Port scanning-security system-network security technology and protocols

port scan

Insert image description here

Full TCP connection: three-way handshake
Semi-open scan: first two handshakes
FIN scan: no need to establish a TCP connection
Third-party scan:

Insert image description here

Denial of service attacks include:

  1. Sync Packet Storm
  2. ICMP attack
  3. SNMP attack

They all modify the registry to defend against attacks.

Examine the principles of these three denial-of-service attacks

Insert image description here

a

Information security assurance system and assessment methods

Insert image description here

From low to high, there are five levels in total.
Autonomous protection level
. System audit protection level: finer-grained autonomous protection level
. Security tag protection level: mandatory access control.
Structured protection level: full-scale mandatory access control.
Access verification protection level: access monitoring. device

Insert image description here

Just understand it

network security technology

Insert image description here

Isolate internal and external networks

Insert image description here

listening device

monitor, analyze

Insert image description here

Not inspected

Cyber ​​Attacks and Threats (Important)

Insert image description here

Replay attacks and denial of service are often investigated.
Adding timestamps to information can solve replay attacks.

network security protocol

Insert image description here

Focus on things above the transport layer

Insert image description here

Insert image description here

PGP: Secure Email Protocol
Just understand it (rarely take the test)

Insert image description here

d
is supposed to be PGP, but it doesn’t
Insert image description here
Insert image description here
Insert image description here

Insert image description here

b
Insert image description here

Insert image description here

d
Insert image description here

Guess you like

Origin blog.csdn.net/qq_41701723/article/details/132731611