1. Trish Miller Network Security 2. Types of Attacks Attacks on the OSI & TCP/IP Model Attack Methods Prevention Switch Vulnerabilities and Hacking Cisco Routers Interesting…
1. COMPUTER CRIME 2. TYPES OF ATTACKS Spam– any unsolicited email. Usually considered a costly nuisance, spam nowoften contains malware. Malwareis a class of malicioussoftware—viruses,…
1. Network Security 2. • Types of Attacks • Attacks on the OSI & TCP/IP Model • Attack Methods • Prevention • Switch Vulnerabilities and Hacking • Cisco Routers…
Slide 1 To Join or Not to Join: The Illusion of Privacy in Social Networks with Mixed Public and Private User Profiles By Elena Zheleva, Lise Getoor Presented by Ionut Trestian…
Slide 1 Slide 2 Network Security The only safe computer is a dead computer (or at least a disconnected one) Security is about balancing the usefulness and the potential abuse…