Difference between revisions of "ITT 2014/Network module 1/Assignment Day 8"

From Teknologisk videncenter
Jump to: navigation, search
(Reading)
(Reading)
 
(2 intermediate revisions by the same user not shown)
Line 16: Line 16:
 
*Trojan Horses
 
*Trojan Horses
 
=Reading=
 
=Reading=
*[http://www.cisco.com/web/AP/asiapac/academy/files/Cisco_2014_ASR.pdf Cisco Annual Security Report 2014]
+
*[http://www.cisco.com/c/en/us/products/security/annual_security_report.html Cisco Annual Security Report 2014]
 +
*[http://www.dialogic.com/~/media/products/docs/whitepapers/12023-cloud-computing-wp.pdf Introduction to cloud computing]
 +
*[http://www.computerworld.com/article/2511969/security0/the-clock-is-ticking-on-encryption.html Article on encryption]
 
*[http://www.sciencefriday.com/segment/10/04/2013/cracking-open-encryption-standards.html#path/segment/10/04/2013/cracking-open-encryption-standards.html podcast: cracking open encryption standards]
 
*[http://www.sciencefriday.com/segment/10/04/2013/cracking-open-encryption-standards.html#path/segment/10/04/2013/cracking-open-encryption-standards.html podcast: cracking open encryption standards]
  
 
[[Category:ITT 2014]]
 
[[Category:ITT 2014]]

Latest revision as of 05:59, 2 October 2014

Assignment

Write a short description of the following threats:

  • Phishing
  • Niagara letters
  • Fake Helpdesk calls to users
  • Password Attacks
    • Easy passwords
    • Dictionary
    • Brute-force
  • Denial of Service
    • DoS
    • SYN Flood
    • DDoS
  • Worms
  • Virus
  • Trojan Horses

Reading