Difference between revisions of "BO CCNA Course/coursematerials/Security Definitions"
From Teknologisk videncenter
m (Created page with "You should create a document with some of the security definitions mentioned in chapter 4. You should find the information in the Course Material or on the internet<br/> Each of ...") |
m |
||
Line 4: | Line 4: | ||
*Exploit definition: Find responsive IP addresses in a company, and physical attack point | *Exploit definition: Find responsive IP addresses in a company, and physical attack point | ||
*Exploit tool(optional): nmap, fping, gping | *Exploit tool(optional): nmap, fping, gping | ||
− | *Countermeasures: | + | *Countermeasures: |
+ | |||
+ | Find definitions for the following attacks/Exploits: | ||
+ | *Syn flood | ||
+ | *Phishing | ||
+ | *Niagara letters | ||
+ | *PortScans | ||
+ | *Ping of Death | ||
+ | *DDoS | ||
+ | *Worms | ||
+ | *Virus | ||
+ | *Trojan Horses | ||
===Links=== | ===Links=== | ||
*http://www.cisco.com/en/US/prod/collateral/vpndevc/security_annual_report_2011.pdf | *http://www.cisco.com/en/US/prod/collateral/vpndevc/security_annual_report_2011.pdf |
Latest revision as of 08:00, 28 August 2012
You should create a document with some of the security definitions mentioned in chapter 4. You should find the information in the Course Material or on the internet
Each of the definitions needs to include the following information:
- Exploit name: reconnaissance
- Exploit definition: Find responsive IP addresses in a company, and physical attack point
- Exploit tool(optional): nmap, fping, gping
- Countermeasures:
Find definitions for the following attacks/Exploits:
- Syn flood
- Phishing
- Niagara letters
- PortScans
- Ping of Death
- DDoS
- Worms
- Virus
- Trojan Horses