Difference between revisions of "ITT 2013/Network module 1/Assignment Day 8"
From Teknologisk videncenter
< ITT 2013 | Network module 1
m (Created page with "Write a short description of the following threats: *Phishing *Niagara letters *Fake Helpdesk calls to users *Password Attacks **Easy passwords **Dictionary **Brute-force *Denial...") |
m (→Reading) |
||
(2 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
+ | =Assignment= | ||
Write a short description of the following threats: | Write a short description of the following threats: | ||
*Phishing | *Phishing | ||
Line 9: | Line 10: | ||
*Denial of Service | *Denial of Service | ||
**DoS | **DoS | ||
− | |||
**SYN Flood | **SYN Flood | ||
**DDoS | **DDoS | ||
Line 15: | Line 15: | ||
*Virus | *Virus | ||
*Trojan Horses | *Trojan Horses | ||
+ | =Reading= | ||
+ | *[http://www.norden.org/da/publikationer/publikationer/2011-566 Nordic Public Sector Cloud Computing – a discussion paper] | ||
+ | *[http://www.cisco.com/web/AP/asiapac/academy/files/Cisco_2013_ASR.pdf Cisco Annual Security Report 2013] | ||
+ | *[http://www.sciencefriday.com/segment/10/04/2013/cracking-open-encryption-standards.html#path/segment/10/04/2013/cracking-open-encryption-standards.html podcast: cracking open encryption standards] |
Latest revision as of 21:59, 8 October 2013
Assignment
Write a short description of the following threats:
- Phishing
- Niagara letters
- Fake Helpdesk calls to users
- Password Attacks
- Easy passwords
- Dictionary
- Brute-force
- Denial of Service
- DoS
- SYN Flood
- DDoS
- Worms
- Virus
- Trojan Horses