Network Security and how to traceback, attack and react to network vulnerability and threats. Concentration on traceback techniques for attacks launched with single packets involving encrypted payloads, chaff and other obfuscation techniques. Due to the development of various tools and techniques to increase the source of network attacks, our interest will include network forensics, with the goal of identifying the specific host which launched the attack and cause denial of services (Do S). Also we will include tracing an attack that would compromise the confidentiality and integrity of information on the Intelligence Community (IC) network, which includes the NIPRNET, SIPRNET, JWICS, and IC enclaves. Deliverables will be technical reports, software, demonstrations, and results of experiments, which will provide evidence and metrics. The emergence of hybrid worm attacks utilizing multiple exploits to breach security infrastructures has forced enterprises to look into solutions that can defend their critical assets against constantly shifting threats.
Edmond K. Machie
Network Security Traceback Attack and React in the United States Department of Defense Network [EPUB ebook]
Network Security Traceback Attack and React in the United States Department of Defense Network [EPUB ebook]
Achetez cet ebook et obtenez-en 1 de plus GRATUITEMENT !
Langue Anglais ● Format EPUB ● Pages 198 ● ISBN 9781466985742 ● Taille du fichier 0.4 MB ● Maison d’édition Trafford Publishing ● Publié 2013 ● Téléchargeable 24 mois ● Devise EUR ● ID 7393723 ● Protection contre la copie Adobe DRM
Nécessite un lecteur de livre électronique compatible DRM