信息安全评估与证据处理相关探讨
1. 恶意攻击分类
恶意攻击(MALATTACKS)类别中包含 24 种不同的信息攻击,它们被分为 13 组,具体如下表所示:
| Malattacks Groups | 具体攻击类型 |
| — | — |
| XXI. Using accessible information | (65) Audit Trail; (66) Traffic Analysis; |
| XXII. Overflow | (67) Buffer Overflow; |
| XXIII. Vulnerabilities | (68) CGI (Common Gateway Interface) Vulnerabilities; (69) Hijacking; (70) Packet Attacks; |
| XXIV. Content | (71) Content Attacks; |
| XXV. Data Encapsulation | (72) Data Driven; |
| XXVI. Denial of Service | (73) DDoS (Distributed Denial of Service); (74) Flooding; |
| XXVII. Spoofing | (75) DNS Spoofing; (76) EFT Spoofing; (77) Ethernet Spoofing; (78) IP Spoofing; (79) Screen Spoofing; (80) SET Spoofing; (81) TCP Dump Spoofing; (82) Trace Route Spoofing; (83) Tu
超级会员免费看
订阅专栏 解锁全文
635

被折叠的 条评论
为什么被折叠?



