Notas: | <P><STRONG>Computer Networks<BR></STRONG>Devices<BR>Medium<BR>Network Topology<BR>Network Protocols and Standards<BR>Common Network Protocols<BR>References<BR><BR><B>Information System Security<BR></B>CIA Triad<BR>Parkerian Hexad<BR>Model for Information Assurance <BR>Reference Model of Information Assurance and Security<BR>Fundamentals of Hacking<BR>References<BR><BR><B>Intrusions and Vulnerabilities<BR></B>Network Vulnerability List<BR>Operating System Vulnerability List<BR>References<BR><BR><B>Malware<BR></B>Introduction<BR>Computer Viruses<BR>Computer Worms <BR>Worm Component<BR>Worm Examples <BR>Polymorphic Worms: Definition and Anatomy<BR>Prevention and Detection of Worms<BR>Intrusion Detection Systems<BR>Firewalls <BR>References <BR><BR><B>Honeypots<BR></B>Definition and History of Honeypots<BR>Types of Threats<BR>Value of Honeypots<BR>Honeypot Types Based on Interaction Level<BR>Overview of Five Honeypots<BR>Conclusion<BR>References <BR><BR><B>Security Systems<BR></B>Firewall<BR>Antivirus<BR>Intrusion Detection and Prevention Systems<BR>References <BR><BR><B>Zero-Day Polymorphic Worms Collection Method<BR></B>Motivation of Double-Honeynet System<BR>Double-Honeynet Architecture<BR>Software <BR>Double-Honeynet System Configurations <BR>Summary <BR>References<BR></P> |