Accomplished By: Supervised By: Mr. AFAK
Accomplished By: Supervised By: Mr. AFAK
Marrakech
Departement Networks & Telecoms
Vulnerability ;
Threats ;
Attacks .
Vulnerability
Software Hardware
Vulnerability
Configuration weaknesses
Weakness Description
System accounts with easily guessed Poorly selected and easily guessed
passwords user passwords
Unstructured threat ;
Structured threat ;
External threat ;
Internat threat.
Threats
Attacks
Reconnaissance ;
Scan of the system ;
Ganning access to the system ;
Successfull attack.
SECURITY
OBJECTIVES
Security Objectives
Authentification ;
Authentication ;
Authorization ;
Data Integrity ;
Confidentiality ;
Non-repudiation.
Authentification
Typically based on :
Single Sign ON
Authorization
• http://www.cisco.com;
• http://www.authorstream.com/Presentation/meetujain-368008-
network-security-science-technology-ppt-powerpoint/;
• http://www.supinfo-projects.com;
• http://www.youtube.com/watch?v=W7AXoVbAPis
• http://en.wikipedia.org/wiki/Network_security;
•http://www.utoronto.ca/security/documentation/policies/policy_5.h
tm
• http://www.crihan.fr/res/syrhano/technique/ipv6;