Главная
Study mode:
on
1
Introduction
2
Information Age
3
Layered Systems
4
Levels of Security
5
Perimeter Firewall
6
ISAE 2702
7
Compliance
8
Trojan Horses
9
Worms
10
Denial of Service
11
Inference
12
Cover Channels
13
Active Attack
14
Example Email
15
Defense in Depth
16
Demilitarized Zone
17
Defense
18
OSI Model
19
Internet Model
Description:
Explore the fundamentals of security and network forensics in this introductory lecture covering key concepts such as layered systems, perimeter firewalls, compliance, various types of cyber threats, defense strategies, and network models. Gain insights into the Information Age, levels of security, ISAE 2702, and the importance of defense in depth. Learn about Trojan horses, worms, denial of service attacks, inference, cover channels, and active attacks through practical examples. Understand the significance of demilitarized zones, the OSI model, and the Internet model in network security. Delve into this comprehensive overview based on Prof Bill Buchanan's book "Introduction to Security and Network Forensics" to build a strong foundation in cybersecurity principles.

Introduction to Security and Network Forensics - Lecture 1

Bill Buchanan OBE
Add to list
0:00 / 0:00