Network Security Essentials:



Similar documents
CRYPTOGRAPHY AND NETWORK SECURITY

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

CRYPTOG NETWORK SECURITY

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Computer Organization

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

The Crossroads of Accounting & IT

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

NETWORK ADMINISTRATION AND SECURITY

ENTERPRISE SYSTEMS FOR MANAGEMENT

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

The Information Security Problem

Cryptography and network security CNET4523

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

THE PSYCHOLOGY OF INVESTING

Curran, K. Tutorials. Independent study (including assessment) N/A

Chapter 17. Transport-Level Security

Chapter 7 Transport-Level Security

CHAINED EXPLOITS Advanced Hacking Attacks from Start to Finish

Information, Network & Cyber Security

Public Relations in Schools

EXAM questions for the course TTM Information Security May Part 1

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

BUSINESS INTELLIGENCE

CONTEMPORARY DIRECT & INTERACTIVE MARKETING

SERVICES MARKETING PEOPLE, TECHNOLOGY, STRATEGY. Global Edition. Christopher Lovelock. Yale University Jochen Wirtz National University of Singapore

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Network Security SWISS GERMAN UNIVERSITY. Administration Charles Lim

Social Media Marketing

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

Content Teaching Academy at James Madison University

Performance Management

ICTTEN8195B Evaluate and apply network security

Detailed Description about course module wise:

PART 1: Introduction to MIS 25. 1: Ml! 26 Q7 2021? 43

Chapter 10. Network Security

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Network Security: A Practical Approach. Jan L. Harrington

Network Security Essentials Chapter 5

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

VALLIAMMAI ENGINEERING COLLEGE

Computer Security (EDA263 / DIT 641)

Course Outline Computing Science Department Faculty of Science. COMP Credits Computer Network Security (3,1,0) Fall 2015

Fundamentals of Network Security - Theory and Practice-

Eleventh Hour Security+

BUSINESS AND PROFESSIONAL COMMUNICATION

Network Security Foundations

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

COSC 472 Network Security

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

How To Understand And Understand The Ssl Protocol ( And Its Security Features (Protocol)

Financial Statement Analysis

Network Security Fundamentals

Introduction to Cyber Security / Information Security

Chapter 15: Security

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Wireless Mobile Internet Security. 2nd Edition

TLS/SSL in distributed systems. Eugen Babinciuc

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Network Access Security. Lesson 10

Network Security. Outline of the Tutorial

Designing Interactive Systems

CAREER DEVELOPMENT INTERVENTIONS IN THE 21 ST CENTURY

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

CompTIA Security+ Certification Study Guide. (Exam SYO-301) Glen E. Clarke. Gravu Hill

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

BUY ONLINE FROM:

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Defending Against Cyber Attacks with SessionLevel Network Security

GSEC GIAC Security. Essentials Certification ONE ALL IN EXAM GUIDE. Ric Messier. Singapore Sydney Toronto

Cyber Attacks. Protecting National Infrastructure Student Edition. Edward G. Amoroso

Network Security - Secure upper layer protocols - Background. Security. Question from last lecture: What s a birthday attack? Dr.

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Customer Relationship. Management. Ed Peelen and Rob Beltman

Chapter 32 Internet Security

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

ICOM 5018 Network Security and Cryptography

Description: Objective: Attending students will learn:

How To Protect Your Data From Attack

6. ecommerce Security and Payment Systems. Alexander Nikov. Teaching Objectives. Video: Online Banking, Is It Secure?

Transcription:

Network Security Essentials: Applications and Standards Fifth Edition William Stallings International Editions contributions by B. R. Chandavarkar National Institute of Technology Karnataka, Surathkal PEARSON Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal Toronto Delhi Mexico City Sao Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo

Contents Online Resources 9 Preface 11 About the Author 17 1 Introduction 19 1.1 Computer Security Concepts 22 1.2 The OSI Security Architecture 26 1.3 Security Attacks 27 1.4 Security Services 29 1.5 Security Mechanisms 33 1.6 A Model for Network Security 34 1.7 Standards 37 1.8 Outline of This Book 37 1.9 Recommended Reading 38 1.10 Internet and Web Resources 38 1.11 Key Terms, Review Questions, and Problems 39 PART ONE CRYPTOGRAPHY 41 2 Symmetric Encryption and Message Confidentiality 41 2.1 Symmetric Encryption Principles 43 2.2 Symmetric Block Encryption Algorithms 48 2.3 Random and Pseudorandom Numbers 54 2.4 Stream Ciphers and RC4 59 2.5 Cipher Block Modes of Operation 64 2.6 Recommended Reading 69 2.7 Key Terms, Review Questions, and Problems 70 3 Public-Key Cryptography and Message Authentication 75 3.1 Approaches to Message Authentication 77 3.2 Secure Hash Functions 81 3.3 Message Authentication Codes 88 3.4 Public-Key Cryptography Principles 94 3.5 Public-Key Cryptography Algorithms 97 3.6 Digital Signatures 105 3.7 Recommended Reading 106 3.8 Key Terms, Review Questions, and Problems 106 PART TWO NETWORK SECURITY APPLICATIONS 113 4 Key Distribution and User Authentication 113 4.1 Symmetric Key Distribution Using Symmetric Encryption 114 4.2 Kerberos 116 4.3 Key Distribution Using Asymmetric Encryption 129

6 CONTENTS 4.4 X.509 Certificates 131 4.5 Public-Key Infrastructure 139 4.6 Federated Identity Management 141 4.7 Recommended Reading 147 4.8 Key Terms, Review Questions, and Problems 148 5 Network Access Control and Cloud Security 153 5.1 Network Access Control 154 5.2 Extensible Authentication Protocol 157 5.3 IEEE 802.1X Port-Based Network Access Control 161 5.4 Cloud Computing 163 5.5 Cloud Security Risks and Countermeasures 170 5.6 Data Protection in the Cloud 172 5.7 Cloud Security as a Service 175 5.8 Recommended Reading 178 5.9 Key Terms, Review Questions, and Problems 179 6 Transport-Level Security 180 6.1 Web Security Considerations 181 6.2 Secure Sockets Layer (SSL) 183 6.3 Transport Layer Security (TLS) 197 6.4 HTTPS 201 6.5 Secure Shell (SSH) 202 6.6 Recommended Reading 213 6.7 Key Terms, Review Questions, and Problems 214 7 Wireless Network Security 216 7.1 Wireless Security 217 7.2 Mobile Device Security 220 7.3 IEEE 802.11 Wireless LAN Overview 224 7.4 IEEE 802.1 li Wireless LAN Security 230 7.5 Recommended Reading 244 7.6 Key Terms, Review Questions, and Problems 245 8 Electronic Mail Security 248 8.1 Pretty Good Privacy (PGP) 249 8.2 S/MIME 257 8.3 DomainKeys Identified Mail (DKIM) 273 8.4 Recommended Reading 280 8.5 Key Terms, Review Questions, and Problems 280 9 IP Security 282 9.1 IP Security Overview 284 9.2 IP Security Policy 288 9.3 Encapsulating Security Payload 294 9.4 Combining Security Associations 301 9.5 Internet Key Exchange 305 9.6 Cryptographic Suites 313 9.7 Recommended Reading 315 9.8 Key Terms, Review Questions, and Problems 315

CONTENTS 7 PART THREE SYSTEM SECURITY 317 10 Malicious Software 317 10.1 Types of Malicious Software (Malware) 318 10.2 Propagation Infected Content Viruses 321 10.3 Propagation Vulnerability Exploit Worms 326 10.4 Propagation Social Engineering SPAM E-mail, Trojans 331 10.5 Payload System Corruption 333 10.6 Payload Attack Agent Zombie, Bots 334 10.7 Payload Information Theft Keyloggers, Phishing, Spyware 336 10.8 Payload Stealthing Backdoors, Rootkits 337 10.9 Countermeasures 339 10.10 Distributed Denial of Service Attacks 345 10.11 Recommended Reading 350 10.12 Key Terms, Review Questions, and Problems 351 11 Intruders 354 11.1 Intruders 356 11.2 Intrusion Detection 360 11.3 Password Management 375 11.4 Recommended Reading 386 11.5 Key Terms, Review Questions, and Problems 387 12 Firewalls 391 12.1 The Need for Firewalls 392 12.2 Firewall Characteristics 393 12.3 Types of Firewalls 395 12.4 Firewall Basing 401 12.5 Firewall Location and Configurations 404 12.6 Recommended Reading 409 12.7 Key Terms, Review Questions, and Problems 409 APPENDICES 395 Appendix A Some Aspects of Number Theory 413 A.l Prime and Relatively Prime Numbers 414 A. 2 Modular Arithmetic 416 Appendix B Projects for Teaching Network Security 418 B. l Research Projects 419 B.2 Hacking Project 420 B.3 Programming Projects 420 B.4 Laboratory Exercises 421 B.5 Practical Security Assessments 421 B.6 Firewall Projects 421 B.7 Case Studies 422 B.8 Writing Assignments 422 B.9 Reading/Report Assignments 422 References 423 Credits 430 Index 434

' 8 CONTENTS ONLINE CHAPTERS AND APPENDICES1 13 Network Management Security 13.1 Basic Concepts of SNMP 13.2 S 13.3 SNMPv3 SNMPvl Community Facility 13.4 Recommended Reading 13.5 Key Terms, Review Questions, and Problems 14 Legal and Ethical Issues 14.1 Cybercrime and Computer Crime 14.2 Intellectual Property 14.3 Privacy 14.4 Ethical Issues 14.5 Recommended Reading 14.6 Key Terms, Review Questions, and Problems 15 SHA-3 15.1 Evaluation Criteria for SHA-3 15.2 The SHA-3 Algorithm ^ 15.3 Recommended Reading 15.4 Key Terms and Review Questions Appendix C Standards and Standards-Setting Organizations Appendix D Appendix E Appen dix F TCP/IP and OSI Pseudorandom Number Generation Kerberos Encryption Techniques Appendix G Data Compression Using ZIP G.l Compression Algorithm G. 2 Decompression Algorithm Appendix H H.l More on PGP True Random Numbers H.2 Pseudorandom Numbers H.3 Cryptographic Keys and Key Rings H.4 Public-Key Management Appendix I The International Reference Alphabet Appendix J Appendix K The Base-Rate Fallacy Radix-64 Conversion Glossary List of acronyms 1Online chapters, appendices, and other documents are Premium Content, available via the access card at the front of this book