没有合适的资源?快使用搜索试试~ 我知道了~
Information Security Lecture Notes (Dixie IT4500)
需积分: 0 5 下载量 129 浏览量
2017-04-09
11:03:40
上传
评论
收藏 267KB PDF 举报
温馨提示
试读
16页
Information Security Lecture Notes (Dixie IT4500)
资源详情
资源评论
资源推荐
IT 4500 : Information Security
Day 1
Dr Joe Francom
Spring 2014
Intro
Syllabus Website Canvas LabSim
Activity 1
Use the following sites (or others) to find 2-3 security breaches (5min):
http://datalossdb.org/
google.com
http://www.us-cert.gov/
http://arstechnica.com/security/
Take a few notes on the breaches you find. Can you determine what happened? Why it happened? What the
organization did to remedy it? How much it cost them to fix it? Was it preventable? Be prepared to share your
findings.
IT 4500 : Information Security
Day 2
Dr Joe Francom
Spring 2015
Review
Summarize what you learned from the s1.0 and s1.1 lectures
Activity 1
Skim through this article and see if you can answer the following questions: (Look in the results and analysis
section)
Where do most security incidents occur?
By whom are they perpetrated? What countries?
What are the different categories that these incidents are frequently grouped into?
Any other things that jump out to you or you find interesting.
Be prepared to present your findings.
Activity 2
Let us do some simple reconnaissance. Find some different web tools that will gather information for you about
the cit.cs.dixie.edu website. We are not trying to hack anything at the moment, just gathering information.
Answer the following:
what information did you find?
What could you do with this information?
Is there any way to prevent this information from getting out?
Can you figure out what version of Apache is running? How about what ports are open? What OS version
is it running?
(Hint: start by doing a Google search for online reconnaissance tools )
Activity 3
Find 3 current vulnerabilities for a program of your choice(wordpress has some if you can’t think of other
programs):
http://osvdb.org/
http://www.us-cert.gov/ncas/current-activity/
http://secunia.com/community/advisories/search/
Answer the following:
Why do vulnerabilities exist?
What information is provided about the vulnerability?
How is it suggested to be fixed?
Other relevant info?
Conclusion
Exim example
IT 4500 : Information Security
Day 3
Dr Joe Francom
Spring 2014
Review
Summarize what you learned from the s2.1-2.3 lectures
What is out-of-band authentication?
Activity 1
http://arstechnica.com/security/2014/10/google-offers-usb-security-key-to-make-bad-passwords-moot/
Activity 2
http://confidenttechnologies.com/demos/secure-second-factor-demo https://www.keylemon.com/ (facial recognition)
Activity 3
http://www.youtube.com/watch?v=lSLxbobQ6Fg
http://www.youtube.com/watch?v=H3TheqOaXas#t=167
http://www.keyboard-biometrics.com/online-demo.html
http://www.govivace.com/
http://www.biochec.com/
剩余15页未读,继续阅读
绝不原创的飞龙
- 粉丝: 1w+
- 资源: 1091
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
评论0