) "**!ก ก )$+$,ก,ก ก +ก,ก 1!&1!& 2!ก34&#+)ก&ก5) ก ก )$+ )ก!26&
|
|
|
- ศิริพร บราวน์
- 10 years ago
- Views:
Transcription
1 1 ก ก () กก กก!.# ) "**!ก ก )$+$,ก,ก ก# +ก,ก 1!&1!& 2!ก34&#+)ก&ก5) ก ก )$+ )ก!26& ) "**!ก ก )$+$,ก,ก ก #+ก,ก 1!&17 1. ก!34& ) 6" ( 5) " ก 2"!6 ก 6! +% &+!,,2"!%ก %ก!12 ) &+!7 611! %* 2.ก &! ก :&กก!34&)1;+6" ( 6) " ก 2"!6 ก Keystroke $4กก ก + &+!,!162E &F,2! %$,2"!G +!12 ) &+!$,G, 3.ก!34&! 6" ( 7) " ก ก )$2F,!34& J:!$,G611! %*!ก )! ) ก (hack) 1!&! & 6 1%* 4.ก ก! 6 " ( 8 ) ก ก! &+!,2 )&ก & " ก 2"!6 ก JJ ก"%!$, )&ก &12!+! 5.ก ก! ) 6" ( 9 ) 10) " ก &1 E 6$!12 ) &+!, $2!! ) & 6.ก & (spam) ) ( 11) +!7, 47,2! %34&ก & S4,&Gก5)ก ก )$+$,2ก!&ก 10 )&Gก $+6ก 2"!6 ก!&12!, กF 6ก;&$, " 1 (IP address) S4,&กก2!ก ก 2"! ก&" ก 6W5!$& $,"&S7F$2!, * 7.ก ก )$+$,ก2!ก &+ก )$,& & )$- ( 12) ก ก ) ))! $,ก2!ก
2 2 ก ก )"" ก )$,& & )$-X 5),&2$&- #ก)ก ก X 5) 8. ก + "%,&,2"!ก )$+ ( 13) " ก!& SJ,"2!+!2$,&$,G+&F ก,ก 9.ก &! + 7$,1))ก + &+!2! ก ( 14 ) 15) & 7Gก5)$,กกก!! $,G$E 71)2 &F 6 $, 14 ก %34&ก &!!&! G $E$,ก2!กก+!, ก2!ก, )กก )"" G!$,ก )$3 )ก กก! $7&!ก )&!$,G+$,ก1!!&! " ก &6Y ก!1 )$,ก,ก3 )ก!$,ก,ก,& & )$-!2! ก+!, $&Eก$ ก ก 6$&ก )$ )Eก&F 2 & $, 15 ก ก6$ &+!2! ก S4,&34& $$, 2!ก ก )$ +$,ก!&!!& 6$!"กก1 )&ก +!& ก 10.ก + กก &2!+!,3ก, ( 16) Gก ก#+2,& &ก &%,$,$2!+! ",& 3ก, ก"& 1! 6$%ก1กZ 1 กก,$ $7&$7& + 7ก+#, )$ก1!
3 3 ก ก ก!ก'( กก )&F 2%[%!ก,!&ก 2 &F " ก 2"! ATM ก, $&6$ -$ ก %**51J ก! ก 2! ก X 5) " 3 )$& ก- ก )$,&ก &ก ก ) ก _ก&X G! กก7 &กE!&F $,2"!2&ก X% ก)& "ก ก$,!&ก 2!,& 2,& 3ก ),! )&ก1! ) 2[%S4,&2 1 7,& ก$,G"ก ก!! &$66 ) $ E(Internet) S4,& ก2!ก[*"*ก ก 47G& )'ก! 1 ก ก )$2F กE $,ก,กก 2"! $2!,1! ) +!ก )$1! + )6"$ 2 ก ก )$+กa2F S4,&2"!$66 G,& )2ก &!!$,,+!ก )$+ กE!&2"!!$&$66 "ก *ก+,'ก! (Categories of Computer Criminals) 1 ก2(Novice) % )$71!G"*ก 6$! & &2"!6ก2 &!$,$,!1ก ก!,!1&#!7F )G ก $,Gก!& ก& &&7F & 2 กก (Deranged persons) ก5) &% )$7 กก )$)1 6 -ก %+ "$ G+!g$&) 6$,1 1 3%&1! )) $ ) SJ$ J:!&F 3 Gก%$, )ก"*ก 2ก5)&ก (Organized crime) Gก$, )ก "*ก 6+ )6"ก ก ก )$ Gก%กE&! G& 32"!2ก ก 7&ก ก% &!!$, 1! 4 ก"(Career) Gกก )$+ 634&!)3กก%!,!6$ ก กE)ก )$+S7ก 5 กk(Con artists) Gก$,"2"!ก!!$& 2!1!S4,& + )6"$&ก &
4 4 ก ก 6 ก"&"&_[(Ideologues) Gก$,ก )$+,&ก",32,&4,&,&2 & % & Gกก!!"&&% %, 7 ก Hacker/Cracker Gก$,&2 )!34& ) & ) J:! 6ก & Hacker/Cracker 1!&7 7.1 Hacker 34& %+!$,Gp )!2 ) G& 3!134&!2 6)+ ) ก & 1! 1&+ )6" 7.2 Cracker 34& +!$,!)$ก)$& G& 3! )1!,!1$ J:! $2!,& $7&ก $ )qก &,& ) ก<กก! [%"*ก G,&* )G"*ก - #ก )$ 4,& S4,&1 32"!%X 1!6 & +!ก )$+!72*G+!! &!$,ก & )ก 5)"*& )+ )6"!ก,!&- กa! $,)!34&,&7!&ก!) )กa*2"! 40 กZ!กE กE&1กa$,)ก ก"*ก )$76p)1! "*ก 4&1!!&%&ก2ก )ก#-,&กกa1$ 2"! )& )ก+2ก,6!&$1!ก 3!1 J[&1" -กE)กJ:& 4& 3$1! [*)6!"*ก 2&[%),&,ก 472 ก! ' => 4 ก5) ก ก ) ) ก $&ก 1!ก %ก 5),&F ก5)$,& ก )!12 ), )ก ก &SJ!&F ก5)$, Gก )! ) ก & )qก (Operating System) ก5)$,, Gก )+ ) ก% G"&$&2ก ก )$+
5 5 ก ก Aกก+=*B! 1....กก กก!*' - $, 18 ก กa กกD<E'< ก... FG - ก!34& ) &+!,6" - ก ;+! ก :&กก!34& ) $,+!,$ 47Gก p) - ก!34&! 61" - ก ก! &+!, - ก $2! $ ก!1,&,! 61" - ก ก )$,2!ก $& & ) &+!,1 3$&1!ก - ก &! กก 2"! ) &,6ก% - ก "%,&$,$ 47,12"!G,&2ก ก )$+ - ก 2"! ) $+, +!2! ก &2% 2!ก ก )$+ - ก ก&! $,G &% 3. +!2! ก $,...71! )%1! 3ก1!G 4 )$2*F &7 1. +! )กกก 6$ 16 )6$ -$ )$ )& " ก, 1! 2. +!2! ก ก!34& ) 16$ E $7&+)1! 2 ) 2$, ก$ E $,7& 472p) &ก & 3. +!2! ก " ) 2!" ก 6 ก )%ก (Host Service Provider) 4. +!2! ก! + application &F $, ก content provider "+! 2! ก web board web service G! 4. *JK )LE' $Xv G$ $&[**&4,& $,กa2!%! &62!! & $Xv 3$X&+!$,)ก )$ก 2F ก,ก&!& $,1!ก )$ 47
6 6 ก ก 5. 7&)2"!& $XvSJ 1 "%2 & 1,&$7 $6 ก,ก &กก 1 2!+!2 SJ &$1 6. ก#Eก+P'PNO!D*JKL(ก')@P,$S7SJ 2"!& $ 1! 2%*ก 2"!&S4,& )%$X$,! & $Xv%*2!$2"!&SJ 71! $7& )% &ก 2"!& ก! " SJ & )$%*2!$2"!&$,& ก $&$,!1!$ ก 72!), )6" &$& )กEก 71!Gก#2ก $Xv$,3ก!&!&ก &SJ ) $Xv SJ 3ก1", 6 ก 72+ CD-ROM $, %SJ "S4,&กG+& ก+!+SJ $ SJ 6 %2ก&ก261ก& %5x 1ก %*ก 2"!& ก 2"!& 7. J (patent) )LE' 34& &*$, #ก2!,%! &ก )#! ก ก +5x $,ก5)$,ก2กa $,ก,กก )#! ก ก,2!1!,& &,,&2"!,&)ก&F$, 2"!ก2" ) " ก )# 3, 6$ $-, 8. = B'J )$ &$X... $X ) 3 )$ 1. Jก=+A! 34& ก!ก,ก ก1ก 6 &!& )ก &,& &,&2"! " ก1ก &ก!&3 2. Jกก*B,S! 34& ก ก & $, &E1!กก " ก กก!72! & &$! G! 3. IJ (Petty patent) Gก 2!%! &,& )#! "ก $X ก )# ก&ก &$,ก )#$,) %$X Gก )#$,Gก %&&Eก! ) )6"2"!ก 47กก
