Security

Previous Next

Security Exposure Examples

Sniffing
Tracing data-flow to discover User Id/Password combinations
Spoofing
Using the IP address of a 'trusted' client to gain access
Denial of Service
Flooding a system with unwanted traffic ie. E-Mail
Trusted Hosts
Assuming that 'Trusted' systems at network boundary are secure

Previous Next

Agenda

SEC030