IEEE Press 445 Hoes Lane Piscataway, NJ IEEE Press Editorial Board Mohamed E. El-Hawary, Editor in Chief

Size: px
Start display at page:

Download "IEEE Press 445 Hoes Lane Piscataway, NJ 08854. IEEE Press Editorial Board Mohamed E. El-Hawary, Editor in Chief"

Transcription

1 Network Security

2 IEEE Press 445 Hoes Lane Piscataway, NJ IEEE Press Editorial Board Mohamed E. El-Hawary, Editor in Chief R. Abari T. G. Croda R. J. Herrick S. Basu S. Farshchi M. S. Newman A. Chatterjee S. V. Kartalopoulos N. Schulz T. Chen B. M. Hammerli Kenneth Moore, Director of IEEE Book and Information Services (BIS) Steve Welch, Acquisitions Editor Jeanne Audino, Project Editor Technical Reviewers Stuart Jacobs, Verizon Lakshmi Raman, CableLabs Broadband Access Department

3 Network Security Current Status and Future Directions Edited by Christos Douligeris Dimitrios N. Serpanos Wiley-Interscience A John Wiley & Sons, Inc., Publication

4 Copyright 2007 by the Institute of Electrical and Electronics Engineers, Inc. All rights reserved. Published by John Wiley & Sons, Inc., Published simultaneously in Canada. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) , fax (978) , or on the web at Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) , fax (201) , or online at Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) , outside the United States at (317) or fax (317) Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic formats. For more information about Wiley products, visit our web site at Wiley Bicentennial Logo: Richard J. Pacifico. Library of Congress Cataloging-in-Publication Data is available. ISBN Printed in the United States of America

5 To Vicky, Pennie, Kostis, Mariada, and our parents Christos Douligeris To Georgia, Loukia, and my parents Dimitrios N. Serpanos

6 Contents Preface Contributors xiii xv 1. Computer Network Security: Basic Background and Current Issues 1 Panayiotis Kotzanikolaou and Christos Douligeris 1.1 Some Terminology on Network Security ISO/OSI Reference Model for Networks Network Security Attacks Mechanisms and Controls for Network Security: Book Overview and Structure 10 References 11 Part One Internet Security 2. Secure Routing 15 Ioannis Avramopoulos, Hisashi Kobayashi, Arvind Krishnamurthy, and Randy Wang 2.1 Introduction Networking Technologies Attacks in Networks State of the Art Conclusion and Research Issues 28 References Designing Firewalls: A Survey 33 Angelos D. Keromytis and Vassilis Prevelakis 3.1 Introduction Firewall Classification Firewall Deployment: Management Conclusions 48 References Security in Virtual Private Networks 51 Srinivas Sampalli 4.1 Introduction VPN Overview VPN Benefits VPN Terminology VPN Taxonomy IPSec Current Research on VPNs Conclusions 61 References IP Security (IPSec) 65 Anirban Chakrabarti and Manimaran Govindarasu 5.1 Introduction IPSec Architecture and Components Benefits and Applications of IPSec Conclusions 81 References IDS for Networks 83 John C. McEachen and John M. Zachary 6.1 Introduction Background Modern NIDSs Research and Trends Conclusions 95 References Intrusion Detection Versus Intrusion Protection 99 Luis Sousa Cardoso 7.1 Introduction Detection Versus Prevention 102 vii

7 viii Contents 7.3 Intrusion Prevention Systems: The Next Step in Evolution of IDS Architecture Matters IPS Deployment IPS Advantages IPS Requirements: What to Look For Conclusions 114 References Denial-of-Service Attacks 117 Aikaterini Mitrokotsa and Christos Douligeris 8.1 Introduction DoS Attacks DDoS Attacks DDoS Defense Mechanisms Conclusions 131 References Secure Architectures with Active Networks 135 Srinivas Sampalli, Yaser Haggag, and Christian Labonte 9.1 Introduction Active Networks SAVE Test bed Adaptive VPN Architecture with Active Networks (SAM) Architecture Conclusions 149 References 150 Part Two Secure Services 10. Security in E-Services and Applications 157 Manish Mehta, Sachin Singh, and Yugyung Lee 10.1 Introduction What Is an E-Service? Security Requirements for E- Services and Applications Security for Future E- Services 175 References Security in Web Services 179 Christos Douligeris and George P. Ninios 11.1 Introduction Web Services Technologies and Standards Web Services Security Standard Conclusions 203 References Secure Multicasting 205 Constantinos Boukouvalas and Anthony G. Petropoulos 12.1 Introduction IP Multicast Application Security Requirements Multicast Security Issues Data Authentication Source Authentication Schemes Group Key Management Group Management and Secure Multicast Routing Secure IP Multicast Architectures Secure IP Multicast Standardization Efforts Conclusions 226 References Voice Over IP Security 229 Son Vuong and Kapil Kumar Singh 13.1 Introduction Security Issues in VoIP Vulnerability Testing Intrusion Detection Systems Conclusions 243 References 245

