IEEE Press 445 Hoes Lane Piscataway, NJ IEEE Press Editorial Board Mohamed E. El-Hawary, Editor in Chief
|
|
- Christiana Stephens
- 8 years ago
- Views:
Transcription
1 Network Security
2 IEEE Press 445 Hoes Lane Piscataway, NJ IEEE Press Editorial Board Mohamed E. El-Hawary, Editor in Chief R. Abari T. G. Croda R. J. Herrick S. Basu S. Farshchi M. S. Newman A. Chatterjee S. V. Kartalopoulos N. Schulz T. Chen B. M. Hammerli Kenneth Moore, Director of IEEE Book and Information Services (BIS) Steve Welch, Acquisitions Editor Jeanne Audino, Project Editor Technical Reviewers Stuart Jacobs, Verizon Lakshmi Raman, CableLabs Broadband Access Department
3 Network Security Current Status and Future Directions Edited by Christos Douligeris Dimitrios N. Serpanos Wiley-Interscience A John Wiley & Sons, Inc., Publication
4 Copyright 2007 by the Institute of Electrical and Electronics Engineers, Inc. All rights reserved. Published by John Wiley & Sons, Inc., Published simultaneously in Canada. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) , fax (978) , or on the web at Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) , fax (201) , or online at Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) , outside the United States at (317) or fax (317) Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic formats. For more information about Wiley products, visit our web site at Wiley Bicentennial Logo: Richard J. Pacifico. Library of Congress Cataloging-in-Publication Data is available. ISBN Printed in the United States of America
5 To Vicky, Pennie, Kostis, Mariada, and our parents Christos Douligeris To Georgia, Loukia, and my parents Dimitrios N. Serpanos
6 Contents Preface Contributors xiii xv 1. Computer Network Security: Basic Background and Current Issues 1 Panayiotis Kotzanikolaou and Christos Douligeris 1.1 Some Terminology on Network Security ISO/OSI Reference Model for Networks Network Security Attacks Mechanisms and Controls for Network Security: Book Overview and Structure 10 References 11 Part One Internet Security 2. Secure Routing 15 Ioannis Avramopoulos, Hisashi Kobayashi, Arvind Krishnamurthy, and Randy Wang 2.1 Introduction Networking Technologies Attacks in Networks State of the Art Conclusion and Research Issues 28 References Designing Firewalls: A Survey 33 Angelos D. Keromytis and Vassilis Prevelakis 3.1 Introduction Firewall Classification Firewall Deployment: Management Conclusions 48 References Security in Virtual Private Networks 51 Srinivas Sampalli 4.1 Introduction VPN Overview VPN Benefits VPN Terminology VPN Taxonomy IPSec Current Research on VPNs Conclusions 61 References IP Security (IPSec) 65 Anirban Chakrabarti and Manimaran Govindarasu 5.1 Introduction IPSec Architecture and Components Benefits and Applications of IPSec Conclusions 81 References IDS for Networks 83 John C. McEachen and John M. Zachary 6.1 Introduction Background Modern NIDSs Research and Trends Conclusions 95 References Intrusion Detection Versus Intrusion Protection 99 Luis Sousa Cardoso 7.1 Introduction Detection Versus Prevention 102 vii
7 viii Contents 7.3 Intrusion Prevention Systems: The Next Step in Evolution of IDS Architecture Matters IPS Deployment IPS Advantages IPS Requirements: What to Look For Conclusions 114 References Denial-of-Service Attacks 117 Aikaterini Mitrokotsa and Christos Douligeris 8.1 Introduction DoS Attacks DDoS Attacks DDoS Defense Mechanisms Conclusions 131 References Secure Architectures with Active Networks 135 Srinivas Sampalli, Yaser Haggag, and Christian Labonte 9.1 Introduction Active Networks SAVE Test bed Adaptive VPN Architecture with Active Networks (SAM) Architecture Conclusions 149 References 150 Part Two Secure Services 10. Security in E-Services and Applications 157 Manish Mehta, Sachin Singh, and Yugyung Lee 10.1 Introduction What Is an E-Service? Security Requirements for E- Services and Applications Security for Future E- Services 175 References Security in Web Services 179 Christos Douligeris and George P. Ninios 11.1 Introduction Web Services Technologies and Standards Web Services Security Standard Conclusions 203 References Secure Multicasting 205 Constantinos Boukouvalas and Anthony G. Petropoulos 12.1 Introduction IP Multicast Application Security Requirements Multicast Security Issues Data Authentication Source Authentication Schemes Group Key Management Group Management and Secure Multicast Routing Secure IP Multicast Architectures Secure IP Multicast Standardization Efforts Conclusions 226 References Voice Over IP Security 229 Son Vuong and Kapil Kumar Singh 13.1 Introduction Security Issues in VoIP Vulnerability Testing Intrusion Detection Systems Conclusions 243 References 245