7 7 ก ก 9.,! *Uกก! (Electronic commerce) )LE' Electronic Commerce ก 5"Eก$ ก 34& ก $X% ก $& - #ก$,+,Eก$ ก " ก S7!) ก 6W5! ก 6 &$&Eก$ ก G! % & E-Commerce )2"! ), )$X2ก X% ก 6* && )ก &X% ก$,&E!&1! " $,$ก!&&! (show room) &! ก& ) ก&2! ก! ก! G! &7!ก$&- ))$&)$ ก ก&ก 4&1G% ก $X% กก1 10. 'กก,! *Uกก!'G 1.;ก! 24 ",6& 2.ก!&1! $,6ก 3.2"!& )5&$%! 4.[*!ก $& 5.&ก )"X6 3 )"X1!$,6ก 11. ก'! Pก 1. กEก2 (Novice) 2. กก (Deranged persons) 3. "*ก $, ก%ก )$+ (Organized crime) 4. "*ก " (Career) 5. กk ก!! (Con artists) 6. ก,&$X(Dreamer) / ก"&"&_[(Ideologues) 7. +!$,!)$ก)! & (Hacker/Cracker ) 12. =X<<IY*ก P<ก= B'ก'!P 9 = B ((*,Iกก 1. ก 6!$& E 34&ก 6 )6"2ก ก2"! ก 2. ก ก;+ && 62"! )ก, 3. ก ) $Xv & )SJ 6" 4. ก + & ก )!$,1) 5. ก Jก& 6. ก กก ) " $ )X 56 " )7 1J
8 8 ก ก 7. ก ก&2!! &$% (ก $X% ก$,1"!กa) 8. ก ก2"!!,&+ )6"2$&"" ก 6 9. ก 2"! 2ก 6*"+!,G && 13. ก! ' => 4 1. ก ) ) ก $&ก 1!ก %ก 5),&F 2. ก )!12 ), )ก ก &SJ!&F 3. Gก )! ) ก & )qก (Operating System) 4. Gก )+ ) ก% 62"! EG"&$&2 ก ก )$+ 14. IกD<@ GSJ $,"2ก 2ก,กก ก ก! ก )! )ก!&$,SS! 2!SJ ก กก7 DSS & Gก )ก $& )&%ก ก$66$&!SJ 6Gก ก )$6!ก,ก![*16 &!& )2!ก % &+!2"!7&,!34&7% 15. I,' DSS 'G 1. &ก!)2"!&,&ก+!2"!$ก)$& $-$,ก &2ก 2"!&)!&ก &[* $2! DSS!& )ก+!2"! 2. 36!ก+!2"!1!& E ) )$X 6$, DSS $,!& 3, ก+!2"!&p 6&!&ก )6!ก+!2"!1! $ 6p)23ก 5[% $,!&ก E2ก ก![* 3.! )& %ก 2$,))!& กก5) &[* 4. %ก 2ก4,&6 &!& )16 &!& S4,&ก&ก ) $- q &$,ก! & )$7 5. %$,)&!&ก $,,&1 &+!2"!,&กก5) &[*$,1 ),&3ก 5 กก7+!ก ) +"*!ก[* $,1),&$&3ก 5กก7+!ก )+"*ก[*2ก5)4&!&ก ) $-$,"!$,1SS! )&ก 2
9 9 ก ก 16. #)() (Executive Information Systems) ก EIS )LE' ) $-$,3กk 476p),2!!&ก!&ก $ก) ) 32ก!34& $- +! 17. =X=+A! (Artificial intelligence: AI) )LE',&ก p )$,!&ก!$&! $- )-ก - 6p)&,& p$&!6 ก S4,&G2ก5)ก 2"! 2!!)!2 3 &% !3กกE1!2 &&ก กG#!&ก $,ก& 3! 4ก1!$%ก 2. "!&ก1ก$,1!4ก,! ก&กG& )ก 3. "2"!2& ) &$,, 4., 32#! &&ก!X[* $, 5ก SS!ก 19. ( (Expert System: ES) )LE' ) $,&ก 2 &% +!G+!","*2!2! 4,& 62"!!)ก %%+"&% (inference) 2ก ก![*กF $,!& -+!","* 20. '' ES P=DD'' c Pก diagnosis of faults and diseases, automobile diagnosis, interpretation of data (" sonar signals), mineral exploration, personnel scheduling, computer network management, weather forecasting, stock market prediction, consumer buying advice, diet advice 21. ก=**ก (TPS) *ก+,ก''P %5ก5) & )ก )+! 1. 3กE!$,ก 47 ) &ก X% ก1! " )ก! ก,&S7!กก! 2. 3!&!,X% ก1! " ก2กก ก2!&7 ก2 ก!
10 10 ก ก 3. %& ก! (Data Maintenance) 6ก %&! (, ก!1 ) 2!G [%ก$,%1)Gก,& &! ",$, &ก!! G! 22. ก'' TPS P=D 4 1. ก &ก 2. " )! 3. $4ก ) 4. ก2 E 23. <'ก=Y!' EIS 3 1.!%5 & 2. )ก 6!ก+!2"! 3. $$, )$X ก ก 4. 7 )6"ก $& &&ก 2!& F 24. <'ก= B' AI 1.ก )X " (Natural Language Processing) 2. ) (Vision System) 3. )! )$ (Natural Networks) 4.% (Robotics) 5. )+!","* (Expert System) 25. OIS L<'Pก= B &1! 4 )$ )ก ก ก (Document management system) )ก ก (Message-handling systems) ) )"%$&1ก (Teleconferencing system) )%ก& (Office support systems) 26. <'กก')' M-Commerce ก E-Commerce 1.$7& E-Commerce ) M-Commerce &กEG4,& &ก!5"Eก$ ก 2. E-Commerce Gก!5"Eก$ ก$,$ก!E1S &,& 3. M-Commerce Gก!5"Eก$ ก$,$ก!6$ -$3 4.ก! M-Commerce 3$ก,&S7!1!)กก E-Commerce
11 11 ก ก BIก*กก+=*B! (Threats and Security on computer system) ) (Topic) 7.1 )$ &%ก 7.2 ก ก ) LI='!ก ( (Learning Objective) 1. ก )$ &%ก1! 2. )X2ก :&ก ) 1! 3. X ก 2ก ก &!1! 4. กก& )& Hacker ก Cracker 1! 5. กก& )& Virus ก Worm 1! 6. ก & Spam )! & Spam 1! 7. X%ก E-Commerce )%ก, F Internet 1! 8. ก )6")6$ & Cookie 1! 9. )Xก &ก%2ก กS7! Web Site 1! 7.1 = B'BIก $,ก 47ก ) (Disaster) G$7&$&!ก)!! $, ก 47ก ) Hardware Programs J:! )%ก 5, F 3ก$ 2!2!ก S4,&$,! &$,%กEก $,7$2! )1 32"!&1! )$ &%ก$,ก 47ก ) ) 7 3ก1! 2 )$ ก F &7 1. %ก$& ก) (Logical) 34& %ก$&!! 2. %ก$&ก (Physical) 34& $,กก,&)%ก 5 " กX " )กก ก )$ &%$,$2!ก,&)%ก 5
12 12 ก ก BIก'(* Hacker +!$,!2"!& ) && &ก, 6 1! %* 1 )&! 1$,)!&!&! 2!ก2 $7&7 %+$,$"7G )!&ก $! 3 &&กE G11! Cracker +!$,!2"!& ) && &ก, 6!)!1$ )!&2!ก ) Network &&ก, 6!$,G$&X% ก Note : 1)G Hacker Cracker 3!ก!2"!& ) & +!,!)1 )&!กE31$7&7 ) X! P (Viruses) 6 ก )$4,&$, 4767&2 & Programmer 3กก2! ก )&ก1J4,&1&1J,F 2,& 1 ) ก )&& E1&$%ก1J2 )$ 2!1Jก "7&"!F 1 )1 3 ก )ก,&4,&1&ก,&4,& 1!!& 6$,1!)กกก $,+!2"!2"!,กE! " Diskette ก 1J!& Disk )1,12"!ก,&, 1 ก1J,ก & )&ก )! U (Worms) )ก 3$ )1! ก2 ก$,กก+1!ก2!G6 ก $,3ก ก2! 3 ก )&ก,&,&4,&1&ก,&4,&6 - )E (+ Cable) S4,&ก ก ) 3$1!! &&& E ) % &ก1,1 กE$,%5,& Share 1J!+ Network,7 Worms 3 1ก, 1! Spam mail ก &!$,1G$,!&ก 2!กก F ก&$,+! 1!ก ก 6กก2 & $2!+! *2)2ก!7! Spam mail &$2! )$Xก &!$ E&!