8 Contents ix 14. Grid Security 247 Kyriakos Stefanidis, Artemios G. Voyiatzis, and Dimitrios N. Serpanos 14.1 Introduction Security Challenges for Grids Grid Security Infrastructure Grid Computing Environments Grid Network Security Conclusions and Future Directions 254 References Mobile Agent Security 257 Panayiotis Kotzanikolaou, Christos Douligeris, Rosa Mavropodi, and Vassilios Chrissikopoulos 15.1 Introduction Taxonomy of Solutions Security Mechanisms for Mobile Agent Systems 264 References 268 Part Three Mobile and Security 16. Mobile Terminal Security 275 Olivier Benoit, Nora Dabbous, Laurent Gauteron, Pierre Girard, Helena Handschuh, David Naccache, Stéphane Socié, and Claire Whelan 16.1 Introduction WLAN and WPAN Security GSM and 3GPP Security Mobile Platform Layer Security Hardware Attacks on Mobile Equipment Conclusion 294 References IEEE Security 297 Daniel L. Lough, David J. Robinson, and Ian G. Schneller 17.1 Introduction Introduction to IEEE Wired Equivalent Privacy Additional IEEE Security Techniques Wireless Intrusion Detection Systems Practical IEEE Security Measures Conclusions 311 References Bluetooth Security 313 Christian Gehrmann 18.1 Introduction Bluetooth Wireless Technology Security Architecture Security Weaknesses and Countermeasures Bluetooth Security: What Comes Next? 327 References Mobile Telecom Networks 331 Christos Xenakis and Lazaros Merakos 19.1 Introduction Architectures Network Security Architectures Research Issues Conclusions 352 References Security in Mobile Ad Hoc Networks 355 Mike Burmester, Panayiotis Kotznanikolaou, and Christos Douligeris 20.1 Introduction Routing Protocols Security Vulnerabilities 360

9 x Contents 20.4 Preventing Attacks in MANETs Trust in MANETs Establishing Secure Routes in a MANET Cryptographic Tools for MANETs 370 References Wireless Sensor Networks 375 Artemios G. Voyiatzis and Dimitrios N. Serpanos 21.1 Introduction Sensor Devices Sensor Network Security Future Directions Conclusions 388 References Trust 391 Lidong Chen 22.1 Introduction What Is a trust Model? How Trust Models Work? Where Trust Can Go Wrong? Why Is It Difficult to Define Trust? Which Lessons Have We Learned? 402 References 403 Part Four Trust, Anonymity, and Privacy 23. PKI Systems 409 Nikos Komninos 23.1 Introduction Origins of Cryptography Overview of PKI Systems Components of PKI Systems Procedures of PKI Systems Current and Future Aspects of PKI Systems Conclusions 416 References Privacy in Electronic Communications 419 Alf Zugenmaier and Joris Claessens 24.1 Introduction Protection from Third Party: Confidentiality Protection from Communication Partner Invasions of Electronic Private Sphere Balancing Privacy with Other Needs Structure of Privacy Conclusion and Future Trends 437 References Securing Digital Content 441 Magda M. Mourad and Ahmed N. Tantawy 25.1 Introduction Securing Digital Content: Need and Challenges Content Protection Techniques Illustrative Application: E- Publishing of E-Learning Content Concluding Remarks 456 References 456 Appendix A. Cryptography Primer: Introduction to Cryptographic Principles and Algorithms 459 Panayiotis Kotzanikolaou and Christos Douligeris A.1 Introduction 459 A.2 Cryptographic Primitives 461 A.3 Symmetric-Key Cryptography 463

10 Contents xi A.4 Asymmetric-Key Cryptography 468 A.5 Key Management 476 A.6. Conclusions and Other Fields of Cryptography 478 References 479 Appendix B. Network Security: Overview of Current Legal and Policy Issues 481 Andreas Mitrakas B.1 Introduction 481 B.2 Network Security as a Legal Requirement 482 B.3 Network Security Policy Overview 484 B.4 Legal Aspects of Network Security 487 B.5 Self-Regulatory Security Frameworks 502 B.6 Conclusions 505 References 505 Appendix C. Standards in Network Security 507 Despina Polemi and Panagiotis Sklavos C.1 Introduction 507 C.2 Virtual Private Networks: Internet Protocol Security (IPSec) 507 C.3 Multicast Security (MSEC) 512 C.4 Transport Layer Security (TLS) 513 C.5 Routing Security 514 C.6 ATM Networks Security 514 C.7 Third-Generation (3G) Mobile Networks 516 C.8 Wireless LAN (802.11) Security 522 C.9 Security 523 C.10 Public-Key Infrastructure (X.509) 526 Index 531 About the Editors and Authors 563

11 Preface Network security is a critical parameter in the increasingly connected (networked) world. Advances in communication systems and protocols, wired and wireless, achieving high speeds, high availability and low cost have enabled the development of high bandwidth backbones and have delivered high throughput to end users of private and public networks. Homes today are able to send and receive high bandwidth, real-time data, enabling high quality communication and a wide range of services. The progress in development, deployment and management of large, reliable networks has resulted not only in the evolution of new services, but to an infrastructure that leads to the provision of a wide range of consumer services that are significantly more cost-effective than traditional ones. It is no surprise that the evolution of all these networks, and especially the Internet a public network is changing the economy worldwide. The continuous deployment of network services over this wide range of public and private networks has led to transactions and services that include personal, and sometimes quite sensitive, data. One only needs to consider simple, everyday services from pay-perview and cable telephony to bill payments by phone, credit card charging and Internet banking. Such services require significant effort not only to protect the sensitive data involved in the transactions and services, but to ensure integrity and availability of network services as well. A typical approach to provide these services and increase security and dependability has been to deploy services over private networks, which are easier to protect than public ones. However, the advent of the Internet has changed electronic business models, providing high flexibility, ease of use, and enabling service deployment with substantially lower cost. Thus, the role of network security is significantly more important in emerging network environments, where even private networks connect to the Internet, in order to exploit its multiple advantages. As the view of traditional distributed systems has changed to a network-centric view in all types of application networks financial, citizen support, military, etc. and as the requirement for employing heterogeneous networks and systems becomes increasingly important, the complexity of these systems has led to significant security flaws and problems. The traditional approach to network service development, using several layers and protocols, together with the lack of systematic methods to design and implement secure end systems leads to vulnerabilities and difficulties in implementing and managing security. Attackers continuously find vulnerabilities at various levels, from the network itself to operating systems, and exploit them to crack systems and services. The result of these phenomena is a significant effort by the research community to address the design and implementation of secure computing systems and networks in order to enable the deployment of secure services. Due to the conventional approaches for service development over such complex, and most often heterogeneous networks and systems, the efforts of the networking community have been several and at various fronts. Thus, currently, there exist several approaches to provide security at various levels and degrees: secure protocols, secure protocol mechanisms, secure services (e.g., phone), firewalls, intrusion detection systems (IDS), etc. xiii

