Professional Documents
Culture Documents
: Dynamic Hyper Text Markup
Language can be described as a combination of
severaltechnologies like HTML client-side java
script and cascading Style Sheets. Most of the pages
and multimedia content on the web are created using
DHTML.
: eXtensible Hyper Text Markup Language.
Traditional HTML does not impost much structural
strictness, sometimes resulting in poorly-displayed
pages. The use of XHTML enagles content to be
displayed similarly across different browsers.
: Used in Voice interaction between
humans and computer, mainly in systems that enable
you to, for example check your credit card balance
over the phone. the logive- like dialogue
management and speech recognition- is defined by
voiceXML
: A document markup language used mainly
bye mathematicians, authors, etx to typeset their
content. It is suitable for representing mathematical
formulas.
=
!="
The =
markup
language [SVG] is a way to describe vector graphics
data over the web. Current methods
(e.g. GIF, JPEG, PNG) use
, which have a
fixed resolution and cannot be scaled without a loss
in image quality. Vector graphics describe graphical
information in terms of lines, curves, etc. which can
be scaled and printed quite easily. Think PostScript
for pictures.
If your browser is Mozilla (Version 0.9 or higher) or
Internet Explorer (Version 4.0 or higher), Adobe
provide a free plug-in for rendering SVG documents.
The plug-in is available at www.adobe.com/svg/. A
static demonstration ishere (1747 bytes) and an
animated demonstration is here (2054 bytes). Both
are from the Deitel book.
=
#
!=#"
The =
[SMIL] (pronounced "smile") enables
web authors to co-ordinate the presentation of a wide
range of multimedia elements. In SMIL, multimedia
elements can work together; this enables authors to
specify when and how these multimedia elements
appear in the document.
#$=
Visa [Visa] has developed this to enable its business
customers to exchange credit-card purchase
information between businesses over the Internet in
a secure and standardised form. Currently, the
specification provides a framework that describes
credit-card purchases in the areas of procurement
(i.e. business-to-business purchasing) and travel &
entertainment (T&E) expenses.
%
Motorola's VoxML [VoxML] is an XML application
for the spoken word, in particular for automated
telephone response systems. VoxML enables the
same data on the web to be served up via the
telephone.
A
!A"
The A
[WML] allows web
pages to be displayed on wireless devices such as
cellular phones and PDAs. WML works with
the A
(WAP) to deliver
the content.
c A
$
$
%
!V ¢
=
: With a proven multi-chassis
architecture, the Cisco CRS-3 can deliver up to
322 tbps of capacity, more than tripling the 92
tbps capacity of the Cisco CRS-1 and
representing more than 12 times the capacity of
any other core router in the industry.
!V ¢& '
'(' =$
# In addition to capacity
requirements, the growths of mobile and video
applications are creating new multidirectional
traffic patterns with the increasing emergence of
the data center cloud. The new Cisco Data
Center Services System provides tight linkages
between the Cisco CRS-3, Cisco Nexus family
and Cisco Unified Computing System (UCS) to
enable unified service delivery of cloud
services. This intelligence also includes carrier-
grade IPv6 (CGv6) and core IP/MPLS
technologies that permit new IP NGN
architectural efficiencies required to keep pace
with the rapidly growing cloud services market.
Unique capabilities include:
!V Network Positioning System (NPS) -- provides
1.Evesdropping
As long as people have engaged in private
conversations, eavesdroppers have tried to listen
in. When important matters were discussed in
parlors, people slipped in under the eaves²
literally within the ³eavesdrop´²to hear what
was being said. When conversations moved to
telephones, the wires were tapped. And now that
so much human activity takes place in
cyberspace, spies have infiltrated that realm as
well.
Unlike earlier, physical frontiers, cyberspace is a
human construct. The rules, designs and
investments we make in cyberspace will shape
the ways espionage, privacy andsecurity will
interact. Today there is a clear movement to give
intelligence activities a privileged position,
building in the capacity of authorities to
intercept cyberspace communications. The
advantages of this trend for fighting crime and
terrorism are obvious.
2.Network Sniffing
Description
Network sniffing is a network layer attack consisting
of capturing packets from the network transmitted
by others' computers and reading the data content in
search of sensitive information like passwords,
session tokens, or any kind of confidential
information.
The attack could be done using tools called network
sniffers. These tools collect packets on the network
and, depending on the quality of the tool, analyze the
collected data like protocol decoders or stream
reassembling.
Depending on the network context, for the sniffing
to be the effective, some conditions must be met:
' $ ¢
This is the ideal case because the hub is a network
repeater that duplicates every network frame
received to all ports, so the attack is very simple to
implement because no other condition must be met.
' $
To be effective for eavesdropping, a preliminary
condition must be met. Because a switch by default
only transmits a frame to the port, a mechanism that
will duplicate or will redirect the network packets to
an evil system is necessary. For example, to
duplicate traffic from one port to another port, a
special configuration on the switch is necessary. To
redirect the traffic from one port to another, there
must be a preliminary exploitation like the arp spoof
attack. In this attack, the evil system acts like a
router between the victim¶s communication, making
it possible to sniff the exchanged packets.
'A $
In this case, to make a network sniff it's necessary
that the evil system becomes a router between the
client server communications. One way to
implement this exploit is with a DNS spoof attack to
the client system.
Network Eavesdropping is a passive attack which is
very difficult to discover. It could be identified by
the effect of the preliminary condition or, in some
cases, by inducing the evil system to respond a fake
request directed to the evil system IP but with the
MAC address of a different system.
Risk Factors
TBD
Examples
When a network device called a HUB is used on the
Local Area Network topology, the Network
Eavesdropping become easier because the device
repeats all traffic received on one port to all other
ports. Using a protocol analyzer, the attacker can
capture all traffic on the LAN discovering sensitive
information.
,+
=+
-+.+
(Post Office Protocol 3) A standard interface
between an e-mail client program and the mail
server. POP3 and IMAP4 are the two common
access protocols used for Internet e-mail. POP3
provides a message store that holds incoming e-mail
until users log on and download it. POP3 is a simple
system with limited selectivity. All pending
messages and attachments are downloaded when
users check their mail.
·