13 13 ก ก BIกDกJIก< E- Commerce 2ก $X% ก )5"Eก$ ก )ก%กE1S1! 4&G,&*$, $%ก )!%ก2!&$,ก 47ก ),! ก :&ก&! &%ก$, )& 5"Eก$ ก " 1. ก! 611! %* " %,!&2ก 2"!", Login Name ) Password 2ก!1$X% ก S7 Web site $ & 2. ก $!) " Cracker ) )!1$ file )! 2,& Server & Web site +! $2!!"ก ก! & )ก 3. ก,& ก, ก &! " ก & Order Eก$ ก2ก,&S7! ก $,3ก; )&$& $2!!1G )+!;,& ก!1,!2 " ก ก!1 &ก,&S7! G! 4. ก ;+!ก+!$,11! %*, G"ก1!2 Web site 2 F Server &! & Web site )กE! & 1! ก! & Web Site X 2ก $X% ก! & 1 2!&ก, "!2!ก $ Credit G! 5. ก $2! ) ก & %")&ก " ก $, Cracker!$ ) )&+2!,& Server &! & Web site 1 32! ก กก! & 1! ก )7)3กก!1 &7, )G ))",6& ) กE)&+! Web! 6. ก 6!, &G+!2!!1!ก Web site $, )S7!!73ก 6ก! & Web site ก+! Web ก Cracker $,12"! )6" 7 &+ก )ก ;+! & 6 11! %*3Gก 6 7. ก qxก ก $,1! " qx11!!1ก ก ก,&S7$, Web site 62"!",7!&,&S7!!11! ก &!ก web site &ก, 2"!G!!&2ก " )&!$, 8. ก!&1!2! ก!&1!&!) ก! 9. Virus $,_&ก+!$,!2"! ก &+$2!,& Server &! & web site 1! กก $, Virus $!) file & F 2 )
14 14 ก ก BIก Internet 4,&$,134&ก$ E$,&+ก )$6 &"1$ ) $ E&G, Electronic $, ก ก %$X &+!2"!&1ก &7 ก ก )$2 F 2!&$ (Chat) ) E (Web board) 4&ก 471!&1! กG$, )กS4,& 5)!4ก &+!2"! 2!&$ $%ก 3%)1 ก2 กE1! )&F1ก ;+!& ",$,2"!2ก $$7 &74&1$&!1! ก&%ก2,&$,7 G & 1 &)E!&$,"*ก $,กก %7& 7& %,!กก %ก2!&$ (Chat Room) $ E Case1: )'(GP' J@ "%)*& $ก6ก Cyber 6*&+!71!!& X " )",& & ก Channel V Thailand S4,&$2!"%+!7", G,& & $7&F$,&1E!ก ก74&ก,$&6$ -$ 2$,% +1 _g"$,)&12*&+!!&g&ก4& _g*&&& 6$,&1E!! 7& 6ก&ก_g")&1_ก1!ก &6 & ",&&4,&!2! ก ก &ก7! _g*&กe&! กW1 _g"4&!3กก4&!!& 2$,% กE 3ก! % +!71! S4,&X&$,ก &ก 4&$2!"%&",$2 Case2: #ก)E' P=Y!D U!' Pantip.com P@)'DBD E กE 3!&[g2!ก&1! &&$,-ก 4,&!16$2E & Pantip.com 1! *& 2"!2! $2!X กก 1ก!1 )ก)G,& 2*6 4&ก!X" )1!& กq+!&4&1ก Webmaster & Pantip.com Webmaster 4&,&1!& &ก "E$,6$) IP Address ก$&E1S! 4&1 & ISP $,-ก +!72"! ก S4,& ISP กE 3ก 6$ -$ &-ก $,2"!$ E!1! 6"$,-ก 711!2"!$ E$ EJg2"!ก6, & & 4& 3$,1!1ก,134&! กq1)1 ก 47 %ก 5 $7&G&,&& 47,%ก$7
15 15 ก ก IกกG (Cookie) ก $, Web Server! &+!2"!$,ก ก1!,!1$X% ก S7 web site 6กE ) &!&21J %กก7ƒ S4,&+!2"!G+!2!!!& ก!&2 file cookie $7&!)! S4,&!กE $2!)ก,!&ก )ก ก! "%S7ก 7& web browser )!$, ก ก1!) ก!7 472!$2! $&1!)ก) E 47 2$&กก! & กE1G กG!$, *)+!12"!2$&$,+กEก )$ก 1! Errors!+ &6 ก G%ก$,$2! ก%&&) $!$,3กกE1! &+ก $& &6 ก Bugs "%,& (code) &6 ก $,!ก &!+ S4,& Bugs ก Errors ก&กก Errors &6 ก ก 47!& 7& ) 3ก!1!+71!, F Bugs &6 ก 7,k6 ก E 6 ก 712"! ก )) Bugs & G!+$,!& % &!&ก!1 (Modify) 6 ก 2 BIก'กB (Physical) B<กJ " 1. 7$ ,S4 4. % J:+ 6. X ", F B<กกก'I+! " 1. ก 6,&)%ก 5 2. ก $%ก 5 Hardware 3. 1JJ: 4. 1J2!
