Attacks and IS protection measures
Introduction to the security of information systems (SIS)
Article REF: H5000 V1
Attacks and IS protection measures
Introduction to the security of information systems (SIS)

Author : Maryline LAURENT

Publication date: October 10, 2011 | Lire en français

Logo Techniques de l'Ingenieur You do not have access to this resource.
Request your free trial access! Free trial

Already subscribed?

6. Attacks and IS protection measures

This section focuses on network and system vulnerabilities, and the preventive and reactive measures currently available to network administrators and private individuals to protect their resources. It also includes articles on how to put SSI into practice.

  • To this end, the articles in this section are divided into four topics

    • Attacks

      The aim is not to describe in detail, like a recipe, how to carry out an attack on a network or system, but to present the methodology typically used by attackers to carry out intrusions. Attacks on a very large scale, such as botnets, or more confidential ones, such as back channels, are also detailed.

    • Protective measures against attacks

      The methods presented are either preventive...

You do not have access to this resource.
Logo Techniques de l'Ingenieur

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource. Click here to request your free trial access!

Already subscribed?


Article included in this offer

"Security of information systems"

( 86 articles )

Complete knowledge base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

View offer details