO = Chief Information Security Officer) 14 (Information Systems 2)

15 (Information Systems 3)

16 1.3 17

(Information Systems ) 24 18 2.

2.1 2.2 19 2.1 1)

(Information Systems Espionage, Trespass) 2) (Information Systems Information Extortion) 3) (Information Systems Sabotage, Vandalism) 20 (Information Systems ) 4) (Information Systems Theft)

5) (Information Systems Software Attack)) 6) (Information Systems Password Crack)) 7) (Information Systems IP Address) 21 (Information Systems )

8) (Information Systems Spam and Mail Bombing) 9) (Information Systems Social Engineering) 10) (Information Systems Buffer Overflow) 22 1)

(Information Systems Espionage, Trespass) 23

- (Information Systems Competitive Intelligence) - (Information Systems Industrial Espionage) 24 (Information Systems ) -

(Information Systems Shoulder Surfing) - (Information Systems Trespass) - (Information Systems Hack)ing) 25 2) (Information Systems Information Extortion) (Information Systems 1) (Information Systems Ransom)

(Information Systems 2) (Information Systems Credit Card) (Information Systems 3) (Information Systems Black)mail) 26 3) (Information Systems Sabotage, Vandalism)

27 28

4) (Information Systems Theft) 29 (Information Systems )

(Information Systems 1) (Information Systems 2) (Information Systems 3) 30 (Information Systems 1)

| - - 31

32 (Information Systems 2)

- - 33 (Information Systems )

34

35 (Information Systems 3) - -

- - 36

37 5) (Information Systems Software Attack))

38 (Information Systems ) (Information Systems Malware = Malicious Software)

39 (Information Systems 1) (Information Systems Viruses) (Information Systems 2) (Information Systems Worms) (Information Systems 3) (Information Systems Macro Virus) (Information Systems 4) (Information Systems Trojan Horse) (Information Systems 5) (Information Systems Denial-of-Service) 40

(Information Systems ) (Information Systems 6) (Information Systems Back) Door) (Information Systems 7) (Information Systems Polymorphism) (Information Systems 8) (Information Systems Virus and Worm Hoaxes) 41 (Information Systems 1) (Information Systems Viruses)

3 - - - 42 (Information Systems 2) (Information Systems Worms)

43 (Information Systems 3) (Information Systems Macro Virus)

44 (Information Systems 4) (Information Systems Trojan Horse)

45 (Information Systems 5) (Information Systems Dinial-of-Service)

46 (Information Systems 6) (Information Systems Back) Door)

47 (Information Systems 7) (Information Systems Polymorphism) 48

(Information Systems 8) (Information Systems Virus and Worm Hoaxes)

49 (Information Systems ) 100 50

6) (Information Systems Password Crack)) (Information Systems 1) (Information Systems Password Crack)) (Information Systems 2) (Information Systems Brute Force) (Information Systems 3) (Information Systems Dictionary) 51 (Information Systems 1) (Information Systems Password Crack))

- - - - 52 6

53 (Information Systems 2) (Information Systems Brute Force) -

- 1 A-Z - 54 (Information Systems )

55 (Information Systems 3) (Information Systems Dictionary)

56 7) (Information Systems IP Address) (Information Systems 1) (Information Systems Spoofing) (Information Systems 2) (Information Systems TCP Hijack)ing Attack)) (Information Systems 3)

(Information Systems Sniffers) 57 (Information Systems 1) (Information Systems Spoofing)

58

59 (Information Systems 2) (Information Systems TCP Hijack)ing Attack))

60 (Information Systems ) 61

(Information Systems 3) (Information Systems Sniffers) (Information Systems Sniffers) 62

(Information Systems ) 63 8)

(Information Systems Spam and Mail Bombing) (Information Systems 1) (Information Systems Spam) (Information Systems 2) (Information Systems Mail Bomb) 64 (Information Systems 1) (Information Systems Spam)

65 (Information Systems 2) (Information Systems Mail Bomb)

66 (Information Systems )

67 9) (Information Systems Social Engineering) (Information Systems 1) (Information Systems Higher Person) (Information Systems 2)

