Difference between revisions of "ITT 2014/Network module 1/Assignment Day 8"
From Teknologisk videncenter
< ITT 2014 | Network module 1
(→Reading) |
(→Reading) |
||
(2 intermediate revisions by the same user not shown) | |||
Line 16: | Line 16: | ||
*Trojan Horses | *Trojan Horses | ||
=Reading= | =Reading= | ||
− | *[http://www.cisco.com/ | + | *[http://www.cisco.com/c/en/us/products/security/annual_security_report.html Cisco Annual Security Report 2014] |
+ | *[http://www.dialogic.com/~/media/products/docs/whitepapers/12023-cloud-computing-wp.pdf Introduction to cloud computing] | ||
+ | *[http://www.computerworld.com/article/2511969/security0/the-clock-is-ticking-on-encryption.html Article on encryption] | ||
*[http://www.sciencefriday.com/segment/10/04/2013/cracking-open-encryption-standards.html#path/segment/10/04/2013/cracking-open-encryption-standards.html podcast: cracking open encryption standards] | *[http://www.sciencefriday.com/segment/10/04/2013/cracking-open-encryption-standards.html#path/segment/10/04/2013/cracking-open-encryption-standards.html podcast: cracking open encryption standards] | ||
[[Category:ITT 2014]] | [[Category:ITT 2014]] |
Latest revision as of 05:59, 2 October 2014
Assignment
Write a short description of the following threats:
- Phishing
- Niagara letters
- Fake Helpdesk calls to users
- Password Attacks
- Easy passwords
- Dictionary
- Brute-force
- Denial of Service
- DoS
- SYN Flood
- DDoS
- Worms
- Virus
- Trojan Horses