M A H D IH A M E D I M A H D IH A M E D I
Transcription
M A H D IH A M E D I M A H D IH A M E D I
MAHDI HAMEDI © Denial or Degradation of Service(*) Trashing or Dumpster diving(*) Eavesdropping on Emanations Inference MAHDI HAMEDI © Wiretapping Leakage Masquerading(*) Piggybacking MAHDI HAMEDI © Social Engineering Harassment Software Piracy Child Pornography Hate Crime MAHDI HAMEDI © Unauthorized Copying of Data Traffic Analysis Covert Channels Trap Doors(*) Session Hijacking Tunneling Timing Attacks Trojan Horses(*) Viruses and Worms Salamis(*) Embezzlement Logic Bombs Espionage MAHDI HAMEDI © IP Spoofing Password Sniffing(*) Scanning (war dialing) Excess Privileges Data Diddling (False Data Entry) MAHDI HAMEDI © Access Control Communication Security Availability Non repudiation Data Integrity Data Confidentiality Privacy MAHDI HAMEDI © Authentication password, ACL, firewall MAHDI HAMEDI © role based access control MAHDI HAMEDI © shared secret, PKI, digital signature, digital certificate MAHDI HAMEDI © obligation intent commitment data orgin ownership resource system logs, digital signatures encryption MAHDI HAMEDI © Security Communication VPN, MPLS, L2TP MAHDI HAMEDI © MAHDI HAMEDI © MD5, digital signature, anti-virus software MAHDI HAMEDI © IDS/IPS, network redundancy, BC/DR MAHDI HAMEDI © NAT, encryption MAHDI HAMEDI © MAHDI HAMEDI © MAHDI HAMEDI © MAHDI HAMEDI © MAHDI HAMEDI © www.cert.org www.nw3c.org www.HTCIA.org www.hightechcrimecops.org www.NTCP.org www.NAAG.org 24/7 point of contact www.cybercrimes.net state prosecutors www.nlectc.org/links/lelinks.html www.coe.fr/index.asp MAHDI HAMEDI © www.fata.ir www.afta.ir www.amnafzar.com www.itna.ir www.simorgh-ev.com www.itrc.ac.ir nsc.sharif.edu www.mehransecurity.com www.sgnec.net www.srco.ir MAHDI HAMEDI © This document was created with Win2PDF available at http://www.daneprairie.com. The unregistered version of Win2PDF is for evaluation or non-commercial use only.