(Information Systems Employee Being Fired) (Information Systems 3) (Information Systems Threaten or Beg) 68 10) (Information Systems Buffer Overflow) (Information Systems Cahce)

69 (Information Systems )

70 2.2 1) (Information Systems Human Error, Failure)

2) (Information Systems Forces of Nature) 3) (Information Systems Quality of Services) 71 (Information Systems ) 4) (Information Systems Technical Hardware Failure and Error) 5)

(Information Systems Technical Software Failure and Error ) 6) (Information Systems Technological Obsolescence) 72 1) (Information Systems Human Error, Failure) (Information Systems 1) (Information Systems 2)

(Information Systems 3) (Information Systems 4) (Information Systems 5) 73 (Information Systems 1)

74 (Information Systems 2)

75 (Information Systems 3)

76 (Information Systems 4)

- - - 77

300 3,000 78 (Information Systems 5)

79

80 2) (Information Systems Forces of Nature)

81 (Information Systems Volcano Eruption) (Information Systems Flood) (Information Systems Earthquak)e)

(Information Systems Lightning) 82 3) (Information Systems Quality of Services)

83 4) (Information Systems Technical Hardware Failure and Error)

84 5) (Information Systems Technical Software Failure and Errors)

(Information Systems Windows Operating Systems) 85 (Information Systems ) (Information Systems Applications)

86 (Information Systems )

- (Information Systems Logical) - (Information Systems Language) - (Information Systems Loopholes) 87 6) (Information Systems Technological Obsolescence) (Information Systems 1)

(Information Systems Antiquated Technology) (Information Systems 2) (Information Systems Outdated Technology) 88 (Information Systems 1) (Information Systems Antiquated Technology) (Information Systems DOS = Disk) Operating

System) (Information Systems Windows) 89 (Information Systems 2) (Information Systems Outdated Technology)

2003 (Information Systems Windows2003 Server) 90 (Information Systems ) 2003

91 3. 1) (Information Systems Business Impact Analysis) 2) (Information Systems Incident Response Planning)

92 (Information Systems ) 3) (Information Systems Disaster Recovery Planning) 4) (Information Systems Business Continuity Planning) 93

3.1 5 1) 2) 3) 4) 5)

94 1) 95

2) 96 3)

97 4)

(Information Systems ) 98 5)

99 3.2

100 (Information Systems ) 2 1) (Information Systems Passive Attack)) 2) (Information Systems Active Attack)) (Information Systems IR = Incident Response)

101 4 1) (Information Systems Planning) 2) (Information Systems Detection) 3) (Information Systems Reaction) 4) (Information Systems Recovery)

102 3.3 1) (Information Systems Disaster Recovery Plan) 2) (Information Systems Crisis Management) 3) (Information Systems Recovery Operations) 103

1) 104 (Information Systems )

- - 105 5

1) 2) 3) 4) 5) 106 2)

107 (Information Systems )

(Information Systems 1) (Information Systems 2) (Information Systems 3) 108 (Information Systems 1)

109 (Information Systems 2)

110 (Information Systems 3)

111 (Information Systems )

112 113

- - 114 3)

115 1) 2) 3)

4) 5) 6) 7) 116 3.4

117 (Information Systems )

(Information Systems 1) (Information Systems 2) (Information Systems 3) 118 (Information Systems 1)

(Information Systems Exclusive Option) (Information Systems ShareFunction) 119 (Information Systems Exclusive Option) (Information Systems Hot Site) (Information Systems Warm Site)

(Information Systems Cold Site) 120 (Information Systems Hot Site)

- - 121 (Information Systems Warm Site)

122 (Information Systems Cold Site)

- - 123 (Information Systems )

- - - 124

(Information Systems Share-Function) (Information Systems TimeShare) (Information Systems Service-Bureaus) (Information Systems Mutual Agreements) 125 (Information Systems Time-Share)

126 (Information Systems )

127 (Information Systems ServiceBureaus)

128 (Information Systems Mutual

Agreements) 2 129 (Information Systems )

130 (Information Systems 2)

131 (Information Systems )

132 (Information Systems 3)

- - - 133 4. 4.1

4.2 134 4.1 1) 2) 135 1)

(Information Systems en.wik)ipedia.org) 136

(Information Systems ) - 137

5 (Information Systems 1) (Information Systems Pack)et Filtering Firewall) (Information Systems 2) (Information Systems Application-Level Firewall) 138

(Information Systems ) (Information Systems 3) (Information Systems Circuit Gateway Firewall) (Information Systems 4) (Information Systems MAC Layer Firewall) (Information Systems 5) (Information Systems Hybrid Firewall) 139

2) (Information Systems 1) (Information Systems Security Technologies) (Information Systems 2) (Information Systems Physical Security) 140 (Information Systems )

- - - 141 (Information Systems )

142 4.2 1) (Information Systems Factor)

2) (Information Systems Cost) 143 1)

144 (Information Systems ) 3 (Information Systems 1) (Information Systems 2) (Information Systems 3)

145 (Information Systems 1)

146 (Information Systems )

147 (Information Systems )

148 (Information Systems 2) - -

- - 149 (Information Systems ) - - - -

- 150 (Information Systems 3) - -

151 (Information Systems ) - -

- 152 2)

153 (Information Systems )

154 (Information Systems )

- (Information Systems Virtual Private Network)) 155 (Information Systems ) - -

156 (Information Systems )

157 5. 5.1 5.2

5.3 158 5.1

(Information Systems IDS = Intrusion Detection System) 159 1) 2) 3)

4) 5) 6) 160 1)

161 2)

- -

162 (Information Systems ) -

(Information Systems Smart IDS) 163 (Information Systems )

164 3) 165

(Information Systems ) - -

166

167 (Information Systems ) (Information Systems Mission Impossible)

168 (Information Systems ) (Information Systems Doork)nob Rattling)

(Information Systems Footprinting) 169 (Information Systems ) (Information Systems Fingerprinting)

170 (Information Systems )

171 (Information Systems )

172 4)

173 (Information Systems )

174 (Information Systems )

175 (Information Systems )

(Information Systems Snort) 176 5)

177 (Information Systems )

178 (Information Systems )

179 (Information Systems )

180 6)

181 (Information Systems ) - - -

182 (Information Systems )

183 5.2 5.2.1 5.2.2 5.2.3 5.2.4 184

5.2.1 185

(Information Systems ) (Information Systems Honey Pot) 186

(Information Systems ) 187 (Information Systems )

- - 188 (Information Systems )

189

(Information Systems Honey Net) 190

191

(Information Systems Sensitive Monitor) 192

193

(Information Systems Service Pack)) 194

(Information Systems ) 195 (Information Systems )

- - 196 (Information Systems )

197

198

199 (Information Systems NFR) (Information Systems Single Honey Pot) (Information Systems Tiny Honey Pot)

200 5.2.2

201 (Information Systems )

202

203

204

205 5.2.3 (Information Systems Honey Pot and Honey Net) (Information Systems Padded

Cell) 206 (Information Systems ) (Information Systems Honey Pot and Honey

Net) (Information Systems Padded Cell) (Information Systems Alarm System) 207 (Information Systems Trace System)

(Information Systems Caller ID) 208

209 (Information Systems )

210 (Information Systems )

211 (Information Systems 1) (Information Systems ManHunt) (Information Systems 2) (Information Systems ManTrap) 212

(Information Systems 1) (Information Systems ManHunt) 213 (Information Systems )

214

(Information Systems 2) (Information Systems ManTrap) (Information Systems Honey Pot) 215 (Information Systems )

216 (Information Systems 1)

(Information Systems Back) Hack)) (Information Systems 2) (Information Systems Entrapment) (Information Systems 3) (Information Systems Wasp Trap Syndrome) 217 (Information Systems 1)

218 (Information Systems ) (Information Systems IP

Spoofing) 219 (Information Systems 2)

(Information Systems Enticement) (Information Systems Entrapment) 220

221 (Information Systems )

222 (Information Systems 3)