16 16 ก ก 7.2. กก+=*B! กก กกG 2! 1!ก 1. =*B'(* (Information Security)!G$ )$4,& & &ก )G2ก ก X% ก &7G!&2!*2ก ก &! "กก ก &,&)%ก 5 2! *กก!S71 2. =*B'กB (Physical Security) 1!ก $ %ก 5& F กกก+=*B'(* 1. ก )%%)!$, (Authentication & Authorization), )%%$, $X% ก! 2.ก ก &! (Confidentiality), ก2 5)&+$& 12!3ก;6%,$,12"+! 3.ก ก3ก!& &! (Integrity),ก :&ก12!%,$,12"+! ; )ก!1,&! 4. ก :&กก qx!& +" (None-Repudiation),:&ก ก ax +2ก $X% ก )&ก " ก!&11!& 11!! กก+=*B'(* ก ) (Cryptography) ก $2!!$,)&+1$& 2 $,1 3ก1!!ก! (Encryption) $2!!7G S4,&+!$,$Xv &$7) 3!71!!ก 3 (Decryption)
17 17 ก ก (Digital Signature) ", (Digital Signature) กก& SE 2"!2ก )% %,&34&2ก 72**7 F ):&กก qx +",",32ก $X% ก ก กก'**'*@@<* 1.!Eก$ ก!p (2 & file) $,)&17 + ก )ก $&5- $, ก J[&ก"! (Hash Function),2!1!!$,7 "กก!!ก"74,& S4,&!)1!,& ก7กE!&ก$ ก! (Encryption) ก$ 2. ก7$ก!!ก%* &+!&ƒ ก 77 Digital Signatureƒ 3. & Digital Signature 1!ก!!p$, )%2! 1,+! F กE)!73กก!1 )&$& 1 6!!p$,1! + ก )ก! J[&ก"! (Hash Function) )1!!$,! "กก!$,3ก ) 4. Digital Signature $ก 3! ก%*X 5) &+!& (Public Key) กE) 1!!$,!ก4,& ก7 $!$,! $,2!3 )! 4 3!! กกE&!11!3กก!1 )&ก & D'<* (Digital Certificate) ก %*2"!2 &$ (Digital Certificate) กE,,",32ก $ X% ก ก Internet S4,&&$, 3ก2 &$ (Digital Certificate) 71!)G &ก ก&ƒ $,",&G$,",3 ก&ก ก&7 Certification Authority: CAƒ Digital Certificate )3ก2"! 2ก $X% ก G%7 &$,1!!&1! S4,& 3ก )$ &2 & 1! 3 )$ 1!ก 1. 2 &,& (Server) 2. 2 &% 3. 2 & &ก &3ก!&
18 18 ก ก Certification Authority (CA) CA &ก &3ก!& 2ก ก2 & (Digital Certificate ) S4,& ก &3ก!& ก กD)ก YY*ก) )ก! - ก!&ก%*X 5) - ก%* +!$) - ก &ก%* ก!&)ก &", 2. กD)ก กกกกD' )ก! - ก ก ก กE ก ก กก ก + 2 & - ก ก6ก ก)%2 & 3. " ก **& F ก $$) ก ก!ก%* )$-1$ &1&ก tcau S4,&[%&$,!&ก ",32 ก $X Web G!&2"! ก $66&$,กก&" &1 &2 #&" NECTEC ( & 3k$66& F &ก,2!2"! ก 2 )$-1!
19 19 ก ก 7ก Digital Certificates
20 20 ก ก SSL (Secure Sockets Layer) SSL 2"!2ก ก ก $X% ก & F +$ E S4,& SSL 7)2"!2ก! (encrypt)! 2"!2ก )_g+! & 7ก $& & SSL &7 1. +!2"! 1& Web Server $,2"! ) SSL 2. ก7 Server )&2 & (Server Certificate) ก!ก!!ก%* X 5) (Public Key) &S J 3. _[&+! )$ก &_[&+! ก2 & (Server Certificate) ก7กE)$ก!&ก%*6ก %)$ก! ก%*!ก%*X 5) & S J $,1!,&ก1& Server 4., Server 1!!&กกE)3!ก%* (Private Key) กE)1! ก%* &ก!1!2"!2ก, 5. ก7กE 3, ก 6ก!, ก=v'ก Hacker ก Cracker ก :&ก$,1!+$,%ก 2"! + (Password) )2"! Server $, & (Secured Server) 1J (Firewall) ) $ (Router) 1):&ก!X2กE! กE1 3,21!X7 F ) 3:&ก1! 100% 2$,,& 7&ก ", ) Password Gก ก 77#2ก Login! ) 6ก 7& + (Password) 7 &! 6 ก )1 &ก ) Update + F 7& Firewall ก&1J (Firewall) G1!$7&Š )SJ &ก $,ก ",, ก ก )2"! Firewall,กก!2 611! %* :&กก %ก %ก ก Hacker ) Cracker $,)$ 2!ก &&ก S4,& Firewall )%*2! p)!$,%5ก5) &ก&,1 $,ก1! +!ก ) 1! กก7 Firewall & 3ก & Virus 1! 1$7& )กE1 3:&ก $,ก $ E$%ก 1!
21 21 ก ก Clipper Chip G& Š $&Eก$ ก$,)!,2"!2ก, ก$ E "1! ก 6 # # "71!$ 476$,$& # 33 71! $2!กก 6!3&กก # # 3ก, $ E 1! &1 กE$& # # กE!& #)3!,&-$7 ($ NO!!=v'กP (Anti-Virus Software) Anti-Virus G ก 2"!& 34&!,&7)1ก ", กE!$,ก & Anti-Virus )$ Virus กE1 3 :&ก Virus 2 F 12!!,& 1! &7 SJ Anti-Virus ก2กE) )$X&% &"& ))4,&$7, Virus 2ก 47กE1 3&$,)ก) $ Virus 71! +!2"!4& Update SJ Anti-Virus 2!$ )[% SJ Anti-Virus $,",&)G$,2!F &6ก1!ก 1. Norton Antivirus & $ Symantec ( 2. McAfee & $ Network Associates, Inc. ( &! Anti-Virus, F &7 ( Anti- Virus (D<) L 1 SpyWall Anti-Spyware spyware 2 XoftSpy SE Anti-Spyware 4.22 ) spyware, adware,trojans 3 XoftSpy SE Anti-Spyware 4.22 spyware, adware, Trojan horses 4 Spyware Doctor 4 spyware, adware, Trojan horses, keyloggers 5 McAfee VirusScan Plus 2007 spyware ) virus $,%ก,&) :&ก6 ก,$,%&!,& 6 AVG Anti-Virus Free Edition :&ก,&ก Virus )6 ก,$, %&!,&
22 22 ก ก Free AntiVirus ( L 1 PC Tools AntiVirus 3.1 Free Edition :&ก)!,&",!& F $,ก ก %ก &6ก Cyber 12!!34&) $!2,& PC 2. Avira AntiVir PersonalEdition Classic ",32ก!):&ก $,ก Virus, worms, Trojans Norton Antivirus Norton G Software $,1! ก 3:&ก Virus 1!ก 90% ก$7&& 2"!&&) Update Center 2ก %& Software 2! 3ก Virus 2 F 2! $ กก7 Norton Antivirus & 3!& &2ก ก1 6 ก $ +กp%กpก 5$,1 3!6 ก 61! &&ก $& &6 ก Norton Anti-Virus
23 23 ก ก McAfee Anti-Virus Gก4,&26 ก $,1! &ก Norton Antivirus 2ก Virus ก $,1! Update Center, %& 3 &6 ก 2!2 ) $,&ก 2"!& ( Avira Anti-Virus Gก6 ก 4,&$, )$X2ก ก Virus 2"!&&) Vision 2"! &J 61!&2"! 3 Download Avira Anti- Virus % Classic,2"!&J 1!$, S4,&,!12 web site! 3-4ก!ก,ก ", ) % & & Virus 1! &&
24 24 ก ก
25 25 ก ก =*BDก Internet ก " )&!) ก! ) Internet 7,&!& )G"&$&2$, &1%!ก &11!&2ก Web Site $,!1" ) & 3! $ก! )&ก " )&! Credit ) Internet กก " )! Credit!! [ 7$,1$,!12"! ก,& ) Internet )!ก,&ก G+!ก ก Credit!& )$ ก $%ก
