Professional Documents
Culture Documents
Lesson 5 Network Security and Issue
Lesson 5 Network Security and Issue
and
Issues
LEARNING OUTCOMES:
At the end of the session, the students should be able to:
1. Define trust in terms of network resources.
2. Discuss how attacker use spoofing techniques
3. Define digital ID’s and state it functions
4. Understand how IP pocket works when it come in computer
security
Trust Defined
Password Security
Security Objective
Security Objective
Continue….
Continue….
IP Address Spoofing
IP Address Spoofing continue……..
IP Address Spoofing continue……..
Buffer overflow
Buffer overflow continue……
Digital ID
Digital ID continue……
Digital Certification
Digital Certification continue…..
Digital Certification continue…..
Digital Certification continue…..
Digital Certification continue…..
THANK YOU!!!