0 Foreword |
 |  | 00:23:32 hours | play > |
1 Introduction1.0 Introduction |
 |  | Nowadays' Internet Risks for Interconnected Information Systems
Systematic Problems with Internet Security
The Internet is an easy Target
Changing Nature of The Threats
Who are the Intruders
Improved Opportunities for Intrusion
Direction of Internet Security
Complexity of Internet
Most Common Attacks
Futher Attacks
Computer Crimes and Damage
Main Security Necessities 01:26:42 hours | play > |
1.1 Risk Analysis |
 |  | Introduction
(1) Risks for information systems
(2) New risks with internet connection
(3) Security risks in intranet's
(4) Risk analysis
(5) Phases of Risk analysis: Overview
Phase 1: Fixing of the analysis domain
Phase 2: Acquisition of the risks
Phase 3: Evaluation of Risks
(6) Basic risks by using internet 01:29:21 hours | play > |
1.2 Computer Crime: Criminals and Motives |
 |  | Potential attackers
(1) Staff of the Own Enterprise
(2) Hackers from High-Schools and Universities
(3) Hackers of the Computer-Underground
(4) Ordinary Criminals
(5) Cyber Crime: Professional Hackers 01:31:59 hours | play > |
1.3 Hackers and Viruses |
 |  | (1) The First Hackers
(2) Unterground-Mailboxes
(3) From First Virus to Worms and Trojan Horses
(4) Small Chronology of Computer-Crime
(5) Computer-Crime and the following Costs
01:01:55 hours | play > |
Weaknesses and Targets Human Factor and Technical Failures |
 |  | (1) Technical Failures
(2) Defective Protocol Design
(3) Defective Software Design
(4) Lack of Knowledge and Carelessness
(5) Social Hacking
(6) Defective Organisation
(7) Unprotected Hardware
(8) Hit list of Break-in Methods 00:52:05 hours | play > |
Spy Out Network Infrastructure |
 |  | (1) Introduction
(2) Address Scanner
(3) Port Scanner
(4) Protocol-Analyzers
(5) Banners
00:37:38 hours | play > |
Attacks on Accounts and Passwords |
 |  | (1) Introduction
(2) Password Guessing
(3) Password Cracking
(4) Password Sniffing
(5) Password Monitoring
(6) Password "Fishing" with Trojan Horses
(7) Protection Against Password Theft 00:47:19 hours | play > |
Attacking Internet Protocols (I) |
 |  | (1) Introduction
(2) IP Address Spoofing
(3) ICMP-Attacks 00:38:30 hours | play > |
Attacking Internet Protocols (II) |
 |  | (4) Internet-Routing-Attacks
(5) ARP-Attacks
(6) IP-Fragmenting-Attack
(7) IP-Bombing
(8) SYN-Flooding
(9) TCP-Sequence Numbers Attacks
(10) UDP Attacks
01:18:27 hours | play > |
Attacking Internet Protocols (III) |
 |  | (11) DNS-Attacks
(12) SMTP-Attacks
(13) Telnet-Attacks
(14) FTP-Attacks
(15) NNTP-Attacks 00:34:24 hours | play > |
Misuse of Design and Programming Errors |
 |  | (1) Introduction
(2) Buffer Overflow
(3) Defective Syntax Check
(4) Race Condition
00:36:11 hours | play > |
Weaknesses in Unix/Linux (I) |
 |  | (1) Introduction
(2) Security Architecture of Unix
(3) Password Attacks in Unix
(4) Networks Attacks in Unix
01:27:27 hours | play > |
Weaknesses in Unix/Linux (II) |
 |  | (5) Attacks over Unix-Applications
(6) Strategies for Protecting Unix
(7) Information for Unix-Security
(8) Strategies for Protecting Linux
(9) Security-Software for Linux
01:10:57 hours | play > |
Weaknesses in Windows NT/2000 (I) |
 |  | (1) Introduction
(2) Security architecture of Windows NT/2000
(3) Account- and Password attacks
(4) Network attacks
01:14:20 hours | play > |
Weaknesses in Windows NT/2000 (II) |
 |  | (5) Attacks over NT-Applications
(6) NT-Denial-of-Service-Attacks
(7) Strategies for security of NT-Systems
(8) Windows 3.11 / 95/ 98-Clients
(9) Information about NT-Security
(10) Windows 2000
00:49:34 hours | play > |