26 26 ก ก &!&) กE ก$ X% ก S7 ก Web site $,",&G$,",3$,; 2! ก " Amazon.com Dell.com Thailand.com,&ก Web 7) ก5$, )2X% ก &7) ) ก):&กก %ก %ก 1! 3!กG!!,&$, 134&,&ก 11!$ ก & Credit!& กGก&2!$,G!),21!&1 ก&) 1 )ก 1! ก' ก=*BDกN@G Web Sit &ก%1!ก[ก F &17 1.@ '' UPN! 1!ก &E1S ))$,;ก ก $$,G! &E1S7G&1 " Thailand.com G1S $,X% ก 6 $ Internet Thailand ก (") S4,&G+!2! ก $ E$,2X% ก& amazon.com G web site &$,",&6&&1$,6ก 2. UPN!<'I SSL (Secure Socket Layer) URL 6ก &ก!34& E1S2 F ) 47!! HTTP (HyperText Transmission Protocol) G # ก ก&!6(Mode) ก & SSL URL ),G HTTPS (Hyper Text Transmission Protocol Secure) & &" web site 17
27 27 ก ก 3. 6,& Verisign s Secure Site กq
28 28 ก ก
29 29 ก ก 4. Y' D<)*'ก E1S$,",31!)!& )%6 &ก &)1!E1S,2!ก!$ 6&ก " 6!!$,,&S7 6ก &!)&$," )1! " ก 5$,,&S7 &$, web site & amazon.com &7)3ก &! )$-6 &! ก!$,1! กก " % )&$&!!&ก!7 )!&6ก!)ก &!!ก! (Smart Card) Smart Card G ก$, " Eก (Microchip)ƒ กE! 6) กE! &! & S4,& )ก!!&2*" *"&_ก )ก,กก &&F 32"!2ก &!+$ E )&กก 2"! Credit ก$7& &ก1!)ก)G กก+=*B' กB
30 30 ก ก X$,)2"! ก ก2!ก,&)%ก 5 " 1. ก 2"!ก& ก 2"!. 6)+!%ก %ก 2. 2"! ) ก2ก! - ก ก!& " -!&!ก%* -!)กก!&! ) Key Card
31 31 ก ก - 2"! )!กก!&6ก ก7 (Finger Scan) - 2"! )ก (Eye Scan) 3. 2"!ก%*E,&)%ก 5
32 32 ก ก MacCBLKit2004.jpg "! ) &1J " 2"!,& UPS 2ก &1J,1J,:&ก ก & Hardware )!2 5. 2"! 2ก 1J,ก1J1!,ก1J1!2!& )1 32"!72 ก 1J,&ก,1J1!!กE)$2!,&)%ก 5ก &74& G!&2"! "-2ก 1J
33 33 ก ก 6. ก ก!& -ก&2!2"7$,& 47,:&ก7$ ก=v'กB< ( Hardware) *(* (Data) 1. ก2"! ) $,$$& (Fault-tolerant computer systems) S4,& Faulttolerant )$,2"! hardware %5-2"! Hardware software ) power supply,ก$,,2!%ก 5 3$&1!&,& 12!ก 2! ก 73ก &) 2. ก2"! ) $, 32ก )+& (High-availability computing) 6ก2"!,&)$662 )$,%5& 2ก ก! )1!& E, )3ก )$ 3ก$ 3. ก &+ก ก! ) (Disaster recovery plan) Gก &+ ก! )ก ) X% ก7!& 311!,ก%ก 52! &)ก 2! ก 4. ก ก )&$,) (Load balancing) Gก ก )&$,ก!& ก,& ก 1& servers, F 2!ก% )&,& 2!,& Server,&2,&4,&$&กก1 5. ก $S7 ) (Mirroring) ก $S7$%ก6 ก $%ก& )$%ก transactions $, server, backup!):&กก 3ก &)ก 2! ก 6. ก $&& ) (Clustering) & )3กก )$&2,& 2,& $%ก 7& 62"!,&$, G backup! &,&ก (S4,&,&!& E2ก )+&) 7. ) +!%ก %ก (Intrusion Detection System) 6 %$,$2!3ก61! & 2 ) :&ก) &12!+!$,1$Xv!2 )
34 34 ก ก YBAกกก+=*B 1. %ก $, 3+!ก )$+ &% 2ก 2"! $66 $- 2. NECTEC 7& Computer Emergency Response Team (CERT),G&$, )&2,&ก ) กก+=*B'! ก ก(security) )1 ก ก12"ก &12!2"! ) &%5 %5)$&71! & F 6ก 3 ก )2"!!$%&Š 1 J &%5 12 3!34&1!ก ก$7&ก ก12"ก &12!)1 2 )%5 3!,&7G ก ก &74&1G$,!&2"! ) 3!S 1 3 1J1!! ))1!$)1? & F!ก กก,!&กก S 2!!2 ))2!ก!34&1J1! 34&ก ก+!2"!$,1! ก %*2!!1!)ก2,&$,ก 3 E)$1!,!2 ) 2ก% )& &ก กกE,$,& & F 2!&$,%$$,)G11!,2!S 3$&1! E$,%1! 3!กก1 ก $,)$& E )กG% )1 )6" &ก,กก ก & 2!ก &ก ก1!&7 3!%5 32"!)SJ$ &2!$&&$,%5&2! G ก )$ &ก6 # (DoD) "7 1&7"& &7ก 4&1!k & )",3(trustedness),2!ก &3)$,G1 1! )& ก 1ก ก2 )7)ก ก$,1!ก &12 3!34&1! ",3$,2!6 DoD 7 ) ) 7&62"!ก D, C, B ) A! 1,2 กก 2$,7ก 3ก & ก!&&1!&! ) )$, ) D ก ก$,,ก )$,G ) C 1 ) 2 2"!,ก34&ก ก2 )2 )7 )E )ก,%1 &%&7:
35 35 ก ก * D * C1 * C2 * B1 * B2 * B3 * A1 ก ก ) D )qก $, ) D ก ก$,!$,%(1ก ก 67#) X$,) )%2 $,ก&2"!& )$, ) D ก %ก!34& 1J&Eก! 1 )qก $,2"! ก ก$,!!&ก ก ;2"! &ก5) (1;ก 2"!&6,!) G ) ) D! & & )qก ) D MS-DOS, NetWare "กE2 )$7! )ก5)!ก ก 11!;2"!&6,!2 )&ก &SJ$ ก ก ) C1 )qก $,ก ก ) C1 Discretionary Security Protection ก กกก )qก ) D ก ก$,, 47 Xก +!2"!)ก %ก!34&1J ก4,& S!&&& )qก, log in! ) &ก log in X$, ก 2"!&)ก1J2$,ก 3!34&1! "Discretionary" 34&ก!34&$,3กก2ก5x & "need-to-know" & & )qก ) C1 6$,11!ก กS)E Discretionary Access Control $2!! &1J 3,$Xv)G! & 1J ก2 3 2"!&)1J ก$, Trusted Computing Base (TCB) 3ก 2"!2กก ก ) C1 & F! TCB GXก 4,&,2! ) C TCB ก &S )!)$2!S 3:&ก+!,ก ก,& $! 6+$Xv(rights) %5(attribute) )ก %* (permission)
36 36 ก ก ก ก ) C2 ก ก ) C2 Controlled Access Protection )qก & )ก & )qก ) C1 )ก $4ก(auditing)%ก 5$,ก,!&กก ก!!,&7 3"2!ก+!2"!กก,&6 47ก ) & ก %*$,ก 1! )ก $4ก%ก 5$,ก 472 ) ก $4ก72"!,$4ก %ก 5$,ก,!&กก ก " กก $,$6+! ) ก $4ก7!& 2"!ก, Controlled Access Protection 34& ก $4ก),ก $,,กก ก ) C1 ก ก ) B ก ก ) B )qก )*&2ก 2"!& 2 )7 ก5)! ก ก$,ก!ก!7!&2"!$7& ก mandatory access control name subject ) object S 1J)6 ก!&1! ก )%)ก )$,p))& ก )ก 7 ก labeling!$,!)&ก!&", (label) กก7 )$4ก(audit)!&$4ก F & )ก!: * ก $%ก& * ก ก )$$%ก&$,$66 * ก ก )$$%ก&$,$6+! ) * ก! )$,! * ก 2"! )"2 F กE * ก ;1J$%ก& )$,, 47ก B1 34& B3 ก :&ก!&ก,& 47 ก ก ) C2 ก,!&ก Controlled Access Protection ) B ก,!&ก: * B1 - Labeled Security Protection * B2 - Structured Protection * B3 - Security Domain ) B1 G ) ก$,%ก ก ) " "secret" ) "top secret" )7 object 2! mandatory access control 11! ก %*2!,ก %* 2ก!34&1J6! &1J ) B2, 32ก ก34&[* & object $,2 )&ก &ก, $,ก กก object 2 )$,ก ก2 )$,,ก