8 Contents ix 14. Grid Security 247 Kyriakos Stefanidis, Artemios G. Voyiatzis, and Dimitrios N. Serpanos 14.1 Introduction Security Challenges for Grids Grid Security Infrastructure Grid Computing Environments Grid Network Security Conclusions and Future Directions 254 References Mobile Agent Security 257 Panayiotis Kotzanikolaou, Christos Douligeris, Rosa Mavropodi, and Vassilios Chrissikopoulos 15.1 Introduction Taxonomy of Solutions Security Mechanisms for Mobile Agent Systems 264 References 268 Part Three Mobile and Security 16. Mobile Terminal Security 275 Olivier Benoit, Nora Dabbous, Laurent Gauteron, Pierre Girard, Helena Handschuh, David Naccache, Stéphane Socié, and Claire Whelan 16.1 Introduction WLAN and WPAN Security GSM and 3GPP Security Mobile Platform Layer Security Hardware Attacks on Mobile Equipment Conclusion 294 References IEEE Security 297 Daniel L. Lough, David J. Robinson, and Ian G. Schneller 17.1 Introduction Introduction to IEEE Wired Equivalent Privacy Additional IEEE Security Techniques Wireless Intrusion Detection Systems Practical IEEE Security Measures Conclusions 311 References Bluetooth Security 313 Christian Gehrmann 18.1 Introduction Bluetooth Wireless Technology Security Architecture Security Weaknesses and Countermeasures Bluetooth Security: What Comes Next? 327 References Mobile Telecom Networks 331 Christos Xenakis and Lazaros Merakos 19.1 Introduction Architectures Network Security Architectures Research Issues Conclusions 352 References Security in Mobile Ad Hoc Networks 355 Mike Burmester, Panayiotis Kotznanikolaou, and Christos Douligeris 20.1 Introduction Routing Protocols Security Vulnerabilities 360
9 x Contents 20.4 Preventing Attacks in MANETs Trust in MANETs Establishing Secure Routes in a MANET Cryptographic Tools for MANETs 370 References Wireless Sensor Networks 375 Artemios G. Voyiatzis and Dimitrios N. Serpanos 21.1 Introduction Sensor Devices Sensor Network Security Future Directions Conclusions 388 References Trust 391 Lidong Chen 22.1 Introduction What Is a trust Model? How Trust Models Work? Where Trust Can Go Wrong? Why Is It Difficult to Define Trust? Which Lessons Have We Learned? 402 References 403 Part Four Trust, Anonymity, and Privacy 23. PKI Systems 409 Nikos Komninos 23.1 Introduction Origins of Cryptography Overview of PKI Systems Components of PKI Systems Procedures of PKI Systems Current and Future Aspects of PKI Systems Conclusions 416 References Privacy in Electronic Communications 419 Alf Zugenmaier and Joris Claessens 24.1 Introduction Protection from Third Party: Confidentiality Protection from Communication Partner Invasions of Electronic Private Sphere Balancing Privacy with Other Needs Structure of Privacy Conclusion and Future Trends 437 References Securing Digital Content 441 Magda M. Mourad and Ahmed N. Tantawy 25.1 Introduction Securing Digital Content: Need and Challenges Content Protection Techniques Illustrative Application: E- Publishing of E-Learning Content Concluding Remarks 456 References 456 Appendix A. Cryptography Primer: Introduction to Cryptographic Principles and Algorithms 459 Panayiotis Kotzanikolaou and Christos Douligeris A.1 Introduction 459 A.2 Cryptographic Primitives 461 A.3 Symmetric-Key Cryptography 463
10 Contents xi A.4 Asymmetric-Key Cryptography 468 A.5 Key Management 476 A.6. Conclusions and Other Fields of Cryptography 478 References 479 Appendix B. Network Security: Overview of Current Legal and Policy Issues 481 Andreas Mitrakas B.1 Introduction 481 B.2 Network Security as a Legal Requirement 482 B.3 Network Security Policy Overview 484 B.4 Legal Aspects of Network Security 487 B.5 Self-Regulatory Security Frameworks 502 B.6 Conclusions 505 References 505 Appendix C. Standards in Network Security 507 Despina Polemi and Panagiotis Sklavos C.1 Introduction 507 C.2 Virtual Private Networks: Internet Protocol Security (IPSec) 507 C.3 Multicast Security (MSEC) 512 C.4 Transport Layer Security (TLS) 513 C.5 Routing Security 514 C.6 ATM Networks Security 514 C.7 Third-Generation (3G) Mobile Networks 516 C.8 Wireless LAN (802.11) Security 522 C.9 Security 523 C.10 Public-Key Infrastructure (X.509) 526 Index 531 About the Editors and Authors 563
11 Preface Network security is a critical parameter in the increasingly connected (networked) world. Advances in communication systems and protocols, wired and wireless, achieving high speeds, high availability and low cost have enabled the development of high bandwidth backbones and have delivered high throughput to end users of private and public networks. Homes today are able to send and receive high bandwidth, real-time data, enabling high quality communication and a wide range of services. The progress in development, deployment and management of large, reliable networks has resulted not only in the evolution of new services, but to an infrastructure that leads to the provision of a wide range of consumer services that are significantly more cost-effective than traditional ones. It is no surprise that the evolution of all these networks, and especially the Internet a public network is changing the economy worldwide. The continuous deployment of network services over this wide range of public and private networks has led to transactions and services that include personal, and sometimes quite sensitive, data. One only needs to consider simple, everyday