Network Security Essentials: Applications and Standards Fifth Edition William Stallings International Editions contributions by B. R. Chandavarkar National Institute of Technology Karnataka, Surathkal PEARSON Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal Toronto Delhi Mexico City Sao Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo
Contents Online Resources 9 Preface 11 About the Author 17 1 Introduction 19 1.1 Computer Security Concepts 22 1.2 The OSI Security Architecture 26 1.3 Security Attacks 27 1.4 Security Services 29 1.5 Security Mechanisms 33 1.6 A Model for Network Security 34 1.7 Standards 37 1.8 Outline of This Book 37 1.9 Recommended Reading 38 1.10 Internet and Web Resources 38 1.11 Key Terms, Review Questions, and Problems 39 PART ONE CRYPTOGRAPHY 41 2 Symmetric Encryption and Message Confidentiality 41 2.1 Symmetric Encryption Principles 43 2.2 Symmetric Block Encryption Algorithms 48 2.3 Random and Pseudorandom Numbers 54 2.4 Stream Ciphers and RC4 59 2.5 Cipher Block Modes of Operation 64 2.6 Recommended Reading 69 2.7 Key Terms, Review Questions, and Problems 70 3 Public-Key Cryptography and Message Authentication 75 3.1 Approaches to Message Authentication 77 3.2 Secure Hash Functions 81 3.3 Message Authentication Codes 88 3.4 Public-Key Cryptography Principles 94 3.5 Public-Key Cryptography Algorithms 97 3.6 Digital Signatures 105 3.7 Recommended Reading 106 3.8 Key Terms, Review Questions, and Problems 106 PART TWO NETWORK SECURITY APPLICATIONS 113 4 Key Distribution and User Authentication 113 4.1 Symmetric Key Distribution Using Symmetric Encryption 114 4.2 Kerberos 116 4.3 Key Distribution Using Asymmetric Encryption 129
6 CONTENTS 4.4 X.509 Certificates 131 4.5 Public-Key Infrastructure 139 4.6 Federated Identity Management 141 4.7 Recommended Reading 147 4.8 Key Terms, Review Questions, and Problems 148 5 Network Access Control and Cloud Security 153 5.1 Network Access Control 154 5.2 Extensible Authentication Protocol 157 5.3 IEEE 802.1X Port-Based Network Access Control 161 5.4 Cloud Computing 163 5.5 Cloud Security Risks and Countermeasures 170 5.6 Data Protection in the Cloud 172 5.7 Cloud Security as a Service 175 5.8 Recommended Reading 178 5.9 Key Terms, Review Questions, and Problems 179 6 Transport-Level Security 180 6.1 Web Security Considerations 181 6.2 Secure Sockets Layer (SSL) 183 6.3 Transport Layer Security (TLS) 197 6.4 HTTPS 201 6.5 Secure Shell (SSH) 202 6.6 Recommended Reading 213 6.7 Key Terms, Review Questions, and Problems 214 7 Wireless Network Security 216 7.1 Wireless Security 217 7.2 Mobile Device Security 220 7.3 IEEE 802.11 Wireless LAN Overview 224 7.4 IEEE 802.1 li Wireless LAN Security 230 7.5 Recommended Reading 244 7.6 Key Terms, Review Questions, and Problems 245 8 Electronic Mail Security 248 8.1 Pretty Good Privacy (PGP) 249 8.2 S/MIME 257 8.3 DomainKeys Identified Mail (DKIM) 273 8.4 Recommended Reading 280 8.5 Key Terms, Review Questions, and Problems 280 9 IP Security 282 9.1 IP Security Overview 284 9.2 IP Security Policy 288 9.3 Encapsulating Security Payload 294 9.4 Combining Security Associations 301 9.5 Internet Key Exchange 305 9.6 Cryptographic Suites 313 9.7 Recommended Reading 315 9.8 Key Terms, Review Questions, and Problems 315
CONTENTS 7 PART THREE SYSTEM SECURITY 317 10 Malicious Software 317 10.1 Types of Malicious Software (Malware) 318 10.2 Propagation Infected Content Viruses 321 10.3 Propagation Vulnerability Exploit Worms 326 10.4 Propagation Social Engineering SPAM E-mail, Trojans 331 10.5 Payload System Corruption 333 10.6 Payload Attack Agent Zombie, Bots 334 10.7 Payload Information Theft Keyloggers, Phishing, Spyware 336 10.8 Payload Stealthing Backdoors, Rootkits 337 10.9 Countermeasures 339 10.10 Distributed Denial of Service Attacks 345 10.11 Recommended Reading 350 10.12 Key Terms, Review Questions, and Problems 351 11 Intruders 354 11.1 Intruders 356 11.2 Intrusion Detection 360 11.3 Password Management 375 11.4 Recommended Reading 386 11.5 Key Terms, Review Questions, and Problems 387 12 Firewalls 391 12.1 The Need for Firewalls 392 12.2 Firewall Characteristics 393 12.3 Types of Firewalls 395 12.4 Firewall Basing 401 12.5 Firewall Location and Configurations 404 12.6 Recommended Reading 409 12.7 Key Terms, Review Questions, and Problems 409 APPENDICES 395 Appendix A Some Aspects of Number Theory 413 A.l Prime and Relatively Prime Numbers 414 A. 2 Modular Arithmetic 416 Appendix B Projects for Teaching Network Security 418 B. l Research Projects 419 B.2 Hacking Project 420 B.3 Programming Projects 420 B.4 Laboratory Exercises 421 B.5 Practical Security Assessments 421 B.6 Firewall Projects 421 B.7 Case Studies 422 B.8 Writing Assignments 422 B.9 Reading/Report Assignments 422 References 423 Credits 430 Index 434
' 8 CONTENTS ONLINE CHAPTERS AND APPENDICES1 13 Network Management Security 13.1 Basic Concepts of SNMP 13.2 S 13.3 SNMPv3 SNMPvl Community Facility 13.4 Recommended Reading 13.5 Key Terms, Review Questions, and Problems 14 Legal and Ethical Issues 14.1 Cybercrime and Computer Crime 14.2 Intellectual Property 14.3 Privacy 14.4 Ethical Issues 14.5 Recommended Reading 14.6 Key Terms, Review Questions, and Problems 15 SHA-3 15.1 Evaluation Criteria for SHA-3 15.2 The SHA-3 Algorithm ^ 15.3 Recommended Reading 15.4 Key Terms and Review Questions Appendix C Standards and Standards-Setting Organizations Appendix D Appendix E Appen dix F TCP/IP and OSI Pseudorandom Number Generation Kerberos Encryption Techniques Appendix G Data Compression Using ZIP G.l Compression Algorithm G. 2 Decompression Algorithm Appendix H H.l More on PGP True Random Numbers H.2 Pseudorandom Numbers H.3 Cryptographic Keys and Key Rings H.4 Public-Key Management Appendix I The International Reference Alphabet Appendix J Appendix K The Base-Rate Fallacy Radix-64 Conversion Glossary List of acronyms 1Online chapters, appendices, and other documents are Premium Content, available via the access card at the front of this book