- 1、本文档共26页,可阅读全部内容。
- 2、有哪些信誉好的足球投注网站(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Web Security.ppt
Web Security Martin Nystrom, CISSP Security Architect Cisco Systems, Inc. mnystrom@ Who am I? Security Architect in Cisco’s InfoSec Responsible for consulting with application teams to secure their architecture Monitor for infrastructure vulnerabilities Infrastructure security architect 12 years developing application architectures Java programmer Master of Engineering – NC State University Bachelor’s - Iowa State University – (1990) Why worry? G sanctioned by FTC for exposing private information “…permitting anyone able to construct a properly-crafted URL to pull down every name, credit card number and expiration date in the sites customer database.” U.S. Army systems hacked using WebDAV vulnerability in IIS “…it was a disturbingly successful attack, experts say, because the intruder found and exploited a flaw that took security researchers completely by surprise. “ Millions of credit card numbers compromised at Data Processors International All indications are the attack on this companys (Internet) address came from the outside, and efforts continue to analyze this attack to see if it could be traced to the attacker, the investigator said. Utah ISP is victim of retaliation following hackers attack on Al-Jazeera “…impersonating an Al-Jazeera employee, tricked the Web addressing company Network Solutions into making technical changes that effectively turned over temporary control of the networks Arabic and English Web sites...? Why worry? (cont.) The goal of an attack Steal data Blackmail Beachhead for other attacks Bragging rights Vandalism Demonstrate vulnerability/satisfy curiosity Damage company reputation A word of warning These tools and techniques can be dangerous The difference between a hacker and a cracker is…permission Admins will see strange activity in logs, and come looking for you Authorities are prosecuting even the “good guys” for using these tools Commonly attacked services SMTP servers (port 25) sendmail: “The address parser performs insuff
您可能关注的文档
- REGIONAL TIR SEMINAR Sofia, 11 and 12 May 2006.ppt
- Research themes.ppt
- RESSETDB应用.ppt
- Review of Units 1-6.ppt
- Review Unit Four.ppt
- Risk, Cost of Capital and Capital BudgetingChapter 12.ppt
- Roger A Rosenblatt February 12, 2004.ppt
- Running a race at 12,000 feet.ppt
- SB1 UNIT 8.ppt
- Scales and MeasurementChapters 11, 12.ppt
文档评论(0)