37 37 ก ก ) B3 &2!$ &S!&ก ) +!$&$,",31! ก ก ) A )%$!ก &ก )$ &ก6 # (ก Orange Book) A1 )ก ก$,1! ก 3ก!& )7!&ก ก ก$,1! ก 3ก!&$&5- ก )&) &) channel $,S) trusted distribution S4,&G$,Š )SJ$!&ก :&ก2 )&ก &!,:&กก!1, & ) ก ก ก ) A1 G )$,2!&$,12 3!34&1! ) G,&$,q11!2ก $ก! 1& ก )ก ก $,&$7 2"!2 ก ก )ก กG% 2$-)$&!ก &ก! &17&ก Orange Book $ก5) F & &ก ก )& F &ก1!) )$,&ก) ก5)2 )$,,ก! NetWare Security E ก5)$&!ก ก 2 "% "%4,&$,;ก 2"!&!6$,%51!&$)1 ก )"%$,%5G!&;ก 2"!& 6ก!!ก ก5)! ก ก &E 32 ) D, C! B ก5)!ก ก &E,&17: * ก )%",S (User login identification) * ก )%ก%S (Group identification) * ก ก ก,ก +)ก! ( 3ก1!) * ก %$ ก 6+$&$Xv(rights) )%5(attributes) * ก ก & Server console )ก$,*$,%2ก ก &E +! )!&! )1 $,!&ก ก &3ก!&) ก E,&$,G ก E 1S$, +! )!$,$,)!&2"!&p 2E ก )%(identification))ก (authentication)ก 472ก6+ 7 login ก )%+!2"!$6ก 2 login ID $,3ก&1 ก +!2"!ก 47,ก 2 +$,3ก!&,ก )%)+!2"!! S )4,&2! )$ &17: * supervisor * S $,$$ก supervisor
38 38 ก ก * workgroup manager * account manager * S $Xv)ก!34&! &S ) )$3กก6ก &) S,&$, &ก supervisor 3!34&1!$7& ) S X ก!34&$,กก 2,&$,1!p))&1!$7 S ),) )& supervisor )S X supervisor &SS $7 &S $,$$ก supervisor ก S X 1ก Supervisor,&E!! account supervisor $,&4,&3ก!& 47 S J S $Xv utility )1J$%ก1J2E 3$,)S,$, 2E,S )$$%ก&$,ก,!&กก ) ก$,,&$,$, S 7$11! ก account & supervisor & ( N! ก supervisor กS 4,&$,$Xv$$ก supervisor 3!&)S, ()S $,$$ก supervisor!) 3, + && $7& + & supervisor! Workgroup Managers workgroup manager GS ก%S $,ก2ก!&)ก ก,กS )ก% &S S )ก% &S $,ก 1!!& 47 กก!34&1J)ก 5)7$, &ก &1 กE workgroup manager 1 3!&S ก%S $,$$ก supervisor ก ก,กS ก%S $,ก 11!!& 47 S 7 1 3!& 2ก,&ก ก$Xv & login &2 กE Account Managers account manager $Xv"ก workgroup manager ก!ก 3$1! & ก ก S $,1! ก ก1!$7 ก 1 3,S ก% S 472 ( N! G+!$, log in!2e )12 )$, GS 2* & )
39 39 ก ก supervisor )S $,$$ 32"!,& FCONSOLE 1!61ก workgroup manager ) account manager 32"!1!&ก FCONSOLE G utility $ && 3$,&& F 1!&17: * & broadcast message *,12"!S J, * )ก &S * ;1JS J กก 2"!& & workstation * ),3) &1JS J * " &E $,S J 2"! 3!!&ก,1$,S J, ก$, Change Current File Server กก & FCONSOLE ",S J,) กq 47!กS J $,%5!&ก ก Enter 3!!&ก กก ) ก$, Server!ก%g Del 3!!&ก,S $,2"! log in 2!ก%g F3 Connection Information &34&ก $%ก"$,!&S J $$%ก F 2 $ 6,!!&ก: %5 3&!1&S )&6กS ก! Current Connection!ก Enter!4&ก Broadcast Console Message ก Connection Information S4,& กq 47!4&! &%5 (1ก 55 ก ) 3!ก Down File Server กก & FCONSOLE,; File Server ก,& workstation,ก7!) กqก&!2!ก Yes ก ;) No ก1ก!7 3!ก Status กก & FCONSOLE )E,&17: * Server date * Server time * Login restriction status * Transaction tracking status 3!!&ก,& F!&72!2"! arrow key,2! กq3$,7!4&ก Enter!2&1!ก ESC, save,&$,1!,&1 %$!2 FCONSOLE Version Information &34&!6$,1ก,กE $,ก& $& %5)E1!$1 374&$2! FCONSOLE G utility $,$ &&) G,&4,&$, ก:&กS 2!ก$$,)G11!
ค ม อการใช โปรแกรมร บ-ส งข อม ลอ เล กทรอน กส แบบท 1 ระหว างบร ษ ทประก นภ ยก บส าน กงาน คปภ. โดยว ธ การแบบปลอดภ ย แบบท 1 การร บ-ส งจดหมายโดยใช โปรแกรม MS Outlook Express 1.1 ว ธ ต ดต ง TOT ROOT CA Certificate
แนวปฏ บ ตท ด ส าหร บการควบค มความเส ยงของระบบงานเทคโนโลย สารสนเทศท สน บสน นธ รก จหล ก (IT Best Practices)
แนวปฏ บ ต ท ด ส าหร บการควบค มความเส ยงของระบบงานเทคโนโลย สารสนเทศท สน บสน นธ รก จหล ก (IT Best Practices) ISO 27001 COSO COBIT แนวปฏ บ ตท ด ส าหร บการควบค มความเส ยงของระบบงานเทคโนโลย สารสนเทศท สน บสน
The 7th National Conference on Computing and Information Technology. A Web-based Single Sign-on (SSO) using SAML 2.0
ก ก ก SAML 2.0 A Web-based Single Sign-on (SSO) using SAML 2.0 (Tatchai Russameroj) 1 (Pornchai Mongkolnam) 2 ก ก ก (Kriengkrai Porkaew) 3 1, 2, 3 ก [email protected] 1, [email protected] 2, [email protected]
ก ก API Two-factor Authentication by Web Application API and J2ME. Software ก ก. : Two-factor Authentication, One Time Password, Packet Sniffer
ก ก API J2ME Two-factor Authentication by Web Application API and J2ME Software 1 2 ก ก ก 41/20 ก 44150 : 0-4375-4322 2414 1 2 E-mail: [email protected] E-mail: [email protected] ก ก ก Username/Password
ประว ต ความเป นมา พาณ ชย อ เล กทรอน กส ( Electronic Commerce) หร ออ คอมเม ร ซ ( E-Commerce) เร มข น เม อประมาณต นทศวรรษท 1970 โดยเร มจากการโอนเง
ประว ต ความเป นมา พาณ ชย อ เล กทรอน กส ( Electronic Commerce) หร ออ คอมเม ร ซ ( E-Commerce) เร มข น เม อประมาณต นทศวรรษท 1970 โดยเร มจากการโอนเง นทางอ เล กทรอน กส ระหว างหน วยงาย และในช วง เร มต นหน วยงานท
Setup Corporate (Microsoft Exchange) Email. This tutorial will walk you through the steps of setting up your corporate email account.
Setup Corporate (Microsoft Exchange) Email This tutorial will walk you through the steps of setting up your corporate email account. Microsoft Exchange Email Support Exchange Server Information You will
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
1. DNS Primary zone DNS. user name : train password : p@ssw0rd (Computer name) clientxx (xx ก ก ). 27 www.kroonis.org
1 DNS 1. DNS Primary zone DNS ก Vmware Windows 7 ก (Clients) ก Image Windows 7 Network NAT user name : train password : p@ssw0rd (Computer name) clientxx (xx ก ก ) ก DNS clientxx Server 192.168.1.38 Server
กก CIMB Thai Biz-Channel
กก CIMB Thai Biz-Channel ก ()... (!"!# $%&)... 'ก(")(*+... (,("+-).ก+/)*+,ก0) 1!ก+(1+(,( $+('!ก CIMB Thai Biz-Channel (,("+-).ก+/ก0) ก %1" ก?$.(-@)?$.ก%1"?$.(@.".#1 1!ก?"+$.-.% )('AA, ก?$.(!"!,,ก??$./
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
แผนการจ ดการเร ยนร กล มสาระ การงานอาช พและเทคโนโลย (คอมพ วเตอร ) ช นม ธยมศ กษาป ท 1 จ ดทาโดย ส าน กงานเขตพ นการศ กษา
แผนการจ ดการเร ยนร กล มสาระ การงานอาช พและเทคโนโลย (คอมพ วเตอร ) ช นม ธยมศ กษาป ท 1 จ ดทาโดย ส าน กงานเขตพ นการศ กษา สารบ ญ หน า กาหนดการสอน หน วยท 1 เร อง เทคโนโลย สารสนเทศก บช ว ตประจาว น จานวน 3 ช วโมง
User guide Business Internet e-mail features
User guide Business Internet e-mail features Page 1 de 1 Table of content Page Introduction 3 1. How do I access my web based e-mail? 3 2. How do I access/alter these enhancements? 3 A. Basic Features
Network Security Foundations
Network Security Foundations Matthew Strebe O San SrBBC Francisco London Introduction xv Chapter 1 Security Principles 1 Why Computers Aren't Secure 2 The History of Computer Security 4-1945 5 1945-1955
Guidelines for E-mail Account Management and Effective E-mail Usage
Guidelines for E-mail Account Management and Effective E-mail Usage October 2014 Version 1.0 Department of Electronics and Information Technology Ministry of Communications and Information Technology Government
Setting Up SSL on IIS6 for MEGA Advisor
Setting Up SSL on IIS6 for MEGA Advisor Revised: July 5, 2012 Created: February 1, 2008 Author: Melinda BODROGI CONTENTS Contents... 2 Principle... 3 Requirements... 4 Install the certification authority
Quick DDNS Quick Start Guide
Quick DDNS Quick Start Guide Contents Before Use... 1 Enable Domain Name Access... 2 Default Domain Name Access... 2 Custom Domain Name... 3 DDNS Web Registration and Management... 5 Smart Phone Client...
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
บทท 1: ระบบร กษาความปลอดภ ยพ นฐาน
บทท 1: ระบบร กษาความปลอดภ ยพ นฐาน ป ยพร น ราร กษ [email protected] หล กส ตรผ เช ยวชาญด านความม นคงปลอดภ ยของระบบเคร อข ายและคอมพ วเตอร ระด บท 3 Why do we Why do we need Security? 1 Assets, Threats,
EUCIP - IT Administrator. Module 5 IT Security. Version 2.0
EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single
Web Plus Security Features and Recommendations
Web Plus Security Features and Recommendations (Based on Web Plus Version 3.x) Centers for Disease Control and Prevention National Center for Chronic Disease Prevention and Health Promotion Division of
ITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
Web. Anti- Spam. Disk. Mail DNS. Server. Backup
Email Server Appliance N ew generation of Server Appliance, AirLive, is designed for the SMB or enterprise that needs to install an easy maintained and fully functional mail server. It not only preserves
Chapter 12 Objectives. Chapter 12 Computers and Society: Security and Privacy
Chapter 12 Objectives Chapter 12 Computers and Society: and Privacy p. 12.2 Identify the various types of security risks that can threaten computers Recognize how a computer virus works and take the necessary
Novell Open Workgroup Suite
Novell Open Workgroup Suite Small Business Edition QUICK START GUIDE September 2007 v1.5 Page 1 Introduction This Quick Start explains how to install the Novell Open Workgroup Suite software on a server.
Emailing from The E2 Shop System EMail address Server Name Server Port, Encryption Protocol, Encryption Type, SMTP User ID SMTP Password
Emailing from The E2 Shop System With recent releases of E2SS (at least 7.2.7.23), we will be allowing two protocols for EMail delivery. A new protocol for EMail delivery Simple Mail Transfer Protocol
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront TMG How to use SQL Server 2008 Express Reporting Services Abstract In this
Version 1.0 January 2011. Xerox Phaser 3635MFP Extensible Interface Platform
Version 1.0 January 2011 Xerox Phaser 3635MFP 2011 Xerox Corporation. XEROX and XEROX and Design are trademarks of Xerox Corporation in the United States and/or other countries. Changes are periodically
Customer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background
Xerox Multifunction Devices Customer Tips June 5, 2007 This document applies to these Xerox products: X WC Pro 232/238/245/ 255/265/275 for the user Xerox Network Scanning HTTP/HTTPS Configuration using
FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12.
Competency: Defend and Attack (virus, spam, spyware, Trojans, hijackers, worms) 1. Identify basic security risks and issues to computer hardware, software, and data. 2. Define the various virus types and
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards
Experian Secure Transport Service
Experian Secure Transport Service Secure Transport Overview In an effort to provide higher levels of data protection and standardize our file transfer processes, Experian will be utilizing the Secure Transport
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Network Incident Report
To submit copies of this form via facsimile, please FAX to 202-406-9233. Network Incident Report United States Secret Service Financial Crimes Division Electronic Crimes Branch Telephone: 202-406-5850
InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?
What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software
Security. TestOut Modules 12.6 12.10
Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
MadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
Installation Procedure SSL Certificates in IIS 7
Installation Procedure SSL Certificates in IIS 7 This document will explain the creation and installation procedures for enabling an IIS website to use Secure Socket Layer (SSL). Check IIS for existing
Best Practices For Department Server and Enterprise System Checklist
Best Practices For Department Server and Enterprise System Checklist INSTRUCTIONS Information Best Practices are guidelines used to ensure an adequate level of protection for Information Technology (IT)
LBSEC. http://www.liveboxcloud.com
2014 LBSEC http://www.liveboxcloud.com LiveBox Srl does not release declarations or guarantee regarding this documentation and its use and declines any expressed or implied commercial or suitability guarantee
Enterprise Security Critical Standards Summary
Enterprise Security Critical Standards Summary The following is a summary of key points in the Orange County Government Board of County Commissioners (OCGBCC) security standards. It is necessary for vendors
Collax Web Security. Howto. This howto describes the setup of a Web proxy server as Web content filter.
Collax Web Security Howto This howto describes the setup of a Web proxy server as Web content filter. Requirements Collax Business Server Collax Security Gateway Collax Platform Server including Collax
Transition Networks White Paper. Network Security. Why Authentication Matters YOUR NETWORK. OUR CONNECTION.
Transition Networks White Paper Why Authentication Matters YOUR NETWORK. OUR CONNECTION. : Why Authentication Matters For most organizations physical security is a given. Whether it is video surveillance,
Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms
Overview Common Internet Threats Tom Chothia Computer Security, Lecture 19 Phishing Sites Trojans, Worms, Viruses, Drive-bydownloads Net Fast Flux Domain Flux Infiltration of a Net Underground economy.
