CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] - نسخه متنی

Tebyan

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید











  • Unauthorized Access Attacks


    Although the category "unauthorized access" is not limited to specific attacks against networks, it does cover the most common type of attack that is executed today. When users, whether legitimate or not, connect to a service port such as SSH or Telnet, they may be greeted with a message stating "Unauthorized Access Is Prohibited." If attackers continue to attempt to access the system, their actions are unauthorized. These attacks can occur both outside of and within a network. This attack category does not include an attacker who is connecting to a port to see whether a service is active there; that typically falls into the "reconnaissance" category. Nor does the absence of any warning banner mean that access by anyone is welcome. This category includes any attempt by a person who knowingly tries to access a system to which that person does not have specific access permissions.


  • / 290