Lecture Three Information Systems Access Control
Lecture Three Information Systems Access Control
• DOS
• Malicious software
• Brute force
• Dictionary attack
• Sniffing
• Emanation
• Object reuse
• Trapdoor and backdoor
• Spoofing
3.9.2 Human Based Access Control
Attacks
• Guessing
• Shoulder surfing
• Dumpster diving
• Theft
• Social engineering
• Spoofing
3.10 Intrusion Detection Systems