Security and Internet Protocols

Main Topics (Chapter Title: Sections)
Introduction: Security Trends, Attacks, Services and Mechanisms
Classical Encryption Techniques: Symmetric Cipher, Substitution Techniques, Transposition Techniques
 Block Cipher and Data Encryption Standard: Block Cipher Principles, Feistel Cipher, Data Encryption Standard (DES)
More on Symmetric Ciphers: Multiple Encryption and Triple DES, Stream Ciphers and RC4
Public Key Cryptography and RSA: Principles of public key cryptosystems, RSA Algorithm
Key Management: Diffie-Hellman Key Exchange
Message Authentication and Hash Functions: Authentication Functions, Hash Functions
Hash and MAC Algorithms: Message Digest Algorithm (MD5), Secure Hash Algorithm (SHA1)
 Digital Signatures and Authentication Protocols: Digital Signatures, Authentication Protocols
Authentication Applications: Kerberos, X.509
Access Control: Mandatory Access Control (MAC), Discretionary Access Control (DAC), Identity-Based Access Control (IBAC), Role-Based Access Control (RBAC), Operating System Models
Electronic Mail Security: Pretty Good Privacy (PGP), S/MIME
 IP Security: IPSec Overview, IPSec Architecture
Web Security: Secure Socket Layer (SSL) and Transport Layer Security (TLS)
Intruders: Intrusion Detection, Password Management
Malicious Software and Network Attacks: Viruses, Worms, Distributed Denial of Service Attacks 
Firewalls: Characteristics, Design Principles, Configurations

Click to Download PDF Slides
31 KB
432 KB
542 KB
566 KB
367 KB
419 KB
432 KB
424 KB
403 KB
180 KB
720 KB
116 KB
575 KB
619 KB
329 KB
183 KB
493 KB
416 KB

No comments: