- Page 1 and 2: 安全性機制及工具 主講人:
- Page 3 and 4: 1.網路世界上的系統 3
- Page 5 and 6: Auditing &Trapping Tools: Honeypot/
- Page 7 and 8: 1. What Is an Internet Firewall?
- Page 9 and 10: 2.1 封包過濾式防火牆 (Packe
- Page 11 and 12: 封包過濾的優點 封包過濾
- Page 13 and 14: 2.2 應用層閘道式防火牆 (Ap
- Page 15: 2.2 應用層閘道式防火牆 (Ap
- Page 19 and 20: 2.3 電路層閘道式防火牆 (Ci
- Page 21 and 22: 3. 著名防火牆介紹 � 3.1
- Page 23 and 24: 設定規則 23
- Page 26 and 27: 3.1.2 軟體防火牆 -ISA Server
- Page 28 and 29: 3.1.3 軟體防火牆 - Checkpoint
- Page 30 and 31: 3.2.1 硬體防火牆 - NetScreen
- Page 32 and 33: 3.2.3 硬體防火牆 - Nokia IP40
- Page 34 and 35: 小結 � 軟體防火牆的主要
- Page 36 and 37: 4.1雙介面主機 - Dual-Homed Hos
- Page 38 and 39: Using a screening router to do pack
- Page 40 and 41: 屏障式閘道器 (Screened Host G
- Page 42 and 43: 4.4 屏障式子網防火牆 �
- Page 44 and 45: 4.5 雙屏障式子網防火牆 �
- Page 46 and 47: Netfilter Architecture - A Packet T
- Page 48 and 49: 5.2 封包過濾原理 48
- Page 50 and 51: 5.3.2 Command 命令 � 表示要
- Page 52 and 53: 5.3.4 Target 目標 � 若少了
- Page 54 and 55: 6.1 White Box Test � 以設計為
- Page 56 and 57: 6.3 實務測試: � TEST 1:防火
- Page 58 and 59: 6.3 實務測試: � TEST 3:使用
- Page 60 and 61: 實務測試:[作業] 60
- Page 62 and 63: 實務測試:[作業] 作業3:解
- Page 64 and 65: Enhanced Security Tools: IDS � Wh
- Page 66 and 67:
Host Intrusion detection system (HI
- Page 68 and 69:
Intrusion Detection System: History
- Page 70 and 71:
Six main components � Subjects: I
- Page 72 and 73:
Intrusion Detection Working Group (
- Page 74 and 75:
IDWG Documents 74
- Page 76 and 77:
The Intrusion Detection Exchange Pr
- Page 78 and 79:
Data source(1): WINDOWS/Event Log 7
- Page 80:
Data source(3): Windows registry 80
- Page 83 and 84:
Anomaly detection � statistical m
- Page 85 and 86:
IDS Product � AXENT (acquired by
- Page 87 and 88:
•1998 DARPA Intrusion Detection E
- Page 89 and 90:
� 89
- Page 91 and 92:
1998 Anomaly Training Data The simu
- Page 94:
aesop 192.168.1.20 Web Server Linux
- Page 97 and 98:
研伸閱讀與進階研究:IDS/IDP
- Page 99 and 100:
NIDS Mode運作流程 99
- Page 101 and 102:
IDS測試 � TEST 1: SNORT安裝
- Page 103 and 104:
Enhanced Security Tools: VPN � Wh
- Page 105 and 106:
何謂VPN(Virtual Private Networks)
- Page 107 and 108:
VPN 應用: 通過Internet達到遠
- Page 109 and 110:
通過區域網路與伺服器達
- Page 111 and 112:
VPN 技術:通道技術 � CPE (Cu
- Page 113 and 114:
點到點通道協議 -PPTP(Point-t
- Page 115 and 116:
第二層通道協議 -L2TP(Layer T
- Page 117 and 118:
IPSec協議 � 在Layer 3網路層
- Page 119 and 120:
Tunnel Mode 119
- Page 121 and 122:
四種通道技術在OSI七層模
- Page 123 and 124:
VPN 產品介紹 � 硬體式的VP
- Page 125 and 126:
產品說明 � Cisco VPN 3000 Con
- Page 127 and 128:
VPN基本要求 � 用戶驗證 VP
- Page 129 and 130:
實驗目的 � 正常連線至企
- Page 131 and 132:
實務測試: � TEST 1: 路由對
- Page 133 and 134:
Enterprise Security Testing :Vulner
- Page 135 and 136:
弱點掃描分類 � 主動掃描
- Page 137 and 138:
Retina security scanner 137
- Page 139 and 140:
139
- Page 141 and 142:
141
- Page 143 and 144:
143
- Page 145 and 146:
145
- Page 147 and 148:
147
- Page 149 and 150:
149
- Page 151 and 152:
151
- Page 153 and 154:
153
- Page 155 and 156:
155
- Page 157 and 158:
157
- Page 159 and 160:
159
- Page 161 and 162:
161
- Page 163 and 164:
163
- Page 165 and 166:
165
- Page 167 and 168:
OSSTMM 167
- Page 169 and 170:
What about “Forensics”? � “
- Page 171 and 172:
Digital Forensic Science � The us
- Page 173 and 174:
173
- Page 175 and 176:
175
- Page 177 and 178:
Computer Forensics Tool Testing (CF
- Page 179 and 180:
Digital Crime Scene Investigation
- Page 181 and 182:
Is it Necessary? � An investigati
- Page 183 and 184:
183
- Page 185 and 186:
Existing Research (2) � Extractio
- Page 187 and 188:
187
- Page 189 and 190:
Event Construction Event Sequencing
- Page 191 and 192:
作業 � digital forensic analysi