12 xiv Preface This book considers and addresses several aspects of network security, in an effort to provide a publication that summarizes the main current status and the promising and interesting future directions and challenges. The presented approaches are state-of-the-art, described by leaders in the field. They include trends at several fronts, from Internet protocols to firewalls and from mobile systems to IDS systems. The chapters of the book are divided into four main sections which consider the main research challenges of today and the important approaches providing promising results for the future: (a) Internet security, (b) secure services, (c) security in mobile systems and (d) trust, anonymity and privacy. In each part several chapters address the main research results and trends. Importantly, we have included 3 appendices of critical background knowledge for the reader who is new to this important research area; the appendices cover (a) a primer in cryptography, (b) legal aspects and (c) standards in network security. Considering the debate about the increasing importance of security in everyday life and the catastrophic results its illegal and unethical use may bring, we believe that the appendices provide a good basis for readers who are interested in the role, restrictions, and limitations of network security in the emerging globally networked world. In our effort to put this book together, we had the support of several authors, who have written the chapters, providing knowledge and insight through their efforts. The 25 chapters constitute a significant effort on their behalf and we thank them for their efforts. The results of these efforts are a collection of high-quality chapters, which enable the reader to understand the main problems, results, and trends in most aspects of modern network security. Also, we thank the reviewers of the book, who have provided insightful comments and helped improve the presentation and the quality of the book. Finally, we thank IEEE for its support to this effort and its high-quality work in the production of the final result. As the overall effort has taken longer than expected, we also appreciate the patience of the authors until the production of the final book. We certainly hope that the publication will prove to be a useful tool to all readers interested in network security. Patras, Greece March 2007 Christos Douligeris Dimitrios N. Serpanos

13 Contributors Ioannis Avramopoulos Princeton University, Princeton, New Jersey Olivier Benoit Security Labs, Gemalto, La Ciotat, France Constantinos Boukouvalas Research and Development, OTE SA, Athens, Greece Mike Burmester Florida State University, Tallahassee, Florida Luis Sousa Cardoso Portugal Telecom, Lisboa, Portugal Anirban Chakrabarti Department of Electrical and Computer Iowa State University, Ames, Iowa Lidong Chen Computer Security Division, National Institute of Standards and Technology (NIST), Gaithersburg, Maryland Vassilios Chrissikopoulos Department of Archiving and Library Studies, Ionian University, Corfu, Greece Joris Claessens European Microsoft Innovation Center, Aachen, Germany Nora Dabbous Ingenico, Paris, France Christos Douligeris Department of Informatics, University of Piraeus, Laurent Gauteron Security Labs, Gemalto, La Ciotat, France Christian Gehrmann Ericsson Mobile Platforms AB, Lund, Sweden Pierre Girard Security Labs, Gemalto, La Ciotat, France Manimaran Govindarasu Department of Electrical and Computer Iowa State University, Ames, Iowa Yaser Haggag Dalhousie University, Halifax, Canada Helena Handschuh Spansion, Levallois-Perret, France xv

14 xvi Contributors Angelos D. Keromytis Columbia University, New York, New York Hisashi Kobayashi Department of Electrical School of Engineering and Applied Science, Princeton University, Princeton, New Jersey Nikos Komninos Athens Information Technology, Peania, Attiki, Greece Panayiotis Kotzanikolaou Department of Informatics, University of Piraeus, Arvind Krishnamurthy Department of Computer Science and University of Washington, Seattle, Washington Christian Labonte Dalhousie University, Halifax, Canada Yugyung Lee School of Computing University of Missouri Kansas City, Kansas City, Missouri Daniel L. Lough Global Security Consultants, Warrenton, Virginia Rosa Mavropodi Department of Informatics, University of Piraeus, John C. McEachen Department of Electrical and Computer Naval Postgraduate School, Monterey, California Manish Mehta School of Computing University of Missouri Kansas City, Kansas City, Missouri Lazaros Merakos Department of Informatics and Telecommunications, University of Athens, Athens, Greece Andreas Mitrakas European Network and Information Security Agency (ENISA), Heraklion, Greece Aikaterini Mitrokotsa Department of Informatics, University of Piraeus, Magda M. Mourad IBM Thomas J. Watson Research Center, Yorktown Heights, New York David Naccache Université Paris II, Panthéon-Assas, Paris, France George P. Ninios Department of Informatics, University of Piraeus, Anthony G. Petropoulos Department of Informatics, University of Piraeus, Despina Polemi Department of Informatics, University of Piraeus,

