A very good document about TCPIP protocol Possible Attacks.Very helpful for people write network applications
标签: document Possible protocol Attacks
上传时间: 2013-12-10
上传用户:洛木卓
Abstract: The rapid build out of today's smart grid raises a number of security questions. In this article,we review two recent well-documented security breaches and a report of a security gap. These situationsinclude a 2009 smart-meter hack in Puerto Rico; a 2012 password discovery in grid distributionequipment; and insecure storage of a private key in distribution automation equipment. For each of theseAttacks, we examine the breach, the potential threat, and secure silicon methods that, as part of acomplete security strategy, can help thwart the Attacks.
上传时间: 2013-10-27
上传用户:tecman
Abstract: As industrial control systems (ICSs) have become increasingly connected and use more off-the-shelfcomponents, new vulnerabilities to cyber Attacks have emerged. This tutorial looks at three types of ICSs:programmable logic controllers (PLCs), supervisory control and data acquisition (SCADA) systems, anddistributed control systems (DCSs), and then discusses security issues and remedies. This document alsoexplains the benefits and limitations of two cryptographic solutions (digital signatures and encryption) andelaborates on the reasons for using security ICs in an ICS to support cryptography.
上传时间: 2013-10-09
上传用户:woshinimiaoye
The Network Security Response Framework (NSRF) allows for testing different computer security response engines and methodologies. It supports simulated and real: Intrusion Detection Systems (sensors), Attacks, and Responses.
标签: Framework different Security Response
上传时间: 2013-12-03
上传用户:ippler8
This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system Attacks. 译作:《黑客入侵的艺术》,也是从朋友的宝箱中搜来的,以前层大致浏览过,是难得一件的好资料。
标签: introduces the hacking science
上传时间: 2013-12-28
上传用户:离殇
This code was used to produce simulation results described in: Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans. Network and Distributed System Security Symposium, San Diego, 5-6 February 2004.
标签: Directional simulation described Antennas
上传时间: 2014-12-06
上传用户:xieguodong1234
This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system Attacks. 我记得好像的关于缓冲区溢出的
标签: introduces the hacking science
上传时间: 2014-08-14
上传用户:Breathe0125
Watermarking schemes evaluation Abstract鈥擠igital watermarking has been presented as a solution to copy protection of multimedia objects and dozens of schemes and algorithms have been proposed. Two main problems seriously darken the future of this technology though. Firstly, the large number of Attacks and weaknesses which appear as fast as new algorithms are proposed, emphasizes the limits of this technology and in particu-lar the fact that it may not match users expectations. Secondly, the requirements, tools and methodologies to assess the current technologies are almost non-existent. The lack of benchmarking of current algorithms is bla-tant. This confuses rights holders as well as software and hardware manufacturers and prevents them from using the solution appropriate to their needs. Indeed basing long-lived protection schemes on badly tested watermarking technology does not make sense.
标签: Watermarking watermarking evaluation presented
上传时间: 2013-12-04
上传用户:thinode
Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK Attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, Aircrack-ng is a set of tools for auditing wireless networks.
标签: keys Aircrack-ng cracking WPA-PSK
上传时间: 2013-12-25
上传用户:bruce
What you always wanted to know about networking but were afraid to ask! * How networks and the Internet work * How to build coherent, cost-effective network infrastructures * How to design networks for maximum reliability and availability * What you need to know about data center and application networking * How to secure networks against today?s threats and Attacks * How to take advantage of the latest mobility technologies * How virtualizing networks can help businesses leverage their network investments even further * How to combine messaging, calendaring, telephony, audio, video, and web conferencing into a unified communications architecture
标签: networking networks always afraid
上传时间: 2013-12-25
上传用户:fandeshun