(. 272 ), , (. 273 ), , (. 274 ).
, , .
.. . , *(216).
1. :
- - , ;
- , (, , ), .
. " " - "" (, , ), ( )*(217).
.
2. :
- " " (pigbacking) - ;
- " " (between the lines entry) - ;
- " " (hacking) - ( , );
- " " (browsing) - ;
- " " (trapdoor entry) - ;
- "" (trapdoor) - ;
- "" (masquerading) - ;
- "" (spoofing) - ( ) ;
- "" - . ;
- " " - ( ).
3. :
- - ;
|
|
- - , , , ;
- " " (Trojan horse) - ( ) , , , ;
- "" (salami attack) - ( " " );
- " " (logic bomb) - , ;
- " " (time bomb) - , , ;
- , , .
4. . , . :
- ( - ) ;
- ;
- log- ( );
- () ;
- , , .
, , ( - ) . , , ("") , , ( ), , , , , .
, , , . , . 18-60 . , . , 16-35 ( 45 ).
. , : 1) - 66%; 2) - 17%; 3) - 7%; 4) - 5%; 5) - 5%.
, , ( ..), (, ..), ( , , , ..), "" ..
|
|
, , , , , , , ( ), , "" -, ..
: , , , , , , ( , , , "" ), " " , , ( ) ..
, , , . 73 , , , , , , , "" ( , , ), , , , , , , , , "" ..
45.2.
.
, :
- ;
- - ;
- ;
- ;
- .
, - .
, , , :
- , , , ;
- , , ;
- , , .
, : , , ; , .
: - - , - - - - - - .
( ) : - - - - - - - .