Please enable JavaScript.
Coggle requires JavaScript to display documents.
CYBER Next-Generation-Firewall-là-gìsự-khác-biệt-so-với-tường-lửa-truyền…
CYBER
SECURITY
Forms of Attack
Virus
-
when the “host” program is executed,
the virus is also executed
-
degrading portions of the operating
system, erasing large blocks of mass storage, or corrupting data and
other programs.
Malware
-
might be transferred to, and
executed on the computer itself, or attack the computer from a distance
include viruses, worms, Trojan horses, and spyware
-
-
-
-
-
-
-
Encryption
-
Public key encryption
Public key
Encrypt messages
The public key is first to distribute to those who might need to send message to a particular destination
-
-
Authentication
Making sure that the author of a message is - in fact, the party it claims to be
-
Protection and Cures
-
Proxy server
-
FTP, HTTP, telnet, etc.).
FTP proxy server could check all incoming files for the presence of known viruses and block all infected files
-
-