Using Remote Web Workplace Version 1.01
Using Remote Web Workplace Version 1.01 Remote web workplace allows you to access your Windows XP desktop through Small Business Server 2003 from a web browser. 1. Connect to the Internet in your remote
Setting Up Email. on Your Touch by HTC
Setting Up Email on Your Touch by HTC Intellectual Property Notices 2007 Sprint Nextel. All rights reserved. No reproduction in whole or in part without prior written approval. SPRINT and other trademarks
ISM/ISC Middleware Module
ISM/ISC Middleware Module Lecture 13: Security for Middleware Applications Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College Geoff Sharman Sept 07 Lecture 13 Aims to: 2 Show why
Email Migration Manual (For Outlook Express 6)
Email Migration Manual (For Outlook Express 6) By SYSCOM (USA) May 13, 2013 Version 1.0 1 Contents 1. How to Change POP3/SMTP Setup for Outlook Express... 3 2. How to Login to Webmail... 7 3. How to Change
Administration guide
Administration guide PlotWave - ColorWave Systems Security information Copyright 2014, Océ All rights reserved. No part of this work may be reproduced, copied, adapted, or transmitted in any form or by
Certified Secure Computer User
Certified Secure Computer User Course Outline Module 01: Foundations of Security Essential Terminologies Computer Security Why Security? Potential Losses Due to Security Attacks Elements of Security The
Quick DDNS Quick Start Guide
Quick DDNS Quick Start Guide DDNS 快 速 指 导 手 册 1 / 11 Before Use The device must be connected to the Internet, please check if the connection works properly. Please confirm Internet access port is open
M+ Guardian Email Firewall. 1. Introduction
M+ Guardian Email Firewall 1. Introduction This information is designed to help you efficiently and effectively manage unsolicited e mail sent to your e mail account, otherwise known as spam. MCCC now
Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
Airtel PC Secure Trouble Shooting Guide
Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
Chapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under
Secure Socket Layer (SSL) Machines included: Contents 1: Basic Overview
Secure Socket Layer (SSL) Machines included: HL-4040CN HL-4050CDN HL-4070CDW DCP-9040CN DCP-9045CDN MFC-9440CN MFC-9840CDW Contents 1) Basic overview 2) Brief history 3) Benefit of using SSL 4) How to
Countermeasures against Spyware
(2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?
H3C SSL VPN Configuration Examples
H3C SSL VPN Configuration Examples Keywords: SSL, VPN, HTTPS, Web, TCP, IP Abstract: This document describes characteristics of H3C SSL VPN, details the basic configuration and configuration procedure
How To Use M2Mtrac -Xs1.Com For A Car Telematics System
M2MTrac -XS1 Telematics platform for Automotive Location Base Information Services About M2MTrac -XS1 M2MTrac XS1ค อ Automotive telematics platform ท ถ กออกแบบส าหร บรองร บการ ท างานของแอพพล เคช น Location
Keystroke Encryption Technology Explained
Keystroke Encryption Technology Explained Updated February 9, 2008 [email protected] (800) 650-3670 www.bluegemsecurity.com Executive Summary BlueGem Security is introducing keystroke encryption
Setting Up Email. on Your Sprint Power Vision SM Mogul by HTC
Setting Up Email on Your Sprint Power Vision SM Mogul by HTC Intellectual Property Notices 2007 Sprint Nextel. All rights reserved. No reproduction in whole or in part without prior written approval. SPRINT
When visiting online banking's sign-on page, your browser establishes a secure session with our server.
The privacy of communications between you (your browser) and our servers is ensured via encryption. Encryption scrambles messages exchanged between your browser and our online banking server. How Encryption
Paladin Computers Privacy Policy Last Updated on April 26, 2006
Paladin Computers Privacy Policy Last Updated on April 26, 2006 At Paladin Computers ( Service Provider ), we respect our Users and Clients right to privacy with regards to the use of their email and our
BEGINNER S GUIDE TO SSL CERTIFICATES: Making the best choice when considering your online security options
BEGINNER S GUIDE TO SSL CERTIFICATES: Making the best choice when considering your online security options BEGINNERS GUIDE TO SSL CERTIFICATES Introduction Whether you are an individual or a company, you
Cox Business Premium Security Service FAQs
FAQ s Content Cox Business Premium Security Service FAQs Questions before installing the software Q: Does Cox Business Premium Security Service work with other antivirus or firewall software installed
Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP
Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP. The software
Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, 2009. Concepts.
Protect - Detect - Respond A Security-First Strategy HCCA Compliance Institute April 27, 2009 1 Today s Topics Concepts Case Study Sound Security Strategy 2 1 Security = Culture!! Security is a BUSINESS
Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000
Network Security Protective and Dependable With the growth of the Internet threats, network security becomes the fundamental concerns of family network and enterprise network. To enhance your business
ความร เบ องต นเก ยวก บฐานข อม ล. Introduction to Database
ความร เบ องต นเก ยวก บฐานข อม ล Introduction to Database ร ปแบบการจ ดเก บข อม ลแบบเด ม ระบบแฟ มข อม ล (File-based System) ระบบแฟ มข อม ล (File-based system) ค อ ช ดของ โปรแกรมประย กต ท ให ผ ใช ใช เพ อประมวลผลงานท
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
Compulink Advantage Online TM
Compulink Advantage Online TM COMPULINK ADVANTAGE ONLINE TM INSTALLATION, CONFIGURATION AND PERFORMANCE GUIDE FOR WINDOWS (Revised 07/08/2011) 2011 Compulink Business Systems, Inc. All rights reserved
PDQ Guide for the PCI Data Security Standard Self-Assessment Questionnaire C (Version 1.1)
PDQ has created an Answer Guide for the Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C to help wash operators complete questionnaires. Part of the Access Customer Management
How to Install Windows 7 software
Connecting Windows 7 to the network This document outlines the procedure for setting up Windows 7 to use the College and University network. It assumes that the computer is set up and working correctly
Loophole+ with Ethical Hacking and Penetration Testing
Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,
http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
Contents Introduction xxvi Chapter 1: Understanding the Threats: E-mail Viruses, Trojans, Mail Bombers, Worms, and Illicit Servers
Contents Introduction xxvi Chapter 1: Understanding the Threats: E-mail Viruses, Trojans, Mail Bombers, Worms, and Illicit Servers 1 Introduction 2 Essential Concepts 3 Servers, Services, and Clients 3
PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00
PCI PA - DSS Point XSA Implementation Guide Atos Worldline Banksys XENTA SA Version 1.00 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page number 2 (16)
Xerox SMart esolutions. Security White Paper
Xerox SMart esolutions Security White Paper 1 Xerox SMart esolutions White Paper Network and data security is one of the many challenges that businesses face on a daily basis. Recognizing this, Xerox Corporation
Chapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Wireless-N Gigabit Router WNR3500. You can access these features by selecting the items
Email Migration Manual (For Outlook 2010)
Email Migration Manual (For Outlook 2010) By SYSCOM (USA) May 13, 2013 Version 2.2 1 Contents 1. How to Change POP3/SMTP Setting for Outlook 2010... 3 2. How to Login to Webmail... 10 3. How to Change
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.
Certified Secure Computer User
Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
Technical Brief for Windows Home Server Remote Access
Technical Brief for Windows Home Server Remote Access Microsoft Corporation Published: October, 2008 Version: 1.1 Abstract This Technical Brief provides an in-depth look at the features and functionality
When you listen to the news, you hear about many different forms of computer infection(s). The most common are:
Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,
How To Check If Your Router Is Working Properly
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Dual Band Wireless-N Router WNDR3300. You can access these features by selecting the
Computers and Society: Security and Privacy
1 Chapter 12 Computers and Society: Security and Privacy 2 Chapter 12 Objectives 3 Computer Security: Risks and Safeguards What is a computer security risk? 4 Computer Security: Risks and Safeguards 1
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
Accessing the Media General SSL VPN
Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your
Norton Personal Firewall for Macintosh
Norton Personal Firewall for Macintosh Evaluation Guide Firewall Protection for Client Computers Corporate firewalls, while providing an excellent level of security, are not always enough protection for
Part I: Ethics. Moral guidelines that govern use of computers and information systems. Unauthorized use of computer systems
What are Computer Ethics? Computing Issues Moral guidelines that govern use of computers and information systems Part I: Ethics Unauthorized use of computer systems Information privacy Intellectual property
WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project
WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure
