전체 글 썸네일형 리스트형 Valuable business connections – a review for SMEs Valuable business connections – a review for SMEs Businesses of all sizes adopt technology to make them more productive, cost effective or flexible and help them compete. Over the years, the adoption of tools such as mobile phones, wireless laptops, the internet and email have all been driven by such expectations. Small and medium-sized businesses (SMBs) are often at the forefront as it can give.. 더보기 Security of Cisco CallManager-based IP Telephony against Malicious Hacker Attacks Independent Lab Test Report: Security of Cisco CallManager-based IP Telephony against Malicious Hacker Attacks Cisco Systems becomes the first, and to date the only, IP-Telephony vendor to earn Miercom's highest rating of Secure for its proven ability to defend an IP phone system against malicious attack. 더보기 Network Security Visibility and Flow Analysis Network Security Visibility and Flow Analysis A man in the middle attack is one in which the attacker intercepts messages in a public key exchange and then retransmits them, substituting his own public key for the requested one, so that the two original parties still appear to be communicating with each other. The attack gets its name from the ball game where two people try to throw a ball direc.. 더보기 MITM (man in the middle attack) MITM (man in the middle attack) MITM (man in the middle attack)은 네트워크 통신을 조작하여 통신 내용을 도청하거나 조작하는 공격 기법이다. 중간자 공격은 통신을 연결하는 두 사람 사이에 중간자가 침입하여, 두 사람은 상대방에게 연결했다고 생각하지만 실제로는 두 사람은 중간자에게 연결되어 있으며 중간자가 한쪽에서 전달된 정보를 도청 및 조작한 후 다른 쪽으로 전달한다. 많은 암호 프로토콜은 중간자 공격을 막기 위하여 인증을 사용한다. 예를 들어, TLS/SSL 프로토콜은 공개 키를 기반으로 한 인증을 사용한다. 1. 중간자 공격을 막기 위한 방법에는 다음과 같은 것들이 제안되어 있다. 공개 키 기반구조(Public Key Infrastructures, PK.. 더보기 이전 1 ··· 45 46 47 48 49 50 51 ··· 179 다음