информационная безопасность
Upcoming SlideShare
Loading in...5
×
 

информационная безопасность

on

  • 12,252 views

 

Statistics

Views

Total Views
12,252
Views on SlideShare
431
Embed Views
11,821

Actions

Likes
1
Downloads
2
Comments
0

7 Embeds 11,821

http://tech.yandex.ru 10532
https://tech.yandex.ru 1200
http://matrix-ca.tv 83
https://www.google.com 2
http://news.google.com 2
http://translate.googleusercontent.com 1
https://events.yandex.ru 1
More...

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

информационная безопасность информационная безопасность Presentation Transcript

  • Информационная безопасность Виктор Ашик куратор практик
  • Название раздела
  • Исторический экскурс
  • 5 Julius Caesar
  • 6 Caesar cipher
  • 7 distribution of English letters
  • 8 Tabula recta
  • ZDXWWW HTSVTV YHJYEQ CKHVEX QXAUIP CRWVHI EXFIPJ 9 EJKAWO RRYYEG TDLCQT VXYVCS PXZQIJ FRNTQW KICASQ FECIFE EXNCGA HZBSIZ WOGAAZ JIUWYH AJVWRT IOUQTP WSNZIP GGQVRF IRZDYS OUVVON COVWMJ ACAKRD ZSGXGH PXPKIY FHZCIB RBYJFZ GCNEVR UZOJHL OZKIIB YTYCTI One-time pad URMZHI EWLGGR AIRCWI LMBLYB DWHPER VIQGBK BAZSTN JZTLBC BZXQDQ UCVXTW SBDCDC UBSRUJ IJCWHF JKMFXI YLGDYJ DGGIAK YKPQMK PCGVJX HGAAPR GTTSSE RERYWE
  • Information Security There is no security on this earth, there is only opportunity. General Douglas MacArthur US WWII general & war hero (1880 - 1964)
  • Cybersecurity Кибербезопасность
  • CyberINsecurity
  • Cybercrime • Hacker / Cracker • Black/Gray/White Hat 13
  • Vulnerability • hardware • software • network • personnel • site • organizational 14
  • Spam 15
  • Cyberstalking • stalking on the net for abuse 16
  • 17 Malware –Virus –Trojan horse •Dancing Pigs –Rootkit –Backdoor –Grayware / Adware •Spyware •Dialer •Joke •Browser hijacking
  • Information warfare • Cyberterrorism • Cyberwarfare 18
  • Denial-of-service 19
  • Exploit • Zero-day • Full Disclosure • Shellcode 20
  • Eavesdropping • Computer and network surveillance • Fiber tapping • Keystroke logging • Man-in-the-middle attack 21
  • Social Engineering • Hoax • Fraud • Phishing = phreaking + fishing –phreaking = phone + freaking 22
  • Indirect Attack • Proxy • Tor • Anonymizers 23
  • Backdoor • Trojan horse • Trapdoor • Worms • Cryptography • Hardware • Direct Access 24
  • Cybersecurity
  • Cybersecurity (1) • Authentication • Authorization / Access Controls –ACL –Mandatory Access Control –Capability 26
  • Cybersecurity (2) • Chain of trust • Cryptography • Firewalls • Antivirus • Application whitelisting / blacklisting 27
  • Cybersecurity (3) • Backups • Encryption –Simmetric –Public key / certificates • IDS/IPS/Honeypots • Social Engineering Awareness • End-point protection 28
  • Cybersecurity (4) • Penetration testing • Proactive protection • Web security 29
  • Jobs • Security Analyst • Security Engineer • Security Architect • Security Administrator • Chief Information Security Officer • Security Consultant/Expert 30
  • Спасибо