223

(Information Systems ) 224 5.2.4

(Information Systems LaBrea) 225 (Information Systems LaBrea) (Information Systems Open

Source) 226 (Information Systems )

227

(Information Systems ) 228

5.3 5.3.1 5.3.2 5.3.3 5.3.4 229 5.3.1

230 (Information Systems )

(Information Systems URL = Uniform Resource Locator) 231 (Information Systems )

- - - 232 (Information Systems )

(Information Systems Code) 233 (Information Systems )

- - - 234 (Information Systems )

- - - - (Information Systems Search Engine)

235

236 (Information Systems )

237 (Information Systems )

238 (Information Systems )

239 (Information Systems ) (Information Systems Sam Spade)

- - 240 (Information Systems )

- (Information Systems Scan) - (Information Systems Probe) - (Information Systems Ping) - (Information Systems Traceroute) 241 5.3.2

242 (Information Systems )

- - - - - 243 (Information Systems )

244 (Information Systems )

(Information Systems Nmap) (Information Systems www.insecure.org) 245 (Information Systems )

(Information Systems Connection Point) - 20 21 (Information Systems FTP = File Transfer Protocol) 246

(Information Systems ) - 22 (Information Systems Secure SHell) - 23 (Information Systems Telnet) - 25 (Information Systems SMTP = Simple Mail Transfer Protocol) - 53 (Information Systems DNS = Domain Name Services) 247

(Information Systems ) - 67 68 (Information Systems DHCP = Dynamic Host Configuration Protocol) - 80 (Information Systems HTTP = Hypertext Transfer Protocol) - 110 (Information Systems POP 3 = Post Office Protocol) 248

(Information Systems ) 1023 249

(Information Systems ) 80

250 5.3.4 1) 2) 3) 4) (Information Systems Nmap) (Information Systems Firewalk)) (Information Systems Hping)

251 1) - -

252 (Information Systems ) 253

(Information Systems ) 254

(Information Systems ) 255

2) (Information Systems Nmap) (Information Systems Nmap = Network) Mapper) (Information Systems Idle Scanning) 256

(Information Systems ) (Information Systems Operating Systems) (Information Systems IP ID = IP Pack)et Identification Number) - (Information Systems DMZ = Demilitarized Zone) 257

(Information Systems ) - - * * 258

(Information Systems ) 259

(Information Systems ) - -

260 3) (Information Systems Firewalk)) (Information Systems Mik)e Schiffman) (Information Systems TTL = Time-to-Live)

261 (Information Systems )

(Information Systems www.pack)etfactory.net) 262 4) (Information Systems Hping) - -

(Information Systems Salvatore Sanfilippo) 263 (Information Systems ) (Information Systems Audit) (Information Systems Test) - - (Information Systems Idle Scan)

264 (Information Systems ) (Information Systems www.hping.org)

265 5.3.4

266 (Information Systems ) (Information Systems XProbe) (Information Systems ICMP = Internet Control Message Protocol)

- (Information Systems www.sys-security.com) 267 5.4 5.4.1 5.4.2

268 5.4.1 269

(Information Systems ) - (Information Systems Username) - (Information Systems Network) Shares) - (Information Systems Configuration Problems) - (Information Systems Server Vulnerability)

270 1) (Information Systems Network) Security Scanner) 2) (Information Systems Nessus) 3) (Information Systems Black)box Scanner) 271 1) (Information Systems Network)

Security Scanner) 272

(Information Systems )

273

274 (Information Systems ) 275

2) (Information Systems Nessus) .. 2541 (Information Systems Renaud Deraison) 276 (Information Systems )

- - - - - - - 277 (Information Systems )

278 (Information Systems )

75,000 279 (Information Systems 1) (Information Systems 2)

(Information Systems 3) (Information Systems 4) 280 (Information Systems ) (Information Systems 5) (Information Systems NASL = Nessus Attack) Scripting

Language) (Information Systems 6) 8080 281 (Information Systems ) (Information Systems 7)

(Information Systems 8) (Information Systems 9) 282 3) (Information Systems Black)box Scanner)

(Information Systems Fuzzer) 283

(Information Systems ) 284 (Information Systems )

(Information Systems SPIKE) 2 (Information Systems 1) (Information Systems SPIKE Proxy) (Information Systems 2) (Information Systems SPIKE Script) 285

(Information Systems 1) (Information Systems SPIKE Proxy) 286

(Information Systems ) 287

(Information Systems 1) (Information Systems 2) 288

(Information Systems ) (Information Systems 3) (Information Systems 4) (Information Systems 5) (Information Systems 6) (Information Systems 7)

289 (Information Systems 2) (Information Systems SPIKE Script)

290 5.4.2

24 291 (Information Systems )

292 1) (Information Systems Tenable Network) Security) 2)

(Information Systems Sourcefire Network) Security) 293 1) (Information Systems Tenable Network) Security) (Information Systems NeVO = Network)

Vulnerability Observer) 294 2) (Information Systems Sourcefire Network) Security) (Information Systems RNA = Real-Time Network) Awareness) 295

(Information Systems ) 296

(Information Systems ) - - 297

(Information Systems ) - - - 298

1) 2) 3) 4) 299

(Information Systems ) 5) 6) 7) 300 1)

- - - 301 2)

302 3)

303 4)

- - - - 304 5)

- - - 305 6)

306 7) 3.0 (Information Systems RedHat ES 3.0)

/2000 (Information Systems Windows XP/2000) (Information Systems FreeBSD 4.x) 307 6. 6.1 6.2

6.3 308 6.1 .. 2551

309 (Information Systems ) 4 6.1.1 (Information Systems What He Know) 6.1.2 (Information Systems What He Has)

6.1.3 (Information Systems Who He Is) 6.1.4 (Information Systems What He Produces) 310 6.1.1 (Information Systems What He Knows) 1) (Information Systems Password) 2)

(Information Systems Passphrase) 3) (Information Systems Secretpass) 311 6.1.2 (Information Systems What He Has)

312 (Information Systems ) 1) (Information Systems Magnetic Cards) 2) (Information Systems Smart Cards) 3) (Information Systems RFID) 4) (Information Systems Tok)ens) 313

1) (Information Systems Magnetic Cards) - (Information Systems ) - (Information Systems ) 314

2) (Information Systems Smart Cards) 315 3) (Information Systems RFID)

(Information Systems Radio Frequency IDentification) (Information Systems Wireless Automatic Identification) 316 (Information Systems )

317 4) (Information Systems Tok)ens)

(Information Systems LCD = Liquid Crystal Display) 318 (Information Systems )

(Information Systems 1) (Information Systems Synchronous Tok)ens) (Information Systems 2) (Information Systems Asynchronous Tok)ens) (Information Systems 3) (Information Systems Secure Tok)ens) 319 (Information Systems 1)

3,600 60 60 60

320 (Information Systems 2) 321

(Information Systems 3)

322 6.1.3 (Information Systems Who He Is)

(Information Systems Biometrics) 323 (Information Systems ) 1) (Information Systems Fingerprint) 2) (Information Systems Retina)

3) (Information Systems Iris) 324 1) (Information Systems Fingerprint) 1

2 325 (Information Systems )

326

- - 327 (Information Systems ) - -

- 3 328 2) (Information Systems Retina)

329 (Information Systems )

330 (Information Systems )

331 3) (Information Systems Iris)

332

333 6.1.4 (Information Systems What He Produces) 1) (Information Systems Signature) 2) (Information Systems Voice)

334 1) (Information Systems Signature)

335 (Information Systems ) - -

- 336 2) (Information Systems Voice)

337 (Information Systems ) -

- - 338 6.2

339 (Information Systems )

340 (Information Systems ) 11 .. 2544

341 (Information Systems ) -

342 (Information Systems ) - - -

343 3 1) (Information Systems FRR = False Reject Rate) 2) (Information Systems FAR = False Accept Rate) 3) (Information Systems CER = Crossover Error Rate) 344

1) (Information Systems FRR = False Reject Rate)

345 (Information Systems ) -

- 346 (Information Systems ) - (Information Systems Fingerprint) - (Information Systems Credit

