Difference between revisions of "BO CCNA Course/coursematerials/Security Definitions"

From Teknologisk videncenter
Jump to: navigation, search
m (Created page with "You should create a document with some of the security definitions mentioned in chapter 4. You should find the information in the Course Material or on the internet<br/> Each of ...")
 
m
 
Line 4: Line 4:
 
*Exploit definition: Find responsive IP addresses in a company, and physical attack point
 
*Exploit definition: Find responsive IP addresses in a company, and physical attack point
 
*Exploit tool(optional): nmap, fping, gping
 
*Exploit tool(optional): nmap, fping, gping
*Countermeasures:
+
*Countermeasures:  
 +
 
 +
Find definitions for the following attacks/Exploits:
 +
*Syn flood
 +
*Phishing
 +
*Niagara letters
 +
*PortScans
 +
*Ping of Death
 +
*DDoS
 +
*Worms
 +
*Virus
 +
*Trojan Horses
 
===Links===
 
===Links===
 
*http://www.cisco.com/en/US/prod/collateral/vpndevc/security_annual_report_2011.pdf
 
*http://www.cisco.com/en/US/prod/collateral/vpndevc/security_annual_report_2011.pdf

Latest revision as of 08:00, 28 August 2012

You should create a document with some of the security definitions mentioned in chapter 4. You should find the information in the Course Material or on the internet
Each of the definitions needs to include the following information:

  • Exploit name: reconnaissance
  • Exploit definition: Find responsive IP addresses in a company, and physical attack point
  • Exploit tool(optional): nmap, fping, gping
  • Countermeasures:

Find definitions for the following attacks/Exploits:

  • Syn flood
  • Phishing
  • Niagara letters
  • PortScans
  • Ping of Death
  • DDoS
  • Worms
  • Virus
  • Trojan Horses

Links