|
|
Showing 1 - 2 of
2 matches in All Departments
Network Security and how to traceback, attack and react to network
vulnerability and threats. Concentration on traceback techniques
for attacks launched with single packets involving encrypted
payloads, chaff and other obfuscation techniques. Due to the
development of various tools and techniques to increase the source
of network attacks, our interest will include network forensics,
with the goal of identifying the specific host which launched the
attack and cause denial of services (DoS). Also we will include
tracing an attack that would compromise the confidentiality and
integrity of information on the Intelligence Community (IC)
network, which includes the NIPRNET, SIPRNET, JWICS, and IC
enclaves. Deliverables will be technical reports, software,
demonstrations, and results of experiments, which will provide
evidence and metrics. The emergence of hybrid worm attacks
utilizing multiple exploits to breach security infrastructures has
forced enterprises to look into solutions that can defend their
critical assets against constantly shifting threats.
Network Security and how to traceback, attack and react to network
vulnerability and threats. Concentration on traceback techniques
for attacks launched with single packets involving encrypted
payloads, chaff and other obfuscation techniques. Due to the
development of various tools and techniques to increase the source
of network attacks, our interest will include network forensics,
with the goal of identifying the specific host which launched the
attack and cause denial of services (DoS). Also we will include
tracing an attack that would compromise the confidentiality and
integrity of information on the Intelligence Community (IC)
network, which includes the NIPRNET, SIPRNET, JWICS, and IC
enclaves. Deliverables will be technical reports, software,
demonstrations, and results of experiments, which will provide
evidence and metrics. The emergence of hybrid worm attacks
utilizing multiple exploits to breach security infrastructures has
forced enterprises to look into solutions that can defend their
critical assets against constantly shifting threats.
|
You may like...
The New Kingdom
Wilbur Smith, Mark Chadbourn
Hardcover
(1)
R589
R530
Discovery Miles 5 300
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.