Anda di halaman 1dari 1

Heteregeneous

Hardware as a services
Services Software as a services
Cloud Computing
Infrastructure as a services
Virtual Manager

Sharing Resources

Pararel
Distributed
Grid Computing
Heteregeneous
Broker
Devices

NETWORK Protocol TCP/IP, IPv4, IPv6

Heteregeneous Services / Content


Distributed
Standart
WebeX, Telepresence

Unified Communications Telecommuters

VOIP SIP, H.323, Tunneling

Performance, Availability, Security


Reliability Quality of Services (QoS)
Smart, Artificial Inteligent
Decrease consume powers
Green Tech
powerfull with existing tech

Host & Network based


Sensor
Distributed & Heteregeneous
IDS/IPS
Accuracy, Precision Alarm
Knowledge
Response
Network Behavior-based
Firewall Content Filtering
Smart, Inteligent
Distributed
Sensor
Heteregeneous
Network & Mobile
VPN
Protocol Encapsulation
SECURITY Spam Filtering
Phising protect
Email
Virus protect
PKI
Trends Future & Challenges
Spyware
Web CA / PKI / Digital Certificate
SSH / SSL

Forensics Digital Forensic

Protocol / Encapsulation
Mobile
Application AAA
Network / Host
Malware Defense Mobile
Cloud
Cyber Terorism / War

War Driving
Mobile Scanning
Behavior user

WIRELESS WiMaX

Data Comm P2M, P2P, Mesh, WDS

RFID Sensor, scanning

Sensor

U.T.M Heteregeneous

NETMON & POLICY Netflow, MRTG, OP Manager, the Dude


Standarization, Method, Framework

CEH
Steps
Cisco

Virus Worm, Botnet, Trojan, Keylogger, Spammer

SQL Injection, RSS attack, Cross Site Scripting,


Web Buffer overflow, Google Adsense, Spoofing
HTML Manipulation, Java/Active X, Web deface

Flooding DoS, DDoS, ICMP flood, UDP strom, Mail Bomb

DNS Domain Redirect, DNS Poison, Phising

Physical Theft, Sabotage

ATTACK Social Engineering

Insider Abuser Network Access, Email

DoS
Wireless Spoofing
Hijacking
Malware, Virus
Vulnerability Holes data comm
Mobile
DoS
Sabotage, Cloning
Tools

Anda mungkin juga menyukai