- 1、本文档共107页,可阅读全部内容。
- 2、有哪些信誉好的足球投注网站(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
part2 信息技术基础2011.ppt
Radio frequency bands are easy to scan The service set identifiers (SSID) identifying the access points broadcast multiple times SYSTEM VULNERABILITY AND ABUSE Wireless Security Challenges: 4 安全和控制 SYSTEM VULNERABILITY AND ABUSE Wi-Fi Security Challenges Figure 10-2 4 安全和控制 Computer viruses, worms, trojan horses Spyware Spoofing and Sniffers Denial of Service (DoS) Attacks Identity theft Cyberterrorism and Cyberwarfare Vulnerabilities from internal threats (employees); software flaws SYSTEM VULNERABILITY AND ABUSE Malicious Software: Viruses, Worms, Trojan Horses, and Spyware Hackers and Cybervandalism 4 安全和控制 SYSTEM VULNERABILITY AND ABUSE Worldwide Damage from Digital Attacks Figure 10-3 4 安全和控制 Inadequate security and control may create serious legal liability. Businesses must protect not only their own information assets but also those of customers, employees, and business partners. Failure to do so can lead to costly litigation for data exposure or theft. A sound security and control framework that protects business information assets can thus produce a high return on investment. BUSINESS VALUE OF SECURITY AND CONTROL 4 安全和控制 Security Incidents Continue to Rise BUSINESS VALUE OF SECURITY AND CONTROL Figure 10-4 Source: CERT Coordination Center, , accessed July 6, 2004. 4 安全和控制 TECHNOLOGIES AND TOOLS FOR SECURITY AND CONTROL A Corporate Firewall Figure 10-7 4 安全和控制 Public key encryption: Uses two different keys, one private and one public. The keys are mathematically related so that data encrypted with one key can be decrypted using only the other key Message integrity: The ability to be certain that the message being sent arrives at the proper destination without being copied or changed TECHNOLOGIES AND TOOLS FOR SECURITY AND CONTROL Encryption and Public Key Infrastructure 4 安全和控制 Digital signature: A digital code attached to an electronically transmitted message that is used to verify the origin and contents of a message Digital
文档评论(0)