Tải bản đầy đủ (.pdf) (78 trang)

Tài liệu an toàn thông tin Số

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (1.7 MB, 78 trang )

An toàn thông tin s
Trung Tâm Tin Học - ĐHKHTN Trang 1





             

            
ngày càng  



ication và Auditing


     
             
thông tin, toà
I. 
  




 MAC (Mandatory Access Control)
 DAC (Discretionary Access Control)
 RBAC (Role-based access control)
MAC (Mandatory Access Control)
  





              
An toàn thông tin s
Trung Tâm Tin Học - ĐHKHTN Trang 2


             



List folder co
DAC (Discretionary Access Control)
             







RBAC (Role-based access control)


II. 


Ngoài ra quá 



Username/Password
             
 
   




 
An toàn thông tin s
Trung Tâm Tin Học - ĐHKHTN Trang 3

 
 
 
 
 

 


Kerberos


3.
     





   





An toàn thông tin s
Trung Tâm Tin Học - ĐHKHTN Trang 4


CHAP
              


 


-







An toàn thông tin s
Trung Tâm Tin Học - ĐHKHTN Trang 5



            

              







An toàn thông tin s
Trung Tâm Tin Học - ĐHKHTN Trang 6


Mutual authentication
 



Biosmetrics



 
 Chi phí cao

 
 
tra
An toàn thông tin s

Trung Tâm Tin Học - ĐHKHTN Trang 7

     

 
 
 

            


 
 
 Hand geometry
 
 
 
 :
 ý tay
 
An toàn thông tin s
Trung Tâm Tin Học - ĐHKHTN Trang 8


Multi-factor
      

-   
  
-factor.

An toàn thông tin s
Trung Tâm Tin Học - ĐHKHTN Trang 9


  

 
 
 
 
III. 
             
dùng


Auditing system


Logging:            

System scanning:          


 
            
ngoài
An toàn thông tin s
Trung Tâm Tin Học - ĐHKHTN Trang 10

 


             

An toàn thông tin s
Trung Tâm Tin Học - ĐHKHTN Trang 11




     

     

 
 
(passive)
             




I. 

           



An toàn thông tin s
Trung Tâm Tin Học - ĐHKHTN Trang 12


 
 
        

 


 
   

II. 




spoofing
Dos





             


    
IOS, fork() bomb).
   

   


DoS).
 


An toàn thông tin s
Trung Tâm Tin Học - ĐHKHTN Trang 13

 

           
         

 
       
          
        
     

           
   

 



             

DDoS
     



          

          

         

 
          


zombie.



 

An toàn thông tin s
Trung Tâm Tin Học - ĐHKHTN Trang 14


          


Flood Network (TFN hay TFN2k), Shaft

DDoS.
Buffer Overflows



             i



SYN Attacks
 



 

An toàn thông tin s
Trung Tâm Tin Học - ĐHKHTN Trang 15




             -
ope            



 Máy 
 
   

            

             

   


An toàn thông tin s
Trung Tâm Tin Học - ĐHKHTN Trang 16

-n -p tcp.

          
connection. 


            
        



 


 
            
          
công.
Spoofing


           






               



An toàn thông tin s
Trung Tâm Tin Học - ĐHKHTN Trang 17

            
             

            

             
            


              






Man in the Middle Attacks


tính.

      




 
 ICMP Redirect
An toàn thông tin s
Trung Tâm Tin Học - ĐHKHTN Trang 18

 
Relay Attacks






           
  
           


Dumpster diving
Dumpster div           


Social Engineering








III. 




             
 
An toàn thông tin s
Trung Tâm Tin Học - ĐHKHTN Trang 19


 Nmap
 
        
 

    
(half open), FTP proxy (bounce attack), ICMP (ping sweep), FIN, ACK


             



Cú pháp ch

nmap [Scan Type(s)] [Options] <host or net #1 [#N]>


 -sS : TCP SYN
 -sT : TCP connect()
 -sU : UDP scans
 -sO :IP protocol
 -sF -sX -sN : stealth FIN, Xmas tree, Null scan
 -sP : ping scanning
 -sV : version detection

Các o
 -    

 -    -    
request)
 -PU [portlist] dùng UDP
 -p port/range of ports

An toàn thông tin s
Trung Tâm Tin Học - ĐHKHTN Trang 20

 
-i
nmap 172.29.8.1, nmap 172.29.8.1 -255, nmap 172.29.8.1/24
nmap www.microsoft.com/24

           
ICMP (ICM sweep) và TCP port 80 ACK sweep.  -sP
-PO, dùng ICMP ping sweep

dùng option - 

--
PT32453.

nmap -sS -p 22, 53, 80, 110, 143 192.168.*.1 -127 dùng scan port


nmap -sS -
 DumpACL/DumpSec





An toàn thông tin s
Trung Tâm Tin Học - ĐHKHTN Trang 21


 Essnetial NetTools
 



 
   

       



Nghe lén(Sniffing)


An toàn thông tin s
Trung Tâm Tin Học - ĐHKHTN Trang 22


            




 

   
            
              




 
   



An toàn thông tin s
Trung Tâm Tin Học - ĐHKHTN Trang 23

 

Windows
   
program/AddRemove Windows components/Managenent and Monitoring
tools.



           
     


An toàn thông tin s
Trung Tâm Tin Học - ĐHKHTN Trang 24


            




gói tin.
An toàn thông tin s
Trung Tâm Tin Học - ĐHKHTN Trang 25

 
            





Tcpdump [-adeflnNOpqRStuvxX] [-c count] [-C file_size] [-F file]
[-i interface] [-m module] [-r file] [-s snaplen] [-T type] [-U user] [-w
file] [ -E algo:secret ] [ expression ]

-
-

-
bytes.

Password Attacks
           
word

-force attack và dictionary-based
attack.
 Brute Force Attacks
 
 

 Dictionary-Based Attacks
 

            

  
Malicious code attack
 Virus

×