6. Attacks and IS protection measures
This section focuses on network and system vulnerabilities, and the preventive and reactive measures currently available to network administrators and private individuals to protect their resources. It also includes articles on how to put SSI into practice.
-
To this end, the articles in this section are divided into four topics
-
Attacks
The aim is not to describe in detail, like a recipe, how to carry out an attack on a network or system, but to present the methodology typically used by attackers to carry out intrusions. Attacks on a very large scale, such as botnets, or more confidential ones, such as back channels, are also detailed.
-
Protective measures against attacks
The methods presented are either preventive...
-
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Security of information systems
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Attacks and IS protection measures
Bibliography
Also in our database
Websites
Club de la Sécurité de l'Information Français, Computer threats and security practices in France, 2010 Edition https://www.clusif.asso.fr/
Standards and norms
- Systèmes de traitement de l'information : Interconnexions de systèmes ouverts, Modèle de référence de base. Partie 2 : architecture de sécurité - ISO 7498-2 - 09-90
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference