Bog'liq
axborot xavfsizligining usul va vositalari fanidan kompyuter tarmogida informatsiya himoyasi moduli boyicha laboratoriya ishlarini bajarish uchun elektron qollanma yaratish
Mundarija
1. Kirish……………..………….……………………………………...1
2. Nazariy qism………...……….……………………………………..3
2.1. Ochiq tizimar o’zaro aloqasi ISO/OSI va TCP/IP stek
protokollari ………..…………………………………….............3
2.2. Kanal
darajasidagi
xafvsizlik
–
PPTP
va
L2TP
protokollari………………………...............................................7
2.3. Tarmoq orqali uyushtiriladigan hujum ....................................14
2.4.
Harakatlar besh bosqichda amalga oshiriladi………………………..14
2.5.
Hujum turlari va tizimga kirishlar…………………………………….15
2.6.
Hujumdan himoyalanish vositalari ……………………………………16
3. Asosiy qism.......................................................................................19
3.1.1-qism. DVWA ni o`rnatish……….............................................19
3.2.
2-qism. Buyruqni bajarish
………....................................................40
3.3.
Do'stlaringiz bilan baham: