Main Topics (Chapter Title: Sections)
Introduction: Security Trends, Attacks, Services and Mechanisms
Classical Encryption Techniques: Symmetric Cipher, Substitution Techniques, Transposition Techniques
Block Cipher and Data Encryption Standard: Block Cipher Principles, Feistel Cipher, Data Encryption Standard (DES)
More on Symmetric Ciphers: Multiple Encryption and Triple DES, Stream Ciphers and RC4
Public Key Cryptography and RSA: Principles of public key cryptosystems, RSA Algorithm
Key Management: Diffie-Hellman Key Exchange
Message Authentication and Hash Functions: Authentication Functions, Hash Functions
Hash and MAC Algorithms: Message Digest Algorithm (MD5), Secure Hash Algorithm (SHA1)
Digital Signatures and Authentication Protocols: Digital Signatures, Authentication Protocols
Authentication Applications: Kerberos, X.509
Access Control: Mandatory Access Control (MAC), Discretionary Access Control (DAC), Identity-Based Access Control (IBAC), Role-Based Access Control (RBAC), Operating System Models
Electronic Mail Security: Pretty Good Privacy (PGP), S/MIME
IP Security: IPSec Overview, IPSec Architecture
Web Security: Secure Socket Layer (SSL) and Transport Layer Security (TLS)
Intruders: Intrusion Detection, Password Management
Malicious Software and Network Attacks: Viruses, Worms, Distributed Denial of Service Attacks
Firewalls: Characteristics, Design Principles, Configurations
Click to Download PDF Slides | Size |
31 KB | |
432 KB | |
542 KB | |
566 KB | |
367 KB | |
419 KB | |
432 KB | |
424 KB | |
403 KB | |
180 KB | |
720 KB | |
116 KB | |
575 KB | |
619 KB | |
329 KB | |
183 KB | |
493 KB | |
416 KB |
No comments:
Post a Comment