15 Contributors xvii Vassilis Prevelakis Drexel University, Philadelphia, Pennsylvania David J. Robinson Global Security Consultants, Odenton, Maryland Snirivas Sampalli Dalhousie University, Halifax, Canada Ian G. Schneller Global Security Consultants, Odenton, Maryland Dimitrios N. Serpanos Department of Electrical and Computer University of Patras, Patras, Greece Kapil Kumar Singh University of British Columbia, Vancouver, Canada Sachin Singh Heartlab, Westerly, Rhode Island Panagiotis Sklavos Technical Department, Expertnet SA, Chalandri, Greece Stéphane Socié Security Labs, Gemalto, La Ciotat, France Ahmed N. Tantawy IBM Thomas J. Watson Research Center, Yorktown Heights, New York Artemios G. Voyiatzis Department of Electrical and Computer University of Patras, Patras, Greece Son Vuong University of British Columbia, Vancouver, Canada Randy Wang Microsoft Research, Bangalore, India Claire Whelan School of Computing, Dublin City University, Dublin, Ireland Christos Xenakis Department of Informatics and Telecommunications, University of Athens, Athens, Greece John M. Zachary Department of Electrical and Computer Naval Postgraduate School, Monterey, California Alf Zugenmaier DoCoMo Euro-Labs, Munich, Germany Kyriakos Stefanidis Department of Electrical and Computer University of Patras, Patras, Greece

NETWORK SECURITY: CURRENT STATUS AND FUTURE DIRECTIONS

NETWORK SECURITY: CURRENT STATUS AND FUTURE DIRECTIONS NETWORK SECURITY: CURRENT STATUS AND FUTURE DIRECTIONS Preface. Contributors. 1. Computer Network Security: Basic Background and Current Issues (Panayiotis Kotzanikolaou and Christos Douligeris). 1.1 Some

More information

Network Security. Current Status and Future Directions

Network Security. Current Status and Future Directions Brochure More information from http://www.researchandmarkets.com/reports/2175769/ Network Security. Current Status and Future Directions Description: A unique overview of network security issues, solutions,

More information

Network Security Current Status and Future Directions

Network Security Current Status and Future Directions Network Security Current Status and Future Directions Edited by Christos Douligeris Dimitrios N. Serpanos Wiley-Interscience A John Wiley & Sons, Inc., Publication Network Security IEEE Press 445 Hoes

More information

Fundamentals of Financial Planning and Management for mall usiness

Fundamentals of Financial Planning and Management for mall usiness E REPRE EUR A F A CE Fundamentals of Financial Planning and Management for mall usiness M.J. Alhabeeb ENTREPRENEURIAL FINANCE The first effective form of investment was realized when the primitive man

More information

www.wileyglobalfinance.com

www.wileyglobalfinance.com Wiley Global Finance is a market-leading provider of over 400 annual books, mobile applications, elearning products, workflow training tools, newsletters and websites for both professionals and consumers

More information

HUMAN RESOURCES MANAGEMENT FOR PUBLIC AND NONPROFIT ORGANIZATIONS

HUMAN RESOURCES MANAGEMENT FOR PUBLIC AND NONPROFIT ORGANIZATIONS HUMAN RESOURCES MANAGEMENT FOR PUBLIC AND NONPROFIT ORGANIZATIONS Essential Texts for Public and Nonprofit Leadership and Management The Handbook of Nonprofit Governance, by BoardSource Strategic Planning

More information

Statistics for Experimenters

Statistics for Experimenters Statistics for Experimenters Design, Innovation, and Discovery Second Edition GEORGE E. P. BOX J. STUART HUNTER WILLIAM G. HUNTER WILEY- INTERSCIENCE A JOHN WILEY & SONS, INC., PUBLICATION FACHGEBIETSBGCHEREI

More information

COVERS ALL TOPICS IN LEVEL I CFA EXAM REVIEW CFA LEVEL I FORMULA SHEETS

COVERS ALL TOPICS IN LEVEL I CFA EXAM REVIEW CFA LEVEL I FORMULA SHEETS 2016 CFA EXAM REVIEW COVERS ALL TOPICS IN LEVEL I LEVEL I CFA FORMULA SHEETS Copyright 2016 by John Wiley & Sons, Inc. All rights reserved. Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Published

More information

Praise for Launch. Hands on and generous, Michael shows you precisely how he does it, step by step. Seth Godin, author of Linchpin

Praise for Launch. Hands on and generous, Michael shows you precisely how he does it, step by step. Seth Godin, author of Linchpin Praise for Launch Launch is your road map to success in an ever-changing world. Stelzner shows you how to enchant your customers so that they ll want to help you change the world. Guy Kawasaki, author

More information

SECURITY AND QUALITY OF SERVICE IN AD HOC WIRELESS NETWORKS

SECURITY AND QUALITY OF SERVICE IN AD HOC WIRELESS NETWORKS SECURITY AND QUALITY OF SERVICE IN AD HOC WIRELESS NETWORKS Ensuring secure transmission and good quality of service (QoS) are key commercial concerns in ad hoc wireless networks as their application in

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions

More information

Wireless Mobile Internet Security. 2nd Edition

Wireless Mobile Internet Security. 2nd Edition Brochure More information from http://www.researchandmarkets.com/reports/2330593/ Wireless Mobile Internet Security. 2nd Edition Description: The mobile industry for wireless cellular services has grown

More information

Graph Analysis and Visualization

Graph Analysis and Visualization Graph Analysis and Visualization Graph Analysis and Visualization DISCOVERING BUSINESS OPPORTUNITY IN LINKED DATA Richard Brath David Jonker Graph Analysis and Visualization: Discovering Business Opportunity

More information

Programming Interviews Exposed: Secrets to Landing Your Next Job

Programming Interviews Exposed: Secrets to Landing Your Next Job Programming Interviews Exposed: Secrets to Landing Your Next Job Preface.... xxv Introduction....xxix Chapter 1 Before the Search... 1 Chapter 2 The Job Application Process....9 Chapter 3 Approaches to

More information

These materials are the copyright of John Wiley & Sons, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.

