Difference between revisions of "ITT 2013/Network module 1/Assignment Day 8"

From Teknologisk videncenter
Jump to: navigation, search
m
m (Reading)
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
 +
=Assignment=
 
Write a short description of the following threats:
 
Write a short description of the following threats:
 
*Phishing
 
*Phishing
Line 14: Line 15:
 
*Virus
 
*Virus
 
*Trojan Horses
 
*Trojan Horses
 +
=Reading=
 +
*[http://www.norden.org/da/publikationer/publikationer/2011-566 Nordic Public Sector Cloud Computing – a discussion paper]
 +
*[http://www.cisco.com/web/AP/asiapac/academy/files/Cisco_2013_ASR.pdf Cisco Annual Security Report 2013]
 +
*[http://www.sciencefriday.com/segment/10/04/2013/cracking-open-encryption-standards.html#path/segment/10/04/2013/cracking-open-encryption-standards.html podcast: cracking open encryption standards]

Latest revision as of 21:59, 8 October 2013

Assignment

Write a short description of the following threats:

  • Phishing
  • Niagara letters
  • Fake Helpdesk calls to users
  • Password Attacks
    • Easy passwords
    • Dictionary
    • Brute-force
  • Denial of Service
    • DoS
    • SYN Flood
    • DDoS
  • Worms
  • Virus
  • Trojan Horses

Reading