Chương này khám phá những hạn chế của pháp luật về việc nhập khẩu và xuất khẩu các sản phẩm mật mã. Các đạo luật này hiện đang trong tình trạng thay đổi liên tục như các quan chức chính phủ trên toàn thế giới cố gắng để hiểu được ý nghĩa của công nghệ điện tử trên các mô Internet. | Export Controls on Cryptography consult with their corporate lawyer s to fully understand the current . and international laws regarding this area. Summary This chapter explored the legal restrictions on the import and export of cryptographic products. These laws are currently in a state of flux as government officials worldwide try to understand the implications of electronic technology on the rapidly evolving Internet-based business models. Around the globe digital signature legislation is also evolving as a way to give documents that exist only in electronic form the same legal status as paper documents and to provide a secure reliable and legally sanctioned method for signing electronic documents. You should follow the news in these areas carefully to ensure that any electronic business your corporation is part of follows the current laws on cryptographic export import and on the use of digital signatures. continues continues continues HOME CONTENTS PREVIOUS INEXT GLOSSARY FEEDBACK SEARCH HELP Posted Wed Jun 14 11 30 40 PDT 2000 Copyright 1989 - 2000 Cisco Systems Inc. http cpress cc td cpress internl dns 18 of 18 02 02 2001 Threats in an Enterprise Network Table of Contents Threats in an Enterprise Network Types of Threats Unauthorized Access Impersonation Denial of Service Motivation of Threat Common Vulnerabilities The TCP IP Protocol TCP IP Connection Establishment TCP IP Sequence Number Attack TCP IP Session Hijacking TCP SYN Attack The Attack The UDP Protocol The ICMP Protocol The Ping of Death SMURFAttack The Attack The NNTP Protocol The SMTP Protocol Spam Attack The FTP Protocol The NFS NIS Services X Window System Social Engineering Summary 4 http cpress cc td cpress internl dns 1 of 19 02 02 2001 Threats in an Enterprise Network Threats in an Enterprise Network Today there is an ever-growing dependency on computer networks for business transactions. With the free