Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Technology
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts125/v4/55/eb/b4/55ebb4f0-5bd5-f776-a391-2cfe86f14624/mza_17616901798757873732.jpeg/600x600bb.jpg
Internet-Security - Weaknesses and Targets (WT 2014/15) - tele-TASK
Prof. Dr. Christoph Meinel
20 episodes
20 hours ago
"Internet Security - Weaknesses and Targets" is based on "Internet- & WWW-Technologies" and gives a detailed introduction on problems concerning Internet and Intranet security. After starting with some remarks on risk analysis and computer crimes, security weaknesses and targets are discussed in detail. Beside others the following topics are discussed in detail: human factor and technical failures, attacks on accounts and passwords, attacks on Internet protocol, misuse of design and programming errors, weaknesses in common operating systems, targets in the WWW, and viruses. The lecture course concludes with a discussion about the possibilities to detect attacks and intrusions and also describes ethical issues.
Show more...
Courses
Education
RSS
All content for Internet-Security - Weaknesses and Targets (WT 2014/15) - tele-TASK is the property of Prof. Dr. Christoph Meinel and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
"Internet Security - Weaknesses and Targets" is based on "Internet- & WWW-Technologies" and gives a detailed introduction on problems concerning Internet and Intranet security. After starting with some remarks on risk analysis and computer crimes, security weaknesses and targets are discussed in detail. Beside others the following topics are discussed in detail: human factor and technical failures, attacks on accounts and passwords, attacks on Internet protocol, misuse of design and programming errors, weaknesses in common operating systems, targets in the WWW, and viruses. The lecture course concludes with a discussion about the possibilities to detect attacks and intrusions and also describes ethical issues.
Show more...
Courses
Education
Episodes (20/20)
Internet-Security - Weaknesses and Targets (WT 2014/15) - tele-TASK
Law and Ethics
10 years ago
1 hour 3 minutes 10 seconds

Internet-Security - Weaknesses and Targets (WT 2014/15) - tele-TASK
Wireless Security
10 years ago
1 hour 15 minutes 51 seconds

Internet-Security - Weaknesses and Targets (WT 2014/15) - tele-TASK
Weaknesses of the World Wide Web 1/2
10 years ago
1 hour 30 minutes

Internet-Security - Weaknesses and Targets (WT 2014/15) - tele-TASK
Weaknesses of MS Windows and MacOS X - Attacks and Exploits
10 years ago
1 hour 14 minutes 46 seconds

Internet-Security - Weaknesses and Targets (WT 2014/15) - tele-TASK
Weaknesses of Unix / Linux - Attacks and Exploits
10 years ago
1 hour 5 minutes 2 seconds

Internet-Security - Weaknesses and Targets (WT 2014/15) - tele-TASK
Design and Programming Errors
10 years ago
27 minutes 41 seconds

Internet-Security - Weaknesses and Targets (WT 2014/15) - tele-TASK
Weaknesses of Internet Protocols 2/2
10 years ago
1 hour 26 minutes 2 seconds

Internet-Security - Weaknesses and Targets (WT 2014/15) - tele-TASK
Hackers and Viruses
11 years ago
1 hour 4 minutes 29 seconds

Internet-Security - Weaknesses and Targets (WT 2014/15) - tele-TASK
Potential Attackers
11 years ago
19 minutes 20 seconds

Internet-Security - Weaknesses and Targets (WT 2014/15) - tele-TASK
Risk Analysis
11 years ago
1 hour 9 minutes 16 seconds

Internet-Security - Weaknesses and Targets (WT 2014/15) - tele-TASK
First Understanding of Internet and WWW
11 years ago
1 hour 27 minutes 34 seconds

Internet-Security - Weaknesses and Targets (WT 2014/15) - tele-TASK
Internet Security - An Overview
11 years ago
51 minutes 46 seconds

Internet-Security - Weaknesses and Targets (WT 2014/15) - tele-TASK
Introduction and Table of Content
11 years ago
11 minutes 15 seconds

Internet-Security - Weaknesses and Targets (WT 2014/15) - tele-TASK
Weaknesses of the World Wide Web 2/2
11 years ago
1 hour 23 minutes 58 seconds

Internet-Security - Weaknesses and Targets (WT 2014/15) - tele-TASK
Detection of Attacks and Intrusions
11 years ago
1 hour 30 minutes 37 seconds

Internet-Security - Weaknesses and Targets (WT 2014/15) - tele-TASK
Weaknesses of Internet Protocols 1/2
11 years ago
1 hour 27 minutes 55 seconds

Internet-Security - Weaknesses and Targets (WT 2014/15) - tele-TASK
OS Fingerprinting
12 years ago
26 minutes 7 seconds

Internet-Security - Weaknesses and Targets (WT 2014/15) - tele-TASK
(Online) Reconnaissance
12 years ago
28 minutes 19 seconds

Internet-Security - Weaknesses and Targets (WT 2014/15) - tele-TASK
Human Factor and Technical Failures
12 years ago
33 minutes 32 seconds

Internet-Security - Weaknesses and Targets (WT 2014/15) - tele-TASK
Attacks on Accounts and Passwords
12 years ago
1 hour 2 minutes 34 seconds

Internet-Security - Weaknesses and Targets (WT 2014/15) - tele-TASK
"Internet Security - Weaknesses and Targets" is based on "Internet- & WWW-Technologies" and gives a detailed introduction on problems concerning Internet and Intranet security. After starting with some remarks on risk analysis and computer crimes, security weaknesses and targets are discussed in detail. Beside others the following topics are discussed in detail: human factor and technical failures, attacks on accounts and passwords, attacks on Internet protocol, misuse of design and programming errors, weaknesses in common operating systems, targets in the WWW, and viruses. The lecture course concludes with a discussion about the possibilities to detect attacks and intrusions and also describes ethical issues.