0 Internet Bridge Trier-Beijing |
| | An opening ceremony of the internet-bridge 01:03:58 hours | play > |
1 Introduction Introduction |
| | Nowadays' Internet Risks for Interconnected Information Systems
Systematic Problems with Internet Security
The Internet is an easy Target
Changing Nature of The Threats
Who are the Intruders
Improved Opportunities for Intrusion
Direction of Internet Security
Complexity of Internet
Most Common Attacks
Futher Attacks
Computer Crimes and Damage
Main Security Necessities 01:26:42 hours | play > |
1 Risk Analysis |
| | Introduction
(1) Risks for information systems
(2) New risks with internet connection
(3) Security risks in intranet's
(4) Risk analysis
(5) Phases of Risk analysis: Overview
Phase 1: Fixing of the analysis domain
Phase 2: Acquisition of the risks
Phase 3: Evaluation of Risks
(6) Basic risks by using internet 01:29:21 hours | play > |
2 Computer Crime: Criminals and Motives |
| | Potential attackers
(1) Staff of the Own Enterprise
(2) Hackers from High-Schools and Universities
(3) Hackers of the Computer-Underground
(4) Ordinary Criminals
(5) Cyber Crime: Professional Hackers 01:31:59 hours | play > |
3 Hackers and Viruses |
| | (1) The First Hackers
(2) Unterground-Mailboxes
(3) From First Virus to Worms and Trojan Horses
(4) Small Chronology of Computer-Crime
(5) Computer-Crime and the following Costs
01:01:55 hours | play > |
2 Architecture of Internet and Intranet Architecture of Internet and Intranets |
| | General Introduction
(1) Basic Structure
(2) Internet and Intranets: Topology and Attack Points
(3) Secure Server Network
(4) Four big blocks of Internet software components 00:27:20 hours | play > |
1 Internet Protocol - IP |
| | (1) IP - Fundamental Component of the Interne Protocol Suite
(2) Basic Princoples of the Internet-Protocol IP
(3) Format of IP-Packets
(4) Fragmentation of IP-Packets 00:40:10 hours | play > |
2 + 3 TCP and UDP |
| | 2.2 Transmission Control Protocol - TCP
(1) TCP - Fundamental Internet-Transport-Protocol
(2) TCP - Guarantees Transmission
(3) Format of TCP-Packets
(4) TCP-Ports
2.3 User Datagram Protocol - UDP
(1) UDP - a simplified and less powerful variant of TCP 00:30:59 hours | play > |
4 Internet Protocols for Serial Connections |
| | (1) SLIP - Serial Line Internet Protocol
(2) PPP - Point to Point Protocol
1. PPP - Encapsulation
2. PPP - Link Control Protocol
3. PPP - Network Control Protocol 00:30:10 hours | play > |
5 Addressing in IP-Networks |
| | (1) Basic Idea
Structure of IP-Addresses
(2) Efficient Routing with Subnet-Address-Masks
(3) Private Address Domains 00:47:35 hours | play > |
6 Internet Domain Name Service - DNS |
| | (1) History
(2) DNS - Domain Name Structure
(3) DNS - Protocol
00:34:01 hours | play > |
7 Internet Protocol Next Generation - IPv6 |
| | Overview
(1) Extension of Address-Space
(2) Address formats of IPv6
(3) Header Format of IPv6
(4) Migration IPv4 to IPv6 00:39:00 hours | play > |
8 Security on Network Layer - IPSec |
| | (1) IPSec-Standard
(2) IPSec-Standard and IPv6
(3) IPSec Functionality on IPv4 00:47:25 hours | play > |
9 Networks with Several Locations |
| | (1) Introduction
(2) WAN ( Wide Area Network ) - Connection
(3) RAS ( Remote Access Service ) - Connection
(4) VPN - Virtual Private Network 00:22:25 hours | play > |
10 World Wide Web - WWW |
| | (1) Reminder of the Internet-Protocol family
(2) Architecture of the World Wide Web
(3) HTML-Documents
(4) URL Adressing scheme in the WWW
(5) HTTP Communication protocol in the WWW
(6) SSL and S-HTTP
(7) VRML - Virtual Reality Modelling Language
(8) Interactive Applications in the WWW
(9) MIME and Assistance applikations in the WWW 01:37:20 hours | play > |
11 Electronical Post - E-Mail |
| | (1) Introduction
(2) Simple Mail Transfer Protocol - SMTP
(3) Multipurpose Internet Mail Extensions MIME
(4) Privacy Enhanced Mail - PEM
(5) S/MIME
(6) Pretty Good Privacy - PGP 01:11:13 hours | play > |
12 Internet News |
| | (1) Introduction
(2) Transfer of News
(3) New-Group-Hierarchy
(4) Network News Transport Protocol - NNTP 00:32:01 hours | play > |
13 File Transfer Protocol - FTP |
| | (1) Introduction
(2) Functional principle
(3) Anonym FTP
(4) Trivial FTP 00:26:44 hours | play > |
14 Remote Login - Telnet |
| | (1) Introduction
(2) Functionality 00:13:33 hours | play > |
15 Directory Service - LDAP |
| | (1) Idea of X.500 Directory Service
(2) Internet-Protocol LDAP
(3) Security of LDAP by SSL 00:38:18 hours | play > |
16 Multimedia |
| | Specific Problems of Multimedia
Some Examples
Book Recommendation for Chapter 2
00:14:42 hours | play > |
3 Weaknesses and Targets1 Human Factor and Technical Failures |
| | (1) Technical Failures
(2) Defective Protocol Design
(3) Defective Software Design
(4) Lack of Knowledge and Carelessness
(5) Social Hacking
(6) Defective Organisation
(7) Unprotected Hardware
(8) Hit list of Break-in Methods 00:52:05 hours | play > |
2 Spy Out Network Infrastructure |
| | (1) Introduction
(2) Address Scanner
(3) Port Scanner
(4) Protocol-Analyzers
(5) Banners
00:37:38 hours | play > |
3 Attacks on Accounts and Passwords |
| | (1) Introduction
(2) Password Guessing
(3) Password Cracking
(4) Password Sniffing
(5) Password Monitoring
(6) Password "Fishing" with Trojan Horses
(7) Protection Against Password Theft 00:47:19 hours | play > |
4 Attacking Internet Protocols (I) |
| | (1) Introduction
(2) IP Address Spoofing
(3) ICMP-Attacks 00:38:30 hours | play > |
5 Attacking Internet Protocols (II) |
| | (4) Internet-Routing-Attacks
(5) ARP-Attacks
(6) IP-Fragmenting-Attack
(7) IP-Bombing
(8) SYN-Flooding
(9) TCP-Sequence Numbers Attacks
(10) UDP Attacks
01:18:27 hours | play > |
6 Attacking Internet Protocols (III) |
| | (11) DNS-Attacks
(12) SMTP-Attacks
(13) Telnet-Attacks
(14) FTP-Attacks
(15) NNTP-Attacks 00:34:24 hours | play > |
7 Misuse of Design and Programming Errors |
| | (1) Introduction
(2) Buffer Overflow
(3) Defective Syntax Check
(4) Race Condition
00:36:11 hours | play > |
8 Weaknesses in Unix/Linux (I) |
| | (1) Introduction
(2) Security Architecture of Unix
(3) Password Attacks in Unix
(4) Networks Attacks in Unix
01:27:27 hours | play > |
9 Weaknesses in Unix/Linux (II) |
| | (5) Attacks over Unix-Applications
(6) Strategies for Protecting Unix
(7) Information for Unix-Security
(8) Strategies for Protecting Linux
(9) Security-Software for Linux
01:10:57 hours | play > |
10 Weaknesses in Windows NT/2000 (I) |
| | (1) Introduction
(2) Security architecture of Windows NT/2000
(3) Account- and Password attacks
(4) Network attacks
01:14:20 hours | play > |
11 Weaknesses in Windows NT/2000 (II) |
| | (5) Attacks over NT-Applications
(6) NT-Denial-of-Service-Attacks
(7) Strategies for security of NT-Systems
(8) Windows 3.11 / 95/ 98-Clients
(9) Information about NT-Security
(10) Windows 2000
00:49:34 hours | play > |
12 Targets in the World Wide Web (I) |
| | (1) Introduction
(2) Target: Web-Browser
-- Spying out Personal Data
-- Java
-- JavaScript
-- ActiveX
01:07:32 hours | play > |
13 Targets in the World Wide Web (II) |
| | -- Protecting Web-Browser
(3) Attacks on Web-Servers
(4) Configure Secure Web Server
(5) Secure Web: SSL and S-HTTP
(6) Dangerous Search machines 00:58:42 hours | play > |
14 Viruses, Worms, Trojan Horses |
| | (1) Introduction
(2) Distribution of Viruses
(3) Attacks on Web-Servers
(4) Virus-Factories
(5) Anti-Virus-Management
(6) Anti-Virus-Software 01:25:04 hours | play > |
Detection of Attacks and Intrusions |
| | (1) Introduction
(2) Anomalies and Attacks Signatures
(3) Implementation of Intrusion Detection Systems (IDS)
(4) Reaction on Attacks
(5) Intrusion Response
(6) Limitations of IDS
01:14:38 hours | play > |
Legal and Ethical Issues |
| | (1) Introduction
(2) Legal Systems
(3) German Laws
(4) Case Studies
(5) Responsibility of IT-Managers
(6) Ethical Issues
(7) Case Studies
(8) Code of Ethics
01:09:46 hours | play > |