مقدمه...............................................................................................................................................
4
مدیریت
ریسک.............................................................................................................................4
انواع و منابع تهدیدهای شبکه.......................................................................................................5
Denial-of-Service.................................................................................................................5
دسترسی
غیر مجاز.......................................................................................................................6
اجرای فرامین غیر قانونی.................................................................................................................6
شکافهای
محرمانه.........................................................................................................................7
رفتار
مخرب.....................................................................................................................................7
تخریب اطلاعات................................................................................................................................8
فایروالها.............................................................................................................................................10
باستیون هاست (Bastion host) ..........................................................................................10
روتور..................................................................................................................................................11
لیست کنترل دسترسی (ACL) ...............................................................................................11
منطقه بیطرف (DMZ) ..............................................................................................................11
پراکسی (Proxy) ........................................................................................................................11
انواع فایروالها...................................................................................................................................12
فیلتر کردن بسته............................................................................................................................13
سیستمهای ترکیبی (Hybrid systems) ............................................................................14
زمینههای اشتغال............................................................................................................................15
بازار کار..............................................................................................................................................15