Prof Bill Buchanan B.Buchanan@napier.ac.uk
Professor
2 THREAT ANALYSIS
2.1 Objectives
2.2 Introduction
2.3 Intruder detection
Sweeps
2.4 Vulnerably analysis
Vulnerability scanners
2.5 Hping
2.6 Botnets
2.7 Phishing
2.8 Active attacks
2.9 Inference
Applying different levels of database security
2.10 Affiliate scams
2.11 Password cracking programs
Key entropy
Hydra – just for research
2.12 Tutorial
Buchanan, W. (2016). Advanced Security and Network Forensics: Threats. http://buchananweb.co.uk/adv/unit02.html
Other Type | Teaching Resource |
---|---|
Publication Date | 2016 |
Deposit Date | Jul 8, 2021 |
Publicly Available Date | Jul 8, 2021 |
Peer Reviewed | Not Peer Reviewed |
Public URL | http://researchrepository.napier.ac.uk/id/eprint/4147 |
Related Public URLs | http://buchananweb.co.uk/adv/unit02.html |
Advanced Security And Network Forensics: Threats
(7.6 Mb)
PDF
Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains
(2024)
Journal Article
An omnidirectional approach to touch-based continuous authentication
(2023)
Journal Article
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
Apache License Version 2.0 (http://www.apache.org/licenses/)
Apache License Version 2.0 (http://www.apache.org/licenses/)
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search