Security Engineering: Difference between revisions

From
Jump to navigation Jump to search
No edit summary
No edit summary
Line 6: Line 6:
*[[Attack Types ]](Denial of Service, Man in the Middle)
*[[Attack Types ]](Denial of Service, Man in the Middle)
*[[Authentication Mechanisms]]
*[[Authentication Mechanisms]]
*[[Biometrics]]
*[[Biometry]]
*[[Copyright Protection]] (Digital Rights Management - DRM)
*[[Copyright Protection]] (Digital Rights Management - DRM)
*[[Distributed Systems]]
*[[Distributed Systems]]

Revision as of 20:03, 8 April 2005

Abstract: As a user of the Internet, you are fortunate to be tied into the world's greatest communication and information exchange - but not without a price. As a result of this connection, your computer, your organization's network, and everywhere the network reaches are all vulnerable to potentially disastrous infiltration by hackers. [W. Cheswick. Firewalls and Internet Security]