services from pay-perview and cable telephony to bill payments by phone, credit card charging and Internet banking. Such services require significant effort not only to protect the sensitive data involved in the transactions and services, but to ensure integrity and availability of network services as well. A typical approach to provide these services and increase security and dependability has been to deploy services over private networks, which are easier to protect than public ones. However, the advent of the Internet has changed electronic business models, providing high flexibility, ease of use, and enabling service deployment with substantially lower cost. Thus, the role of network security is significantly more important in emerging network environments, where even private networks connect to the Internet, in order to exploit its multiple advantages. As the view of traditional distributed systems has changed to a network-centric view in all types of application networks financial, citizen support, military, etc. and as the requirement for employing heterogeneous networks and systems becomes increasingly important, the complexity of these systems has led to significant security flaws and problems. The traditional approach to network service development, using several layers and protocols, together with the lack of systematic methods to design and implement secure end systems leads to vulnerabilities and difficulties in implementing and managing security. Attackers continuously find vulnerabilities at various levels, from the network itself to operating systems, and exploit them to crack systems and services. The result of these phenomena is a significant effort by the research community to address the design and implementation of secure computing systems and networks in order to enable the deployment of secure services. Due to the conventional approaches for service development over such complex, and most often heterogeneous networks and systems, the efforts of the networking community have been several and at various fronts. Thus, currently, there exist several approaches to provide security at various levels and degrees: secure protocols, secure protocol mechanisms, secure services (e.g., phone), firewalls, intrusion detection systems (IDS), etc. xiii
12 xiv Preface This book considers and addresses several aspects of network security, in an effort to provide a publication that summarizes the main current status and the promising and interesting future directions and challenges. The presented approaches are state-of-the-art, described by leaders in the field. They include trends at several fronts, from Internet protocols to firewalls and from mobile systems to IDS systems. The chapters of the book are divided into four main sections which consider the main research challenges of today and the important approaches providing promising results for the future: (a) Internet security, (b) secure services, (c) security in mobile systems and (d) trust, anonymity and privacy. In each part several chapters address the main research results and trends. Importantly, we have included 3 appendices of critical background knowledge for the reader who is new to this important research area; the appendices cover (a) a primer in cryptography, (b) legal aspects and (c) standards in network security. Considering the debate about the increasing importance of security in everyday life and the catastrophic results its illegal and unethical use may bring, we believe that the appendices provide a good basis for readers who are interested in the role, restrictions, and limitations of network security in the emerging globally networked world. In our effort to put this book together, we had the support of several authors, who have written the chapters, providing knowledge and insight through their efforts. The 25 chapters constitute a significant effort on their behalf and we thank them for their efforts. The results of these efforts are a collection of high-quality chapters, which enable the reader to understand the main problems, results, and trends in most aspects of modern network security. Also, we thank the reviewers of the book, who have provided insightful comments and helped improve the presentation and the quality of the book. Finally, we thank IEEE for its support to this effort and its high-quality work in the production of the final result. As the overall effort has taken longer than expected, we also appreciate the patience of the authors until the production of the final book. We certainly hope that the publication will prove to be a useful tool to all readers interested in network security. Patras, Greece March 2007 Christos Douligeris Dimitrios N. Serpanos
13 Contributors Ioannis Avramopoulos Princeton University, Princeton, New Jersey Olivier Benoit Security Labs, Gemalto, La Ciotat, France Constantinos Boukouvalas Research and Development, OTE SA, Athens, Greece Mike Burmester Florida State University, Tallahassee, Florida Luis Sousa Cardoso Portugal Telecom, Lisboa, Portugal Anirban Chakrabarti Department of Electrical and Computer Iowa State University, Ames, Iowa Lidong Chen Computer Security Division, National Institute of Standards and Technology (NIST), Gaithersburg, Maryland Vassilios Chrissikopoulos Department of Archiving and Library Studies, Ionian University, Corfu, Greece Joris Claessens European Microsoft Innovation Center, Aachen, Germany Nora Dabbous Ingenico, Paris, France Christos Douligeris Department of Informatics, University of Piraeus, Laurent Gauteron Security Labs, Gemalto, La Ciotat, France Christian Gehrmann Ericsson Mobile Platforms AB, Lund, Sweden Pierre Girard Security Labs, Gemalto, La Ciotat, France Manimaran Govindarasu Department of Electrical and Computer Iowa State University, Ames, Iowa Yaser Haggag Dalhousie University, Halifax, Canada Helena Handschuh Spansion, Levallois-Perret, France xv
14 xvi Contributors Angelos D. Keromytis Columbia University, New York, New York Hisashi Kobayashi Department of Electrical School of Engineering and Applied Science, Princeton University, Princeton, New Jersey Nikos Komninos Athens Information Technology, Peania, Attiki, Greece Panayiotis Kotzanikolaou Department of Informatics, University of Piraeus, Arvind Krishnamurthy Department of Computer Science and University of Washington, Seattle, Washington Christian Labonte Dalhousie University, Halifax, Canada Yugyung Lee School of Computing University of Missouri Kansas City, Kansas City, Missouri Daniel L. Lough Global Security Consultants, Warrenton, Virginia Rosa Mavropodi Department of Informatics, University of Piraeus, John C. McEachen Department of Electrical and Computer Naval Postgraduate School, Monterey, California Manish Mehta School of Computing University of Missouri Kansas City, Kansas City, Missouri Lazaros Merakos Department of Informatics and Telecommunications, University of Athens, Athens, Greece Andreas Mitrakas European Network and Information Security Agency (ENISA), Heraklion, Greece Aikaterini Mitrokotsa Department of Informatics, University of Piraeus, Magda M. Mourad IBM Thomas J. Watson Research Center, Yorktown Heights, New York David Naccache Université Paris II, Panthéon-Assas, Paris, France George P. Ninios Department of Informatics, University of Piraeus, Anthony G. Petropoulos Department of Informatics, University of Piraeus, Despina Polemi Department of Informatics, University of Piraeus,
15 Contributors xvii Vassilis Prevelakis Drexel University, Philadelphia, Pennsylvania David J. Robinson Global Security Consultants, Odenton, Maryland Snirivas Sampalli Dalhousie University, Halifax, Canada Ian G. Schneller Global Security Consultants, Odenton, Maryland Dimitrios N. Serpanos Department of Electrical and Computer University of Patras, Patras, Greece Kapil Kumar Singh University of British Columbia, Vancouver, Canada Sachin Singh Heartlab, Westerly, Rhode Island Panagiotis Sklavos Technical Department, Expertnet SA, Chalandri, Greece Stéphane Socié Security Labs, Gemalto, La Ciotat, France Ahmed N. Tantawy IBM Thomas J. Watson Research Center, Yorktown Heights, New York Artemios G. Voyiatzis Department of Electrical and Computer University of Patras, Patras, Greece Son Vuong University of British Columbia, Vancouver, Canada Randy Wang Microsoft Research, Bangalore, India Claire Whelan School of Computing, Dublin City University, Dublin, Ireland Christos Xenakis Department of Informatics and Telecommunications, University of Athens, Athens, Greece John M. Zachary Department of Electrical and Computer Naval Postgraduate School, Monterey, California Alf Zugenmaier DoCoMo Euro-Labs, Munich, Germany Kyriakos Stefanidis Department of Electrical and Computer University of Patras, Patras, Greece
NETWORK SECURITY: CURRENT STATUS AND FUTURE DIRECTIONS
NETWORK SECURITY: CURRENT STATUS AND FUTURE DIRECTIONS Preface. Contributors. 1. Computer Network Security: Basic Background and Current Issues (Panayiotis Kotzanikolaou and Christos Douligeris). 1.1 Some
More informationNetwork Security. Current Status and Future Directions
Brochure More information from http://www.researchandmarkets.com/reports/2175769/ Network Security. Current Status and Future Directions Description: A unique overview of network security issues, solutions,
More informationNetwork Security Current Status and Future Directions
Network Security Current Status and Future Directions Edited by Christos Douligeris Dimitrios N. Serpanos Wiley-Interscience A John Wiley & Sons, Inc., Publication Network Security IEEE Press 445 Hoes
More informationFundamentals of Financial Planning and Management for mall usiness
E REPRE EUR A F A CE Fundamentals of Financial Planning and Management for mall usiness M.J. Alhabeeb ENTREPRENEURIAL FINANCE The first effective form of investment was realized when the primitive man
More informationwww.wileyglobalfinance.com
Wiley Global Finance is a market-leading provider of over 400 annual books, mobile applications, elearning products, workflow training tools, newsletters and websites for both professionals and consumers
More informationHUMAN RESOURCES MANAGEMENT FOR PUBLIC AND NONPROFIT ORGANIZATIONS
HUMAN RESOURCES MANAGEMENT FOR PUBLIC AND NONPROFIT ORGANIZATIONS Essential Texts for Public and Nonprofit Leadership and Management The Handbook of Nonprofit Governance, by BoardSource Strategic Planning
More informationStatistics for Experimenters
Statistics for Experimenters Design, Innovation, and Discovery Second Edition GEORGE E. P. BOX J. STUART HUNTER WILLIAM G. HUNTER WILEY- INTERSCIENCE A JOHN WILEY & SONS, INC., PUBLICATION FACHGEBIETSBGCHEREI
More informationCOVERS ALL TOPICS IN LEVEL I CFA EXAM REVIEW CFA LEVEL I FORMULA SHEETS
2016 CFA EXAM REVIEW COVERS ALL TOPICS IN LEVEL I LEVEL I CFA FORMULA SHEETS Copyright 2016 by John Wiley & Sons, Inc. All rights reserved. Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Published
More informationPraise for Launch. Hands on and generous, Michael shows you precisely how he does it, step by step. Seth Godin, author of Linchpin
Praise for Launch Launch is your road map to success in an ever-changing world. Stelzner shows you how to enchant your customers so that they ll want to help you change the world. Guy Kawasaki, author
More informationSECURITY AND QUALITY OF SERVICE IN AD HOC WIRELESS NETWORKS
SECURITY AND QUALITY OF SERVICE IN AD HOC WIRELESS NETWORKS Ensuring secure transmission and good quality of service (QoS) are key commercial concerns in ad hoc wireless networks as their application in
More informationDATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
More informationLecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
More informationWireless Mobile Internet Security. 2nd Edition
Brochure More information from http://www.researchandmarkets.com/reports/2330593/ Wireless Mobile Internet Security. 2nd Edition Description: The mobile industry for wireless cellular services has grown
More informationGraph Analysis and Visualization
Graph Analysis and Visualization Graph Analysis and Visualization DISCOVERING BUSINESS OPPORTUNITY IN LINKED DATA Richard Brath David Jonker Graph Analysis and Visualization: Discovering Business Opportunity
More informationProgramming Interviews Exposed: Secrets to Landing Your Next Job
Programming Interviews Exposed: Secrets to Landing Your Next Job Preface.... xxv Introduction....xxix Chapter 1 Before the Search... 1 Chapter 2 The Job Application Process....9 Chapter 3 Approaches to
More informationThese materials are the copyright of John Wiley & Sons, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
Session Border Controllers For Dummies, Sonus Special Edition Published by John Wiley & Sons, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright 2012 by John Wiley & Sons, Inc. Published
More informationPraise for Agile Contracts
Agile Contracts Praise for Agile Contracts Agile development is starting to become popular in Japan, though Japanese companies have used all in one contracts for the last three decades. In this movement,
More informationFundamentals of Mobile and Pervasive Computing
Fundamentals of Mobile and Pervasive Computing Frank Adelstein Sandeep K. S. Gupta Golden G. Richard III Loren Schwiebert Technische Universitat Darmstadt FACHBEREICH INFORMATIK B1BLIOTHEK Inventar-Nr.:
More information12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
More informationBrief Solution Description
Public Brief Solution Description Aastra MX-ONE V.4.0 integration with Microsoft UC products Aastra Telecom Sweden LM Ericssons väg 30, Hägersten Box 422 14 SE-126 17 Stockholm, Sweden Doc. ASE/MXO/PM/0031/EN
More informationJoseph Migga Kizza. A Guide to Computer Network Security. 4) Springer
Joseph Migga Kizza A Guide to Computer Network Security 4) Springer Contents Part I Understanding Computer Network Security 1 Computer Network Fundamentals 1.1 Introduction 1.2 Computer Network Models
More informationNetwork Security. Introduction. Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015
Network Security Introduction Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015 Objectives - Syllabus 2 Objectives Introduce the key aspects of applied network security,
More informationARCHITECTING THE CLOUD
ARCHITECTING THE CLOUD Founded in 1807, John Wiley & Sons is the oldest independent publishing company in the United States. With offices in North America, Europe, Asia, and Australia, Wiley is globally
More informationMANAGEMENT OF DATA IN CLINICAL TRIALS
MANAGEMENT OF DATA IN CLINICAL TRIALS Second Edition ELEANOR MCFADDEN Frontier Science, Ltd. Kincraig, Inverness-shire, Scotland WILEY-INTERSCIENCE A JOHN WILEY & SONS, INC., PUBLICATION MANAGEMENT OF
More informationSecurity in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
More informationGovt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester
Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering Sixth Semester Subject: Network Security & Management Contact Hrs / week: 4 Total hrs: 64 Table of Contents
More informationNICK SMITH AND ROBERT WOLLAN WITH CATHERINE ZHOU. John Wiley & Sons, Inc.
NICK SMITH AND ROBERT WOLLAN WITH CATHERINE ZHOU John Wiley & Sons, Inc. Copyright # 2011 by Accenture, LLP. All rights reserved. Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Published simultaneously
More informationCHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.0 Introduction Voice over Internet Protocol (VoIP) is the most popular in telecommunication technology. Nowadays, three million users use VoIP. It is estimated that the number
More informationGuide to Wireless Network Security
Guide to Wireless Network Security Guide to Wireless Network Security by John R. Vacca USA Springer John R. Vacca Author and IT Consultant 34679 TR 382 Pomeroy, Ohio 45769 e-mail: jvacca@hti.net http://www.johnvacca.com/
More informationComputer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings
Computer Security Principles and Practice Second Edition William Stailings Lawrie Brown University ofnew South Wales, Australian Defence Force Academy With Contributions by Mick Bauer Security Editor,
More informationCRITICAL INFRASTRUCTURE PROTECTION IN HOMELAND SECURITY
CRITICAL INFRASTRUCTURE PROTECTION IN HOMELAND SECURITY CRITICAL INFRASTRUCTURE PROTECTION IN HOMELAND SECURITY DEFENDING A NETWORKED NATION Ted G. Lewis Naval Postgraduate School Monterey, California
More informationDISTRIBUTED SYSTEMS SECURITY
DISTRIBUTED SYSTEMS SECURITY Issues, Processes and Solutions Abhijit Belapurkar, Yahoo! Software Development India Pvt. Ltd., India Anirban Chakrabarti, Infosys Technologies Ltd., India Harigopal Ponnapalli,
More informationModule 1: Introduction to Designing Security
Module 1: Introduction to Designing Security Table of Contents Module Overview 1-1 Lesson 1: Overview of Designing Security for Microsoft Networks 1-2 Lesson 2: Introducing Contoso Pharmaceuticals: A Case
More informationINFORMATION SCIENCE. INFSCI 0010 INTRODUCTION TO INFORMATION SCIENCE 3 cr. INFSCI 0015 DATA STRUCTURES AND PROGRAMMING TECHNIQUES 3 cr.
INFORMATION SCIENCE INFSCI 0010 INTRODUCTION TO INFORMATION SCIENCE 3 cr. Introduction to the concepts, principles, and skills of information science for students with no programming experience. Topics
More informationSIP SECURITY WILEY. Dorgham Sisalem John Floroiu Jiri Kuthan Ulrich Abend Henning Schulzrinne. A John Wiley and Sons, Ltd.
SIP SECURITY Dorgham Sisalem John Floroiu Jiri Kuthan Ulrich Abend Henning Schulzrinne WILEY A John Wiley and Sons, Ltd., Publication Foreword About the Authors Acknowledgment xi xiii xv 1 Introduction
More informationAnalysis of Financial Time Series
Analysis of Financial Time Series Analysis of Financial Time Series Financial Econometrics RUEY S. TSAY University of Chicago A Wiley-Interscience Publication JOHN WILEY & SONS, INC. This book is printed
More informationSecure VoIP for optimal business communication
White Paper Secure VoIP for optimal business communication Learn how to create a secure environment for real-time audio, video and data communication over IP based networks. Andreas Åsander Manager, Product
More informationAge and Health Insurance: Pricing Out the Decades of Adult Life Looking at the difference in health insurance premiums between ages 20 and 60.
Age and Health Insurance: Pricing Out the Decades of Adult Life Looking at the difference in health insurance premiums between ages 20 and 60. Contents 2 3 3 4 4 5 6 7 7 8 9 10 11 12 13 14 Table of Contents
More informationSite to Site Virtual Private Networks (VPNs):
Site to Site Virtual Private Networks Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0002.01 Prog. Director Mark Ferrar Owner Tim Davis Version 1.0
More informationPractical Support for ISO 900 1 Software Project Documentation
Practical Support for ISO 900 1 Software Project Documentation IEEE~ COMPUTER SOCIETY +IEEE Press Operating Committee Chair Roger U. Fujii, Vice President Northrop Grumman Mission Systems Editor-in-Chief
More informationIndustrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
More informationEffective Methods for Software and Systems Integration
Effective Methods for Software and Systems Integration Boyd L. Summers CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 CRC Press is an imprint of Taylor
More informationAbout the Authors Preface Acknowledgements List of Acronyms
Contents About the Authors Preface Acknowledgements List of Acronyms xiii xv xvii xix Part One Wireless Ad Hoc, Sensor and Mesh Networking 1 1 Introduction 3 1.1 Information Security 4 1.1.1 Computer Security
More informationEUCIP - IT Administrator. Module 5 IT Security. Version 2.0
EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single
More information230617 - NS - Network Security
Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2015 230 - ETSETB - Barcelona School of Telecommunications Engineering 744 - ENTEL - Department of Network Engineering DEGREE IN TELECOMMUNICATIONS
More informationAC 2009-1316: INNOVATIVE NETWORK SECURITY COURSE DEVELOPMENT
AC 2009-1316: INNOVATIVE NETWORK SECURITY COURSE DEVELOPMENT Hetal Jasani, Northern Kentucky University Dr. Hetal Jasani is an assistant professor in the Department of Computer Science at Northern Kentucky
More informationRecommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
More informationTim Bovles WILEY. Wiley Publishing, Inc.
Tim Bovles WILEY Wiley Publishing, Inc. Contents Introduction xvii Assessment Test xxiv Chapter 1 Introduction to Network Security 1 Threats to Network Security 2 External Threats 3 Internal Threats 5
More informationBachelor of Information Technology (Network Security)
Bachelor of Information Technology (Network Security) Course Structure Year 1: Level 100 Foundation knowledge subjects SEMESTER 1 SEMESTER 2 ITICT101A Fundamentals of Computer Organisation ITICT104A Internetworking
More informationNetwork System Design Lesson Objectives
Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network
More informationCybercrimes: A Multidisciplinary Analysis
Sumit Ghosh Elliot Turrini Editors Cybercrimes: A Multidisciplinary Analysis fyj Springer Part I Introducing Cybercrimes 1 A Pragmatic, Experiential Definition of Computer Crimes 3 1.1 Introducing Computer
More informationInformation Assurance and Security Technologies for Risk Assessment and Threat Management:
Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances Te-Shun Chou East Carolina University, USA Information Science REFERENCE Detailed Table of Contents Foreword
More informationAutomated Firewall Analytics
Automated Firewall Analytics Ehab Al-Shaer Automated Firewall Analytics Design, Configuration and Optimization 123 Ehab Al-Shaer University of North Carolina Charlotte Charlotte, NC, USA ISBN 978-3-319-10370-9
More informationNetworking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the
Networking Systems Design and Development Lee Chao CRC Press Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an Informa business AN AUERBACH BOOK
More informationCCNA Cisco Associate- Level Certifications
CCNA Cisco Associate- Level Certifications Routing & Switching Security Voice Wireless Advance your network engineering skills in working on complex Cisco network solutions. WWW.FASTLANEUS.COM Cisco CCNA
More informationNetwork Security Essentials:
Network Security Essentials: Applications and Standards Fifth Edition William Stallings International Editions contributions by B. R. Chandavarkar National Institute of Technology Karnataka, Surathkal
More informationNetwork Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
More informationAccessing BlackBerry Data Services Using Wi-Fi Networks
Accessing BlackBerry Data Services Using Wi-Fi Networks 2007 Research In Motion Limited. All rights reserved. 2 of 7 Contents Introduction...3 Wi-Fi access to BlackBerry data services...3 Priority for
More informationDatawire Secure Transport Value Proposition
Transport Value Proposition Contents: What is Transport? Transport is a patented connectivity service Datawire Defined that transports financial transactions securely and reliably over Datawire Value Proposition
More informationVERITAS NetBackup TM 6.0
VERITAS NetBackup TM 6.0 System Administrator s Guide, Volume II for UNIX and Linux N15258B September 2005 Disclaimer The information contained in this publication is subject to change without notice.
More informationTIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13
COURSE TITLE : INFORMATION SECURITY COURSE CODE : 5136 COURSE CATEGORY : ELECTIVE PERIODS/WEEK : 4 PERIODS/SEMESTER : 52 CREDITS : 4 TIME SCHEDULE MODULE TOPICS PERIODS 1 Introduction to Computer Security
More informationBest Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies
Best Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies Reaching a Balance Between Communications and Security
More informationCESG Certification of Cyber Security Training Courses
CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security
More informationEC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.
More informationSCADA SYSTEMS AND SECURITY WHITEPAPER
SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of
More informationPRINCIPLES AND PRACTICE OF INFORMATION SECURITY
PRINCIPLES AND PRACTICE OF INFORMATION SECURITY Protecting Computers from Hackers and Lawyers Linda Volonino, Ph.D. Canisius College Stephen R. Robinson Verity Partners, LLC with contributions by Charles
More informationAn Oracle White Paper June 2011. Oracle Database Firewall 5.0 Sizing Best Practices
An Oracle White Paper June 2011 Oracle Database Firewall 5.0 Sizing Best Practices Introduction... 1 Component Overview... 1 Database Firewall Deployment Modes... 2 Sizing Hardware Requirements... 2 Database
More informationCurran, K. Tutorials. Independent study (including assessment) N/A
MODULE TITLE: MODULE CODE: Systems Security COM535 YEAR OF REVISION: 2013/14 MODULE LEVEL: 6 CREDIT POINTS: 20 MODULE STATUS: SEMESTER: 1 LOCATION: E-LEARNING: PREREQUISITE(S): CO-REQUISITE(S): MODULE
More informationBE SMARTER THAN YOUR LAWYER AND VENTURE CAPITALIST
Venture Deals Venture Deals BE SMARTER THAN YOUR LAWYER AND VENTURE CAPITALIST Second Edition Brad Feld Jason Mendelson John Wiley & Sons, Inc. Cover image: Light Ray TEEKID/iStockPhoto; Ripped Paper
More informationSBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
More informationCOPYRIGHTED MATERIAL. Contents. Foreword. Acknowledgments
Contents Foreword Preface Acknowledgments 1 Introduction 1 1.1 Motivation for Network Convergence 1 1.2 The Core Network 2 1.3 Legacy Service Requirements 4 1.4 New Service Requirements 5 1.5 Architectures
More informationCourse Title: Penetration Testing: Communication Media Testing, 1st Edition
Course Title: Penetration Testing: Communication Media Testing, 1st Edition Page 1 of 6 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad
More informationWireless Network Security
Wireless Network Security Bhavik Doshi Privacy and Security Winter 2008-09 Instructor: Prof. Warren R. Carithers Due on: February 5, 2009 Table of Contents Sr. No. Topic Page No. 1. Introduction 3 2. An
More informationThe following chart provides the breakdown of exam as to the weight of each section of the exam.
Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those
More informationITL BULLETIN FOR JANUARY 2011
ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division
More informationAN INTRODUCTION TO OPTIONS TRADING. Frans de Weert
AN INTRODUCTION TO OPTIONS TRADING Frans de Weert AN INTRODUCTION TO OPTIONS TRADING The Securities & Investment Institute Mission Statement: To set standards of professional excellence and integrity
More informationNetwork Test Labs (NTL) Software Testing Services for igaming
Network Test Labs (NTL) Software Testing Services for igaming Led by committed, young and dynamic professionals with extensive expertise and experience of independent testing services, Network Test Labs
More informationCH ENSA EC-Council Network Security Administrator Detailed Course Outline
CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical
More informationCisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
More informationAn Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks
An Oracle White Paper December 2013 The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks Introduction Today s mobile networks are no longer limited to voice calls. With
More informationBEYOND 401(k)S SMALL BUSINESS OWNERS
BEYOND 401(k)S FOR SMALL BUSINESS OWNERS A Practical Guide to Incentive, Deferred Compensation, and Retirement Plans JEAN D. SIFLEET John Wiley & Sons, Inc. BEYOND 401(k)S FOR SMALL BUSINESS OWNERS BEYOND
More informationSecuring Endpoints without a Security Expert
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Securing Endpoints without a Security Expert sponsored by Introduction to Realtime Publishers by Don Jones, Series
More informationMASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
More informationPreface. Book Origin and Overview
Preface The field of wireless sensor networks continues to evolve and grow in both practical and research domains. More and more wireless sensor networks are being used to gather information in real life
More informationCurrent and Future Research into Network Security Prof. Madjid Merabti
Current and Future Research into Network Security Prof. Madjid Merabti School of Computing & Mathematical Sciences Liverpool John Moores University UK Overview Introduction Secure component composition
More informationMOBILE VIDEO WITH MOBILE IPv6
MOBILE VIDEO WITH MOBILE IPv6 DANIEL MINOLI WILEY A JOHN WILEY & SONS, INC., PUBLICATION CONTENTS PREFACE ABOUT THE AUTHOR xi xiii 1 THE MOBILE USER ENVIRONMENT: SMART PHONES, PORTABLE MEDIA PLAYERS (PMPs),
More informationUsing Web Security Services to Protect Portable Devices
Using Cloud Services to Improve Web Security The Essentials Series Using Web Security Services to Protect Portable Devices sponsored by Us ing Web Security Services to Protect Portable Devices... 1 Understanding
More informationInformation Security Assessment and Testing Services RFQ # 28873 Questions and Answers September 8, 2014
QUESTIONS ANSWERS Q1 How many locations and can all locations be tested from a A1 5 locations and not all tests can be performed from a central location? central location. Q2 Connection type between location
More informationSTUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS SACHIN MALVIYA Student, Department of Information Technology, Medicaps Institute of Science & Technology, INDORE (M.P.)
More informationPCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1
PCI Policy Compliance Using Information Security Policies Made Easy PCI Policy Compliance Information Shield Page 1 PCI Policy Compliance Using Information Security Policies Made Easy By David J Lineman
More informationWHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks
WHITE PAPER The Need for Wireless Intrusion Prevention in Retail Networks The Need for Wireless Intrusion Prevention in Retail Networks Firewalls and VPNs are well-established perimeter security solutions.
More informationOpen Source Toolkit. Penetration Tester's. Jeremy Faircloth. Third Edition. Fryer, Neil. Technical Editor SYNGRESS. Syngrcss is an imprint of Elsevier
Penetration Tester's Open Source Toolkit Third Edition Jeremy Faircloth Neil Fryer, Technical Editor AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS. SAN DIEGO SAN FRANCISCO. SINGAPORE SYDNEY
More informationADTRAN Overview Brochure
C O R P O R A T E O V E R V I E W 1 ADTRAN has been improving telecommunications with smart solutions and innovation for more than 25 years. In the world of broadband, ADTRAN is the reliable business
More informationE-Commerce Operations Management Downloaded from www.worldscientific.com -COMMERCE. by 37.44.207.139 on 06/15/16. For personal use only.
-COMMERCE O p e r a t i o n s M a n a g e m e n t 2nd Edition This page intentionally left blank -COMMERCE O p e r a t i o n s M a n a g e m e n t 2nd Edition Marc J. Schniederjans University of Nebraska-Lincoln,
More informationOutline. IT Security: General Trends and Research Directions. Technical Attacks. Typical attack. Automated attacks via Worms, Trojans, & Viruses
Outline IT Security: General Trends and Research Directions Sherif El-Kassas Department of Computer Science The American University in Cairo Practical considerations Academic and research perspective National
More informationIntroduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
More information