메뉴 건너뛰기




Volumn 12, Issue 1, 1996, Pages 47-55

How to perform effective firewall testing

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER ARCHITECTURE; GATEWAYS (COMPUTER NETWORKS); INDUSTRIAL MANAGEMENT; INFORMATION SERVICES; NETWORK PROTOCOLS; PUBLIC POLICY; STRATEGIC PLANNING; TELECOMMUNICATION SERVICES; WIDE AREA NETWORKS;

EID: 0030089329     PISSN: 02770865     EISSN: None     Source Type: Trade Journal    
DOI: None     Document Type: Article
Times cited : (6)

References (15)
  • 3
    • 0029276737 scopus 로고
    • CSI Special Report on Firewalls: How Not to Build a Firewall
    • Power, R. (1995) "CSI Special Report on Firewalls: How Not to Build a Firewall," Computer Security Journal, Vol. 9, Issue 1, pp. 1-10.
    • (1995) Computer Security Journal , vol.9 , Issue.1 , pp. 1-10
    • Power, R.1
  • 4
    • 30844439412 scopus 로고    scopus 로고
    • Oregon vs. Schwartz (1995) Criminal case tried in Washington County, Oregon
    • Oregon vs. Schwartz (1995) Criminal case tried in Washington County, Oregon.
  • 5
    • 30844433903 scopus 로고    scopus 로고
    • The Computer Emergency Response Team at Carnegie-Mellon University
    • The Computer Emergency Response Team at Carnegie-Mellon University.
  • 7
    • 30844462302 scopus 로고    scopus 로고
    • note
    • Effective firewall penetration testing involves more than simply attacking the firewall and the systems it protects. It includes systematically determining how the firewall protects everything it is supposed to protect.
  • 8
    • 30844443208 scopus 로고    scopus 로고
    • note
    • Obtaining written authorization to test every host included in the test plan is a good idea. Failure to obtain pre-approval can cause the same kinds of problems as failing to obtain management authorization to perform testing.
  • 9
    • 30844445982 scopus 로고    scopus 로고
    • note
    • "War dialers" are programs that dial one telephone number after another to find numbers of modems.
  • 10
    • 30844470174 scopus 로고    scopus 로고
    • note
    • Ensure that any attack scripts used are well-guarded, so that they do not fall into the wrong hands.
  • 11
    • 30844451180 scopus 로고    scopus 로고
    • note
    • Remember, however, that some widely available scripts such as SATAN (Security Analysis Tool for Auditing Networks) can detect only a very limited set of vulnerabilities are thus not very suitable for most firewall tests.
  • 12
    • 30844446223 scopus 로고    scopus 로고
    • note
    • In an IP spoofing attack an intruder establishes a connection to a server from a host that masquerades as a legitimate client.
  • 13
    • 0011560238 scopus 로고
    • IP Spoofing and Session Hijacking
    • March, 1995
    • Thomsen, D. (1995) "IP Spoofing and Session Hijacking." Network Security, March, 1995, pp. 6-11
    • (1995) Network Security , pp. 6-11
    • Thomsen, D.1
  • 14
    • 30844437853 scopus 로고    scopus 로고
    • note
    • Social engineering is using deception to obtain information to be used in attacking systems and networks.
  • 15
    • 85084161283 scopus 로고
    • Information Security Technology? ... Don't Rely on It: A Case Study in Social Engineering
    • Winkler, I.S. & Dealy, B. (1995) "Information Security Technology? ... Don't Rely on It: A Case Study in Social Engineering," Proceedings of USENIX Security Symposium.
    • (1995) Proceedings of USENIX Security Symposium
    • Winkler, I.S.1    Dealy, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.