Introduction To Security
da Khai Seng Teng
1. Access to Data and Equipment
1.1. Data Wiping
1.2. Hard Drive Destruction
1.3. Hard Drive Recycling
2. Goal Of security
2.1. Availibility
2.2. Integririty
2.3. Confidentially
3. Security Threats
3.1. Malicious Code
3.2. Hacking
3.2.1. Data Loss
3.2.2. Discruptive of Service
3.3. Natural Disaster
3.4. Theft
3.4.1. Information Theft
3.4.2. Identity Theft
4. Tools In Information Security
4.1. Network Mapper
4.2. NETSTAT
4.3. NETSCAN
5. Methods of Security Attacks
5.1. Reconnaissance Attack
5.2. Access Attacks
5.2.1. Password Attack
5.2.2. Trust Exploitation
5.2.3. Man-in-the middle Attack
5.3. DoS Attack
5.3.1. Degration in Network Performance
5.3.2. Specific Website unavailable
5.3.3. High Voloume of Email Spam
5.3.4. Inablility to Accessany Website
5.4. DDoS Attack
5.5. Malicious Code Attack
5.5.1. Virus
5.5.2. Worms
5.5.3. Trojan Horse