Professional Documents
Culture Documents
! " #!
+ $ * $% ! & ' ( )'
, ! $ - $ ) . /0. 1 $ 2!
+3 40 1 54 ' 6 7 ,
+3 2 $ - ! ( 8
+ ;. " ! : & ' ". & / ! "9 " 8
[9][1][2][5]+< ! / = ! ! 6 8
"# $% !
+, ! $ 2 /! B 7 .= E 8
+E = M" / ! 6 < ! 0! 8
+ $ >. < ! 3 9 8
C 9 < E /E = 29 * D <$ 0 " /E = / ' 8
+ $ 5 E 6 .
+ ' $ 2 <0 ! .N < ( / ! / ' 8
( )* + & '
2 $ /0. < ! $ - ! @ = 6 2 )'
5 /E O 5 ; 2 9 ;F L $ E L " $ G ! $ < E
[6]+(Password GuessingH+ ' G EJ2
, ' +
3 ) &' L ! $ 2 )' < '
& ' 4 9 ! P" EQ $ * / R'F * ; 6 ?4' S > < !
< ! 5 4 @ & $ E2 C "
+ $ @ G9+ $ C
[10].I H /E=
:) 1
< " $ ( 1 ) /' ! ! ! 9
' ; < ! " ( < ! > < 40
+< !
: $ ? 4'- O 0
L< ? 'F L< : > ! O 29 $ ! )"
)' 5 4 < ! 3 P/ O= $ ! O P B
+ " ' / ! ".
[2] - I H /E=
: < !
< D $ )' < ! < ! ! •
: . 3 9 L< ! 3 7 " > ?" 9
•
)0" 7 .= / > ; /0. < B0 ! E " =<
> . >.= " ' E ! '
< F - E < E = #! ( L3
>. 4 < 2 $ >.= < 2 9 ;F
< (I H ' /E 2 ) = T0 / < <" < E
C0"9 2 9 3 ! 5 4 & 3 =J ! ' D < B0
< ; I C (H /! 3 )0"
7 > ' 5 ; & >.= E E H /( < ! 5
:/ Q ' '2 % ! U > I C ( B 7 .=
>.= 7 > E J )0" 2 H
= ; (E E 5 . )0" ! ' Q6 ;
E >.= 0. E C " ' < E )0" $! 29
" <$ 0 5 > E = ? .
! 4 J 5 ;& 6J < " 4 J & '
6 )0" < E < E ) E #! 2
V . ! J ? . ) " E E $ >
7 > / ! / /4 ! ' ? >. < < EE
0 V /(
4 5 ;& <0 ! C ! C 29 )' )0" ;
/0. < S > 2 9 ;F <0 /0 6 9/
2 1 . & < 3 ) " >.= E- ! J9 < F
2 E > . /4 ! ' /. ? >. <
< 9 ! ' =! & / " < F E= />
E ; ! E 9 29 = " & J < 2 > . )0"
7 > ) ' H ! <! ' < E < ; L ; = /0.
< < " < E LQ 6 ? ; )0" > . < ,
! ' ! > . >.= < (E 2 * * > 7
D (E $ ( ; = /6 # !
54 ' 3 2 = 5 ;
: @ / ' 4 0
' @
< F 5J
[11]I H/E=
"
: 5 .
&; 5 4 $ Q @ & ) @ . <E = $ !
5 . * 2 G> $ 2 E +< F > <E= @ ! "
+M @ = 5 W
: .
: C 7.
+ $ & ' < ! 3 95 ; •
+" ) ' Q •
+ < E 8 :& ' ! •
+ <X= 8
+ > >. 1 C 8
+V ++++ 'F < ' 8
#
References :
http://www.al-jazirah.com.sa/digimag/02012005/wr37.htm[4]
[10]http://securityresponse.symantec.com/avcenter/security/Content/security.articles/corp.securit
y.policy.html
[11] Infosec corporation, april 23
2005,http://www.infosec.co.uk/ExhibitorLibrary/131/ProactiveNetworkSecurity.pdf, Circle
Proactive Network Security.