6. Attacks and IS protection measures
This section focuses on network and system vulnerabilities, and the preventive and reactive measures currently available to network administrators and private individuals to protect their resources. It also includes articles on how to put SSI into practice.
-
To this end, the articles in this section are divided into four topics
-
Attacks
The aim is not to describe in detail, like a recipe, how to carry out an attack on a network or system, but to present the methodology typically used by attackers to carry out intrusions. Attacks on a very large scale, such as botnets, or more confidential ones, such as back channels, are also detailed.
-
Protective measures against attacks
The methods presented are either preventive...
-
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Attacks and IS protection measures
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Also in our database
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!