These materials are the copyright of John Wiley & Sons, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited. Session Border Controllers For Dummies, Sonus Special Edition Published by John Wiley & Sons, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright 2012 by John Wiley & Sons, Inc. Published

More information

Praise for Agile Contracts

Praise for Agile Contracts Agile Contracts Praise for Agile Contracts Agile development is starting to become popular in Japan, though Japanese companies have used all in one contracts for the last three decades. In this movement,

More information

Fundamentals of Mobile and Pervasive Computing

Fundamentals of Mobile and Pervasive Computing Fundamentals of Mobile and Pervasive Computing Frank Adelstein Sandeep K. S. Gupta Golden G. Richard III Loren Schwiebert Technische Universitat Darmstadt FACHBEREICH INFORMATIK B1BLIOTHEK Inventar-Nr.:

More information

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

More information

Brief Solution Description

Brief Solution Description Public Brief Solution Description Aastra MX-ONE V.4.0 integration with Microsoft UC products Aastra Telecom Sweden LM Ericssons väg 30, Hägersten Box 422 14 SE-126 17 Stockholm, Sweden Doc. ASE/MXO/PM/0031/EN

More information

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer Joseph Migga Kizza A Guide to Computer Network Security 4) Springer Contents Part I Understanding Computer Network Security 1 Computer Network Fundamentals 1.1 Introduction 1.2 Computer Network Models

More information

Network Security. Introduction. Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015

Network Security. Introduction. Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015 Network Security Introduction Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015 Objectives - Syllabus 2 Objectives Introduce the key aspects of applied network security,

More information

ARCHITECTING THE CLOUD

ARCHITECTING THE CLOUD ARCHITECTING THE CLOUD Founded in 1807, John Wiley & Sons is the oldest independent publishing company in the United States. With offices in North America, Europe, Asia, and Australia, Wiley is globally

More information

MANAGEMENT OF DATA IN CLINICAL TRIALS

MANAGEMENT OF DATA IN CLINICAL TRIALS MANAGEMENT OF DATA IN CLINICAL TRIALS Second Edition ELEANOR MCFADDEN Frontier Science, Ltd. Kincraig, Inverness-shire, Scotland WILEY-INTERSCIENCE A JOHN WILEY & SONS, INC., PUBLICATION MANAGEMENT OF

More information

Security in Wireless Local Area Network

Security in Wireless Local Area Network Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June

More information

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering Sixth Semester Subject: Network Security & Management Contact Hrs / week: 4 Total hrs: 64 Table of Contents

More information

NICK SMITH AND ROBERT WOLLAN WITH CATHERINE ZHOU. John Wiley & Sons, Inc.

NICK SMITH AND ROBERT WOLLAN WITH CATHERINE ZHOU. John Wiley & Sons, Inc. NICK SMITH AND ROBERT WOLLAN WITH CATHERINE ZHOU John Wiley & Sons, Inc. Copyright # 2011 by Accenture, LLP. All rights reserved. Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Published simultaneously

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION CHAPTER 1 INTRODUCTION 1.0 Introduction Voice over Internet Protocol (VoIP) is the most popular in telecommunication technology. Nowadays, three million users use VoIP. It is estimated that the number

More information

Guide to Wireless Network Security

Guide to Wireless Network Security Guide to Wireless Network Security Guide to Wireless Network Security by John R. Vacca USA Springer John R. Vacca Author and IT Consultant 34679 TR 382 Pomeroy, Ohio 45769 e-mail: jvacca@hti.net http://www.johnvacca.com/

More information

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings Computer Security Principles and Practice Second Edition William Stailings Lawrie Brown University ofnew South Wales, Australian Defence Force Academy With Contributions by Mick Bauer Security Editor,

More information

CRITICAL INFRASTRUCTURE PROTECTION IN HOMELAND SECURITY

CRITICAL INFRASTRUCTURE PROTECTION IN HOMELAND SECURITY CRITICAL INFRASTRUCTURE PROTECTION IN HOMELAND SECURITY CRITICAL INFRASTRUCTURE PROTECTION IN HOMELAND SECURITY DEFENDING A NETWORKED NATION Ted G. Lewis Naval Postgraduate School Monterey, California

More information

DISTRIBUTED SYSTEMS SECURITY

DISTRIBUTED SYSTEMS SECURITY DISTRIBUTED SYSTEMS SECURITY Issues, Processes and Solutions Abhijit Belapurkar, Yahoo! Software Development India Pvt. Ltd., India Anirban Chakrabarti, Infosys Technologies Ltd., India Harigopal Ponnapalli,

More information

Module 1: Introduction to Designing Security

Module 1: Introduction to Designing Security Module 1: Introduction to Designing Security Table of Contents Module Overview 1-1 Lesson 1: Overview of Designing Security for Microsoft Networks 1-2 Lesson 2: Introducing Contoso Pharmaceuticals: A Case

More information

INFORMATION SCIENCE. INFSCI 0010 INTRODUCTION TO INFORMATION SCIENCE 3 cr. INFSCI 0015 DATA STRUCTURES AND PROGRAMMING TECHNIQUES 3 cr.

INFORMATION SCIENCE. INFSCI 0010 INTRODUCTION TO INFORMATION SCIENCE 3 cr. INFSCI 0015 DATA STRUCTURES AND PROGRAMMING TECHNIQUES 3 cr. INFORMATION SCIENCE INFSCI 0010 INTRODUCTION TO INFORMATION SCIENCE 3 cr. Introduction to the concepts, principles, and skills of information science for students with no programming experience. Topics

More information

SIP SECURITY WILEY. Dorgham Sisalem John Floroiu Jiri Kuthan Ulrich Abend Henning Schulzrinne. A John Wiley and Sons, Ltd.

SIP SECURITY WILEY. Dorgham Sisalem John Floroiu Jiri Kuthan Ulrich Abend Henning Schulzrinne. A John Wiley and Sons, Ltd. SIP SECURITY Dorgham Sisalem John Floroiu Jiri Kuthan Ulrich Abend Henning Schulzrinne WILEY A John Wiley and Sons, Ltd., Publication Foreword About the Authors Acknowledgment xi xiii xv 1 Introduction

More information

Analysis of Financial Time Series

Analysis of Financial Time Series Analysis of Financial Time Series Analysis of Financial Time Series Financial Econometrics RUEY S. TSAY University of Chicago A Wiley-Interscience Publication JOHN WILEY & SONS, INC. This book is printed

More information

Secure VoIP for optimal business communication

Secure VoIP for optimal business communication White Paper Secure VoIP for optimal business communication Learn how to create a secure environment for real-time audio, video and data communication over IP based networks. Andreas Åsander Manager, Product

More information

Age and Health Insurance: Pricing Out the Decades of Adult Life Looking at the difference in health insurance premiums between ages 20 and 60.

Age and Health Insurance: Pricing Out the Decades of Adult Life Looking at the difference in health insurance premiums between ages 20 and 60. Age and Health Insurance: Pricing Out the Decades of Adult Life Looking at the difference in health insurance premiums between ages 20 and 60. Contents 2 3 3 4 4 5 6 7 7 8 9 10 11 12 13 14 Table of Contents

More information

Site to Site Virtual Private Networks (VPNs):

Site to Site Virtual Private Networks (VPNs): Site to Site Virtual Private Networks Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0002.01 Prog. Director Mark Ferrar Owner Tim Davis Version 1.0

More information

Practical Support for ISO 900 1 Software Project Documentation

Practical Support for ISO 900 1 Software Project Documentation Practical Support for ISO 900 1 Software Project Documentation IEEE~ COMPUTER SOCIETY +IEEE Press Operating Committee Chair Roger U. Fujii, Vice President Northrop Grumman Mission Systems Editor-in-Chief

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

Effective Methods for Software and Systems Integration

Effective Methods for Software and Systems Integration Effective Methods for Software and Systems Integration Boyd L. Summers CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 CRC Press is an imprint of Taylor

More information

About the Authors Preface Acknowledgements List of Acronyms

About the Authors Preface Acknowledgements List of Acronyms Contents About the Authors Preface Acknowledgements List of Acronyms xiii xv xvii xix Part One Wireless Ad Hoc, Sensor and Mesh Networking 1 1 Introduction 3 1.1 Information Security 4 1.1.1 Computer Security

More information

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0 EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single

More information

230617 - NS - Network Security

230617 - NS - Network Security Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2015 230 - ETSETB - Barcelona School of Telecommunications Engineering 744 - ENTEL - Department of Network Engineering DEGREE IN TELECOMMUNICATIONS

More information

AC 2009-1316: INNOVATIVE NETWORK SECURITY COURSE DEVELOPMENT

AC 2009-1316: INNOVATIVE NETWORK SECURITY COURSE DEVELOPMENT AC 2009-1316: INNOVATIVE NETWORK SECURITY COURSE DEVELOPMENT Hetal Jasani, Northern Kentucky University Dr. Hetal Jasani is an assistant professor in the Department of Computer Science at Northern Kentucky

More information

Recommended 802.11 Wireless Local Area Network Architecture

Recommended 802.11 Wireless Local Area Network Architecture NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless

More information

Tim Bovles WILEY. Wiley Publishing, Inc.

Tim Bovles WILEY. Wiley Publishing, Inc. Tim Bovles WILEY Wiley Publishing, Inc. Contents Introduction xvii Assessment Test xxiv Chapter 1 Introduction to Network Security 1 Threats to Network Security 2 External Threats 3 Internal Threats 5

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Bachelor of Information Technology (Network Security) Course Structure Year 1: Level 100 Foundation knowledge subjects SEMESTER 1 SEMESTER 2 ITICT101A Fundamentals of Computer Organisation ITICT104A Internetworking

More information

Network System Design Lesson Objectives

Network System Design Lesson Objectives Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network

More information

Cybercrimes: A Multidisciplinary Analysis

Cybercrimes: A Multidisciplinary Analysis Sumit Ghosh Elliot Turrini Editors Cybercrimes: A Multidisciplinary Analysis fyj Springer Part I Introducing Cybercrimes 1 A Pragmatic, Experiential Definition of Computer Crimes 3 1.1 Introducing Computer

More information

Information Assurance and Security Technologies for Risk Assessment and Threat Management:

Information Assurance and Security Technologies for Risk Assessment and Threat Management: Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances Te-Shun Chou East Carolina University, USA Information Science REFERENCE Detailed Table of Contents Foreword

More information

Automated Firewall Analytics

Automated Firewall Analytics Automated Firewall Analytics Ehab Al-Shaer Automated Firewall Analytics Design, Configuration and Optimization 123 Ehab Al-Shaer University of North Carolina Charlotte Charlotte, NC, USA ISBN 978-3-319-10370-9

More information

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the Networking Systems Design and Development Lee Chao CRC Press Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an Informa business AN AUERBACH BOOK

More information

CCNA Cisco Associate- Level Certifications

CCNA Cisco Associate- Level Certifications CCNA Cisco Associate- Level Certifications Routing & Switching Security Voice Wireless Advance your network engineering skills in working on complex Cisco network solutions. WWW.FASTLANEUS.COM Cisco CCNA

More information

Network Security Essentials:

Network Security Essentials: Network Security Essentials: Applications and Standards Fifth Edition William Stallings International Editions contributions by B. R. Chandavarkar National Institute of Technology Karnataka, Surathkal

More information

Network Security Administrator

Network Security Administrator Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze

More information

Accessing BlackBerry Data Services Using Wi-Fi Networks

Accessing BlackBerry Data Services Using Wi-Fi Networks Accessing BlackBerry Data Services Using Wi-Fi Networks 2007 Research In Motion Limited. All rights reserved. 2 of 7 Contents Introduction...3 Wi-Fi access to BlackBerry data services...3 Priority for

More information

Datawire Secure Transport Value Proposition

Datawire Secure Transport Value Proposition Transport Value Proposition Contents: What is Transport? Transport is a patented connectivity service Datawire Defined that transports financial transactions securely and reliably over Datawire Value Proposition

More information

VERITAS NetBackup TM 6.0

VERITAS NetBackup TM 6.0 VERITAS NetBackup TM 6.0 System Administrator s Guide, Volume II for UNIX and Linux N15258B September 2005 Disclaimer The information contained in this publication is subject to change without notice.

More information

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13 COURSE TITLE : INFORMATION SECURITY COURSE CODE : 5136 COURSE CATEGORY : ELECTIVE PERIODS/WEEK : 4 PERIODS/SEMESTER : 52 CREDITS : 4 TIME SCHEDULE MODULE TOPICS PERIODS 1 Introduction to Computer Security

More information

Best Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies

Best Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies Best Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies Reaching a Balance Between Communications and Security

More information

CESG Certification of Cyber Security Training Courses

CESG Certification of Cyber Security Training Courses CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security

More information

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.

More information

SCADA SYSTEMS AND SECURITY WHITEPAPER

SCADA SYSTEMS AND SECURITY WHITEPAPER SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of

More information

PRINCIPLES AND PRACTICE OF INFORMATION SECURITY

PRINCIPLES AND PRACTICE OF INFORMATION SECURITY PRINCIPLES AND PRACTICE OF INFORMATION SECURITY Protecting Computers from Hackers and Lawyers Linda Volonino, Ph.D. Canisius College Stephen R. Robinson Verity Partners, LLC with contributions by Charles

More information

An Oracle White Paper June 2011. Oracle Database Firewall 5.0 Sizing Best Practices

An Oracle White Paper June 2011. Oracle Database Firewall 5.0 Sizing Best Practices An Oracle White Paper June 2011 Oracle Database Firewall 5.0 Sizing Best Practices Introduction... 1 Component Overview... 1 Database Firewall Deployment Modes... 2 Sizing Hardware Requirements... 2 Database

More information

Curran, K. Tutorials. Independent study (including assessment) N/A

Curran, K. Tutorials. Independent study (including assessment) N/A MODULE TITLE: MODULE CODE: Systems Security COM535 YEAR OF REVISION: 2013/14 MODULE LEVEL: 6 CREDIT POINTS: 20 MODULE STATUS: SEMESTER: 1 LOCATION: E-LEARNING: PREREQUISITE(S): CO-REQUISITE(S): MODULE

More information

BE SMARTER THAN YOUR LAWYER AND VENTURE CAPITALIST

BE SMARTER THAN YOUR LAWYER AND VENTURE CAPITALIST Venture Deals Venture Deals BE SMARTER THAN YOUR LAWYER AND VENTURE CAPITALIST Second Edition Brad Feld Jason Mendelson John Wiley & Sons, Inc. Cover image: Light Ray TEEKID/iStockPhoto; Ripped Paper

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

COPYRIGHTED MATERIAL. Contents. Foreword. Acknowledgments

COPYRIGHTED MATERIAL. Contents. Foreword. Acknowledgments Contents Foreword Preface Acknowledgments 1 Introduction 1 1.1 Motivation for Network Convergence 1 1.2 The Core Network 2 1.3 Legacy Service Requirements 4 1.4 New Service Requirements 5 1.5 Architectures

More information

Course Title: Penetration Testing: Communication Media Testing, 1st Edition

Course Title: Penetration Testing: Communication Media Testing, 1st Edition Course Title: Penetration Testing: Communication Media Testing, 1st Edition Page 1 of 6 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad

More information

Wireless Network Security

Wireless Network Security Wireless Network Security Bhavik Doshi Privacy and Security Winter 2008-09 Instructor: Prof. Warren R. Carithers Due on: February 5, 2009 Table of Contents Sr. No. Topic Page No. 1. Introduction 3 2. An

More information

The following chart provides the breakdown of exam as to the weight of each section of the exam.

