Network Security and how to traceback, attack and react to network vulnerability and threats. Concentration on traceback techniques for attacks launched with single packets involving encrypted payloads, chaff and other obfuscation techniques. Due to the development of various tools and techniques to increase the source of network attacks, our interest will include network forensics, with the goal of identifying the specific host which launched the attack and cause denial of services (Do S). Also we will include tracing an attack that would compromise the confidentiality and integrity of information on the Intelligence Community (IC) network, which includes the NIPRNET, SIPRNET, JWICS, and IC enclaves. Deliverables will be technical reports, software, demonstrations, and results of experiments, which will provide evidence and metrics. The emergence of hybrid worm attacks utilizing multiple exploits to breach security infrastructures has forced enterprises to look into solutions that can defend their critical assets against constantly shifting threats.
Edmond K. Machie
Network Security Traceback Attack and React in the United States Department of Defense Network [EPUB ebook]
Network Security Traceback Attack and React in the United States Department of Defense Network [EPUB ebook]
购买此电子书可免费获赠一本!
语言 英语 ● 格式 EPUB ● 网页 198 ● ISBN 9781466985742 ● 文件大小 0.4 MB ● 出版者 Trafford Publishing ● 发布时间 2013 ● 下载 24 个月 ● 货币 EUR ● ID 7393723 ● 复制保护 Adobe DRM
需要具备DRM功能的电子书阅读器