Scanning identifies open ports - fingerprinting identifies OS / Application - this can be active (creating the traffic) or passive (watching existing traffic)
War Chalking - used to indicate where wireless networks are
TCSEC Assurance Levels -
1. System Architecture
2. System Integrity
3. Covert Channel Analysis
4. Trusted Facility Management
5. Trusted Recovery
Common Criteria - Recovery
1. Manual Recovery
2. Automated Recovery
3. Automated Recovery without Undue Loss
Componenets
1. failure preparation(backups), system recovery
No comments:
Post a Comment