Card) 347 2) (Information Systems FAR = False Accept Rate) 0.001

348 (Information Systems )

349 3) (Information Systems CER = Crossover Error Rate)

350 (Information Systems )

351 (Information Systems )

352 353 6.3

1) (Information Systems Keystrok)e Recognition) 2) (Information Systems Signature Recognition) 3) (Information Systems Voice Pattern Recognition) 354 (Information Systems )

4) (Information Systems Handprint Recognition) 5) (Information Systems Fingerprint Recognition) 6) (Information Systems Retina Pattern Recognition) 355 1)

356 (Information Systems )

357

(Information Systems )

358 (Information Systems ) - - -

- 359 2)

360 (Information Systems )

361 3) 362

(Information Systems 1) (Information Systems Stochastic Model) (Information Systems 2) (Information Systems Hidden Mark)ov Model) 363 (Information Systems 1)

364 (Information Systems 2)

365 4)

(Information Systems ICR = Intelligent Character Recognition) 366

(Information Systems ) 80 367

(Information Systems ) 18 60 60 7,200 368

5) - - -

369 (Information Systems ) (Information Systems Hyperladder)

370 6) 371

(Information Systems ) (Information Systems Opto-Electronic Sensors)

372 7.

373 (Information Systems ) - -

- - 374 (Information Systems )

375

Recently Viewed Presentations

  • Scattering Theory - Correlation (Read Roe, section 1.5)

    Scattering Theory - Correlation (Read Roe, section 1.5)

    Title: PowerPoint Presentation Author: Earle Ryba Last modified by: Earle Ryba Created Date: 9/1/2004 12:57:59 PM Document presentation format: On-screen Show
  • Fossil Fuel Management - lee.k12.nc.us

    Fossil Fuel Management - lee.k12.nc.us

    Coal. Coal is the . most abundant. and . least expensive. of the fossil fuels. It is also the . most popular, accounting for almost 40 per cent of the total worldwide power generation
  • The Moon - SMAS

    The Moon - SMAS

    Moon Facts. The moon is the only natural satellite of the earth. The moon is about 25% the size of the earth. It is in synchronous rotation with the earth. One rotation of the moon equals the time for the...
  • Cattle ranching- is the leading cause of deforestation

    Cattle ranching- is the leading cause of deforestation

    Cattle ranching- is the leading cause of deforestation in the Amazon rainforest. In Brazil, this has been the case since at least the 1970s: government figures show 38% of deforestation from 1966-1975 was due to large-scale cattle ranching. Today the...
  • DIMENSIONS - unifr.ch

    DIMENSIONS - unifr.ch

    1972-75 Primary school teacher (Locarno, Switzerland) 1975-79 Graduation in Biology UNI Zuerich, Switzerland ... Nov 2000 Aebischer, 2000 2001, ONYX oncolytic Viruses D Kirn (Gene Ther 8, p 89-98) Kirn, 2001 Clinical trials with ONYX-015, what we learned? (Review) a...
  • Ders 6 - Akademik Bilişim

    Ders 6 - Akademik Bilişim

    Bilimsel araştırma alanlarını temsil etmek üzere seçilir Bilimsel Dergiler Bilimsel iletişime katkı sağlayan yazarlar Bu yazarların ürettiği eserler Oeuvre: Belli bir yazara ait yayın grubu (White, 2003-pearson r) Atıf dizinlerinde yazar isimleri yazarların çalışmalarının bir alt grubuna karşılık gelir (McCain,...
  • What is OPVL?

    What is OPVL?

    All the trenches had fallen in, and our men just lay about in shell holes. The Hun treated us to aerial darts and grenades and we had a few casualties, chiefly in my platoon. Written by: Robert Lindsay Mackay -...
  • Questions and Answers

    Questions and Answers

    This map uses Thiessen polygons to construct regions: in this case, obstetrical delivery hospital regions. This technique can be utilized with little technology, using nodal points to construct polygons and, ultimately, regions. Source: "Using Geographic Methods to Understand Health Issues,"...