internet security info 1370 detailed objectives 4 5 n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Internet Security (INFO 1370) Detailed Objectives 4,5 PowerPoint Presentation
Download Presentation
Internet Security (INFO 1370) Detailed Objectives 4,5

Loading in 2 Seconds...

play fullscreen
1 / 9

Internet Security (INFO 1370) Detailed Objectives 4,5 - PowerPoint PPT Presentation


  • 119 Views
  • Uploaded on

Internet Security (INFO 1370) Detailed Objectives 4,5. Rich Hildred rhildred@conestogac.on.ca 519-594-0900. Objectives. Password Crackers Describe the function of password crackers. Define Trojans. Define Sniffers. Password Crackers. Trojans.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Internet Security (INFO 1370) Detailed Objectives 4,5' - jaunie


Download Now An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
internet security info 1370 detailed objectives 4 5

Internet Security(INFO 1370) Detailed Objectives 4,5

Rich Hildred

rhildred@conestogac.on.ca

519-594-0900

objectives
Objectives
  • Password Crackers
    • Describe the function of password crackers.
    • Define Trojans.
    • Define Sniffers.
trojans
Trojans

http://www.youtube.com/watch?v=_lCDg2XzEsA

objectives cont
Objectives (cont.)
  • Firewalls
    • Describe Firewalls.
    • Discuss Audit Tools.
    • Describe Holes.
discuss holes
Discuss Holes

Common wisdom in the computer security arena is to block everything, then open up holes as necessary. This is usually phrased `that which is not explicitly allowed is prohibited'. I recommend this approach if security is your maximal concern.

sudoufw default deny

sudoufw allow ssh

sudoufw allow http