학교47 Lecture 3: Denial of Service and Botnets 목차 Attacks on Availability in the OSI Model Availability can be attacked on every layer ofthe model. The best-known attack is a DDoS attack, overwhelming a system with a lot of traffic. Background - Network layer IP datagrams can be exchanged between any two nodes (provided they both have an IP address) The server determines who sent the packet based on the Source IP. IP 스푸핑이란 IP (Internet Proto.. 2024. 3. 3. Lecture 2: Network Security Physical Layer 목차 Network Security Network security is the protection of the underlying networking infrastructure from unauthorized access, misuse, or theft. It involves creating a secure infrastructure for devices, users, and applications to wokr in a secure manner. A Network A network consists of two or more computers that are linked to share resources, exchange files, or allow electronic communications. The.. 2024. 3. 3. Lecture 1: Introduction to Computer Security 목차 What is security? Computer security deals with protecting data, programs, and systems against intelligent adversaries. Safety vs Security: - Safety means being secure against unintended threats - Security is the protection against deliberate threats. Why is security hard? Security is hard to test for. Building secure applications requires deep understanding of all technologies involved in the.. 2024. 3. 3. Lecture 2: Requirements & Elicitation & Analysis 목차 Requirements A requirement is something the product must do or a quality that the product must have. Functional Requirements: what the system must do Non-Functional Requirements: qualities that the system must have e.g. usability, performance, security Prioritizing requirements: MoSCoW method Query Techniques: Focus Groups Focus groups: group discussions chaired by moderator Widely used in ma.. 2024. 3. 3. 이전 1 ··· 7 8 9 10 11 12 다음 반응형