Main Topics (Chapter Title: Sections) 
Introduction: Security Trends, Attacks, Services and Mechanisms 
Classical Encryption Techniques: Symmetric Cipher, Substitution Techniques, Transposition Techniques
 Block Cipher and Data Encryption Standard: Block Cipher Principles, Feistel Cipher, Data Encryption Standard (DES)
More on Symmetric Ciphers: Multiple Encryption and Triple DES, Stream Ciphers and RC4 
Public Key Cryptography and RSA: Principles of public key cryptosystems, RSA Algorithm 
Key Management: Diffie-Hellman Key Exchange
Message Authentication and Hash Functions: Authentication Functions, Hash Functions 
Hash and MAC Algorithms: Message Digest Algorithm (MD5), Secure Hash Algorithm (SHA1)
 Digital Signatures and Authentication Protocols: Digital Signatures, Authentication Protocols
Authentication Applications: Kerberos, X.509 
Access Control: Mandatory Access Control (MAC), Discretionary Access Control (DAC), Identity-Based Access Control (IBAC), Role-Based Access Control (RBAC), Operating System Models
Electronic Mail Security: Pretty Good Privacy (PGP), S/MIME
 IP Security: IPSec Overview, IPSec Architecture 
Web Security: Secure Socket Layer (SSL) and Transport Layer Security (TLS)
Intruders: Intrusion Detection, Password Management 
Malicious Software and Network Attacks: Viruses, Worms, Distributed Denial of Service Attacks 
Firewalls: Characteristics, Design Principles, Configurations
| Click   to Download PDF Slides | Size | 
| 31 KB | |
| 432 KB | |
| 542 KB | |
| 566 KB | |
| 367 KB | |
| 419 KB | |
| 432 KB | |
| 424 KB | |
| 403 KB | |
| 180 KB | |
| 720 KB | |
| 116 KB | |
| 575 KB | |
| 619 KB | |
| 329 KB | |
| 183 KB | |
| 493 KB | |
| 416 KB | 
 
 
No comments:
Post a Comment