The following chart provides the breakdown of exam as to the weight of each section of the exam. Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those

More information

ITL BULLETIN FOR JANUARY 2011

ITL BULLETIN FOR JANUARY 2011 ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division

More information

AN INTRODUCTION TO OPTIONS TRADING. Frans de Weert

AN INTRODUCTION TO OPTIONS TRADING. Frans de Weert AN INTRODUCTION TO OPTIONS TRADING Frans de Weert AN INTRODUCTION TO OPTIONS TRADING The Securities & Investment Institute Mission Statement: To set standards of professional excellence and integrity

More information

Network Test Labs (NTL) Software Testing Services for igaming

Network Test Labs (NTL) Software Testing Services for igaming Network Test Labs (NTL) Software Testing Services for igaming Led by committed, young and dynamic professionals with extensive expertise and experience of independent testing services, Network Test Labs

More information

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

CH ENSA EC-Council Network Security Administrator Detailed Course Outline CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks

An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks An Oracle White Paper December 2013 The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks Introduction Today s mobile networks are no longer limited to voice calls. With

More information

BEYOND 401(k)S SMALL BUSINESS OWNERS

BEYOND 401(k)S SMALL BUSINESS OWNERS BEYOND 401(k)S FOR SMALL BUSINESS OWNERS A Practical Guide to Incentive, Deferred Compensation, and Retirement Plans JEAN D. SIFLEET John Wiley & Sons, Inc. BEYOND 401(k)S FOR SMALL BUSINESS OWNERS BEYOND

More information

Securing Endpoints without a Security Expert

Securing Endpoints without a Security Expert How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Securing Endpoints without a Security Expert sponsored by Introduction to Realtime Publishers by Don Jones, Series

More information

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

More information

Preface. Book Origin and Overview

Preface. Book Origin and Overview Preface The field of wireless sensor networks continues to evolve and grow in both practical and research domains. More and more wireless sensor networks are being used to gather information in real life

More information

Current and Future Research into Network Security Prof. Madjid Merabti

Current and Future Research into Network Security Prof. Madjid Merabti Current and Future Research into Network Security Prof. Madjid Merabti School of Computing & Mathematical Sciences Liverpool John Moores University UK Overview Introduction Secure component composition

More information

MOBILE VIDEO WITH MOBILE IPv6

MOBILE VIDEO WITH MOBILE IPv6 MOBILE VIDEO WITH MOBILE IPv6 DANIEL MINOLI WILEY A JOHN WILEY & SONS, INC., PUBLICATION CONTENTS PREFACE ABOUT THE AUTHOR xi xiii 1 THE MOBILE USER ENVIRONMENT: SMART PHONES, PORTABLE MEDIA PLAYERS (PMPs),

More information

Using Web Security Services to Protect Portable Devices

Using Web Security Services to Protect Portable Devices Using Cloud Services to Improve Web Security The Essentials Series Using Web Security Services to Protect Portable Devices sponsored by Us ing Web Security Services to Protect Portable Devices... 1 Understanding

More information

Information Security Assessment and Testing Services RFQ # 28873 Questions and Answers September 8, 2014

Information Security Assessment and Testing Services RFQ # 28873 Questions and Answers September 8, 2014 QUESTIONS ANSWERS Q1 How many locations and can all locations be tested from a A1 5 locations and not all tests can be performed from a central location? central location. Q2 Connection type between location

More information

STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS

STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS SACHIN MALVIYA Student, Department of Information Technology, Medicaps Institute of Science & Technology, INDORE (M.P.)

More information

PCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1

PCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1 PCI Policy Compliance Using Information Security Policies Made Easy PCI Policy Compliance Information Shield Page 1 PCI Policy Compliance Using Information Security Policies Made Easy By David J Lineman

More information

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks WHITE PAPER The Need for Wireless Intrusion Prevention in Retail Networks The Need for Wireless Intrusion Prevention in Retail Networks Firewalls and VPNs are well-established perimeter security solutions.

More information

Open Source Toolkit. Penetration Tester's. Jeremy Faircloth. Third Edition. Fryer, Neil. Technical Editor SYNGRESS. Syngrcss is an imprint of Elsevier

Open Source Toolkit. Penetration Tester's. Jeremy Faircloth. Third Edition. Fryer, Neil. Technical Editor SYNGRESS. Syngrcss is an imprint of Elsevier Penetration Tester's Open Source Toolkit Third Edition Jeremy Faircloth Neil Fryer, Technical Editor AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS. SAN DIEGO SAN FRANCISCO. SINGAPORE SYDNEY

More information

ADTRAN Overview Brochure

ADTRAN Overview Brochure C O R P O R A T E O V E R V I E W 1 ADTRAN has been improving telecommunications with smart solutions and innovation for more than 25 years. In the world of broadband, ADTRAN is the reliable business

More information

E-Commerce Operations Management Downloaded from www.worldscientific.com -COMMERCE. by 37.44.207.139 on 06/15/16. For personal use only.

E-Commerce Operations Management Downloaded from www.worldscientific.com -COMMERCE. by 37.44.207.139 on 06/15/16. For personal use only. -COMMERCE O p e r a t i o n s M a n a g e m e n t 2nd Edition This page intentionally left blank -COMMERCE O p e r a t i o n s M a n a g e m e n t 2nd Edition Marc J. Schniederjans University of Nebraska-Lincoln,

More information

Outline. IT Security: General Trends and Research Directions. Technical Attacks. Typical attack. Automated attacks via Worms, Trojans, & Viruses

Outline. IT Security: General Trends and Research Directions. Technical Attacks. Typical attack. Automated attacks via Worms, Trojans, & Viruses Outline IT Security: General Trends and Research Directions Sherif El-Kassas Department of Computer Science The American University in Cairo Practical considerations Academic and research perspective National

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information