본문 바로가기

분류 전체보기411

Lecture 5: Internet security 목차 Internet Security Phishing Phishing: attack that attempts to steal your money, or your identity, by getting you to reveal personal information on websites that pretend to be legitimate. Protocols Internet Protocols are a set of rules that governs the communication and exchange of data over the internet. Both the sender and receiver should follow the same protocols to communicate. Many protoco.. 2024. 3. 3.
Lecture 4: Firewalls and Intrusion detection 목차 Firewall In Computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet. Firewalls divide the untrusted outside of a network from the more trusted interior of a network. The importance.. 2024. 3. 3.
Lecture 3: Denial of Service and Botnets 목차 Attacks on Availability in the OSI Model Availability can be attacked on every layer ofthe model. The best-known attack is a DDoS attack, overwhelming a system with a lot of traffic. Background - Network layer IP datagrams can be exchanged between any two nodes (provided they both have an IP address) The server determines who sent the packet based on the Source IP. IP 스푸핑이란 IP (Internet Proto.. 2024. 3. 3.
Lecture 2: Network Security Physical Layer 목차 Network Security Network security is the protection of the underlying networking infrastructure from unauthorized access, misuse, or theft. It involves creating a secure infrastructure for devices, users, and applications to wokr in a secure manner. A Network A network consists of two or more computers that are linked to share resources, exchange files, or allow electronic communications. The.. 2024. 3. 3.
반응형