Internet Security - Weaknesses and Targets (WT 2015/16) - tele-TASK

Internet Security - Weaknesses and Targets (WT 2015/16) - tele-TASK

19 episodes

"Internet Security - Weaknesses and Targets" gives a detailed introduction on problems concerning Internet and Intranet security. After starting with some remarks on risk analysis and computer crimes, security weaknesses and targets are discussed in detail. Besides, more introductions are provided on: human factor and technical failures, attacks on accounts and passwords, attacks on Internet protocol, misuse of design and programming errors, weaknesses in common operating systems, targets in the WWW, and viruses. The lecture concludes with the discussion on possibilities to detect attacks and intrusions and ethical issuses are introduced as well.

Podcasts

Internet Security - Law and Ethics

Published: Feb. 3, 2016, 9 a.m.
Duration: 1 hour 5 minutes 38 seconds

Listed in: Education

Detection of Attacks and Intrusions

Published: Jan. 27, 2016, 9 a.m.
Duration: 1 hour 19 minutes 40 seconds

Listed in: Education

Wireless Security

Published: Jan. 20, 2016, 9 a.m.
Duration: 1 hour 22 minutes 8 seconds

Listed in: Education

Weaknesses in the World Wide Web 2/2

Published: Jan. 13, 2016, 9 a.m.
Duration: 1 hour 9 minutes 15 seconds

Listed in: Education

Weaknesses in the World Wide Web 1/2

Published: Jan. 6, 2016, 9 a.m.
Duration: 1 hour 11 minutes 31 seconds

Listed in: Education

Weaknesses of MS Windows and MacOS X - Attacks and Exploits

Published: Dec. 14, 2015, 9 a.m.
Duration: 1 hour 30 minutes 14 seconds

Listed in: Education

Weaknesses of Unix / Linux - Attacks and Exploits

Published: Dec. 2, 2015, 9 a.m.
Duration: 1 hour 11 minutes 39 seconds

Listed in: Education

Design and Programming Errors

Published: Dec. 2, 2015, 9 a.m.
Duration: 30 minutes 15 seconds

Listed in: Education

Weaknesses of Internet Protocols 2/2

Published: Nov. 27, 2015, 11 a.m.
Duration: 1 hour 18 minutes 35 seconds

Listed in: Education

Weaknesses of Internet Protocols 1/2

Published: Nov. 20, 2015, 9 a.m.
Duration: 1 hour 16 minutes 33 seconds

Listed in: Education

Attacks on Accounts and Passwords

Published: Nov. 9, 2015, 9 a.m.
Duration: 54 minutes 2 seconds

Listed in: Education

OS Fingerprinting

Published: Nov. 9, 2015, 9 a.m.
Duration: 26 minutes 5 seconds

Listed in: Education

Reconnaissance

Published: Nov. 4, 2015, 9 a.m.
Duration: 23 minutes 16 seconds

Listed in: Education

Human Factor and Technical Failures

Published: Nov. 4, 2015, 9 a.m.
Duration: 42 minutes 44 seconds

Listed in: Education

Hackers and Viruses

Published: Oct. 28, 2015, 9 a.m.
Duration: 1 hour 11 minutes 50 seconds

Listed in: Education

Potential Attackers

Published: Oct. 28, 2015, 9 a.m.
Duration: 24 minutes 9 seconds

Listed in: Education

Risk Analysis

Published: Oct. 21, 2015, 9 a.m.
Duration: 1 hour 20 minutes

Listed in: Education

Internet Security - An Overview

Published: Oct. 14, 2015, 9 a.m.
Duration: 1 hour 2 minutes 48 seconds

Listed in: Education

First Understanding of Internet and WWW

Published: Oct. 20, 2014, 9 a.m.
Duration: 1 hour 27 minutes 34 seconds

Listed in: Education