Attack Types: Difference between revisions
Jump to navigation
Jump to search
(→Links) |
No edit summary |
||
Line 1: | Line 1: | ||
[Right now, this topic is just a list of correlated topics. But that will change soon.] |
[Right now, this topic is just a list of correlated topics. But that will change soon.] |
||
*[[Systematization]] |
|||
*[[Spoofing]] |
*[[Spoofing]] |
||
*[[Man in the Middle]] |
*[[Man in the Middle]] |
Revision as of 13:43, 6 December 2004
[Right now, this topic is just a list of correlated topics. But that will change soon.]
- Systematization
- Spoofing
- Man in the Middle
- Denial of Service (DoS)
- Distributed Denial of Service (DDoS)
- Botnets
- Social Engineering
Literature
- Russell, Cunningham: Maximum Protection, MITP-Verlag Bonn, 2001, ISBN: 9783826606878
- Eckert: IT-Sicherheit, Oldenbourg Verlag München Wien, 2003, ISBN: 3486272055
- Cheswick, Bellovin, Rubin: Firewalls und Sicherheit im Internet, Addison-Wesley, 2004, ISBN: 9827321174