APPLICATIONS AND STANDARDS

Similar documents
Network Security Essentials:

CRYPTOGRAPHY AND NETWORK SECURITY

CRYPTOG NETWORK SECURITY

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

Computer Organization

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

The Crossroads of Accounting & IT

Cryptography and network security CNET4523

THE PSYCHOLOGY OF INVESTING

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

BUSINESS INTELLIGENCE

NETWORK ADMINISTRATION AND SECURITY

ENTERPRISE SYSTEMS FOR MANAGEMENT

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

SERVICES MARKETING PEOPLE, TECHNOLOGY, STRATEGY. Global Edition. Christopher Lovelock. Yale University Jochen Wirtz National University of Singapore

EXAM questions for the course TTM Information Security May Part 1

ICTTEN8195B Evaluate and apply network security

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

CONTEMPORARY DIRECT & INTERACTIVE MARKETING

Public Relations in Schools

Performance Management

Social Media Marketing

PART 1: Introduction to MIS 25. 1: Ml! 26 Q7 2021? 43

How To Understand And Understand The Ssl Protocol ( And Its Security Features (Protocol)

Financial Statement Analysis

Chapter 10. Network Security

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Seventh Edition. Judy Strauss Associate Professor of Marketing, University of Nevada, Reno

Network Security Foundations

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

Computer and Network Security PG Unit Outline School of Information Sciences and Engineering

ICOM 5018 Network Security and Cryptography

Chapter 17. Transport-Level Security

Course Outline Computing Science Department Faculty of Science. COMP Credits Computer Network Security (3,1,0) Fall 2015

The x86 PC: Assembly Language, Design, and Interfacing 5 th Edition

BUSINESS AND PROFESSIONAL COMMUNICATION

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

OPERATING SYSTEMS Internais and Design Principles

BUY ONLINE FROM:

CAREER DEVELOPMENT INTERVENTIONS IN THE 21 ST CENTURY

Curran, K. Tutorials. Independent study (including assessment) N/A

Marketin. Global Edition 14

Network Security Fundamentals

CHAINED EXPLOITS Advanced Hacking Attacks from Start to Finish

Designing Interactive Systems

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Chapter 32 Internet Security

Web Security Considerations

Network Security SWISS GERMAN UNIVERSITY. Administration Charles Lim

Gujarat University Syllabus M.Tech (Networking & Communications) II

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Virtual Private Networks

Network Security. Outline of the Tutorial

Customer Relationship. Management. Ed Peelen and Rob Beltman

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Network Security: A Practical Approach. Jan L. Harrington

BlackBerry Enterprise Solution

Using Ml. David M. Kroenke PEARSON

Chapter 7 Transport-Level Security

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Fundamentals of Network Security - Theory and Practice-

Relationship marketing

Network Access Security. Lesson 10

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

Information, Network & Cyber Security

TLS/SSL in distributed systems. Eugen Babinciuc

Chapter 8. Network Security

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Security Technical. Overview. BlackBerry Enterprise Server for Microsoft Exchange. Version: 5.0 Service Pack: 4

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Introduction to Cyber Security / Information Security

Ficha técnica de curso Código: IFCAD111

BlackBerry Enterprise Server 5.0 SP3 and BlackBerry 7.1

Weighted Total Mark. Weighted Exam Mark

BlackBerry Enterprise Solution Security Release Technical Overview

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

Sixth Edition. Global Edition STRATEGY, FLANNING, AND OPERATION. Sunil Chopra. Kellogg School of Management. Peter Meindl.

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill

Eleventh Hour Security+

VALLIAMMAI ENGINEERING COLLEGE

Security + Certification (ITSY 1076) Syllabus

MINT TWELFTH EDITION PEARSON

Transcription:

Л Wj Км 1 WW \я$ I \ 1 \ W La ^и ^J I» I I APPLICATIONS AND STANDARDS FOURTH EDITION William Stallings Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal Toronto Delhi Mexico City Sao Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo

CONTENTS Preface 9 About the Author 14 Chapter 1 Introduction 15 1.1 Computer Security Concepts 17 1.2 The OSI Security Architecture 22 1.3 Security Attacks 23 1.4 Security Services 27 1.5 Security Mechanisms 30 1.6 A Model for Network Security 33 1.7 Standards 35 1.8 Outline of This Book 35 1.9 Recommended Reading 36 1.10 Internet and Web Resources 37 1.11 Key Terms, Review Questions, and Problems 39 PART ONE CRYPTOGRAPHY 41 Chapter 2 Symmetric Encryption and Message Confidentiality 41 2.1 Symmetric Encryption Principles 42 2.2 Symmetric Block Encryption Algorithms 48 2.3 Random and Pseudorandom Numbers 56 2.4 Stream Ciphers and RC4 59 2.5 Cipher Block Modes of Operation 64 2.6 Recommended Reading and Web Sites 69 2.7 Key Terms, Review Questions, and Problems 70 Chapter 3 Public-Key Cryptography and Message Authentication 75 3.1 Approaches to Message Authentication 76 3.2 Secure Hash Functions 81 3.3 Message Authentication Codes 87 3.4 Public-Key Cryptography Principles 93 3.5 Public-Key Cryptography Algorithms 97 3.6 Digital Signatures 104 3.7 Recommended Reading and Web Sites 104 3.8 Key Terms, Review Questions, and Problems 105 PART TWO NETWORK SECURITY APPLICATIONS 111 Chapter 4 Key Distribution and User Authentication 111 4.1 Symmetric Key Distribution Using Symmetric Encryption 112 4.2 Kerberos 113 4.3 Key Distribution Using Asymmetric Encryption 128 4.4 X.509 Certificates 130 4.5 Public-Key Infrastructure 138

6 CONTENTS 4.6 Federated Identity Management 140 4.7 Recommended Reading and Web Sites 146 4.8 Key Terms, Review Questions, and Problems 147 Chapter 5 Transport-Level Security 153 5.1 Web Security Considerations 154 5.2 Secure Socket Layer and Transport Layer Security 157 5.3 Transport Layer Security 170 5.4 HTTPS 174 5.5 Secure Shell (SSH) 176 5.6 Recommended Reading and Web Sites 187 5.7 Key Terms, Review Questions, and Problems 187 Chapter 6 Wireless Network Security 189 6.1 IEEE 802.11 Wireless LAN Overview 191 6.2 IEEE 802. Hi Wireless LAN Security 197 6.3 Wireless Application Protocol Overview 211 6.4 Wireless Transport Layer Security 218 6.5 WAP End-to-End Security 228 6.6 Recommended Reading and Web Sites 231 6.7 Key Terms, Review Questions, and Problems 232 Chapter 7 Electronic Mail Security 235 7.1 Pretty Good Privacy 236 7.2 S/MIME 255 7.3 DomainKeys Identified Mail 271 7.4 Recommended Reading and Web Sites 278 7.5 Key Terms, Review Questions, and Problems 279 Appendix 7A Radix-64 Conversion 280 Chapter 8 IP Security 283 8.1 IP Security Overview 284 8.2 IP Security Policy 290 8.3 Encapsulating Security Payload 295 8.4 Combining Security Associations 302 8.5 Internet Key Exchange 306 8.6 Cryptographic Suites 315 8.7 Recommended Reading and Web Sites 316 8.8 Key Terms, Review Questions, and Problems 317 PART THREE SYSTEM SECURITY 319 Chapter 9 Intruders 319 9.1 Intruders 321 9.2 Intrusion Detection 326 9.3 Password Management 337 9.4 Recommended Reading and Web Sites 347 9.5 Key Terms, Review Questions, and Problems 348 Appendix 9AThe Base-Rate Fallacy 351

CONTENTS 7 Chapter 10 Malicious Software 354 10.1 Types of Malicious Software 355 10.2 Viruses 360 10.3 Virus Countermeasures 365 10.4 Worms 370 10.5 Distributed Denial of Service Attacks 379 10.6 Recommended Reading and Web Sites 384 10.7 Key Terms, Review Questions, and Problems 385 Chapter 11 Firewalls 388 11.1 The Need for Firewalls 389 11.2 Firewall Characteristics 390 11.3 Types of Firewalls 392 11.4 Firewall Basing 399 11.5 Firewall Location and Configurations 402 11.6 Recommended Reading and Web Site 407 11.7 Key Terms, Review Questions, and Problems 408 APPENDICES 412 Appendix A Some Aspects of Number Theory 412 A.l Prime and Relatively Prime Numbers 413 A.2 Modular Arithmetic 415 Appendix В Projects for Teaching Network Security 417 B.l Research Projects 418 B.2 Hacking Project 419 B.3 Programming Projects 419 B.4 Laboratory Exercises 420 B.5 Practical Security Assessments 420 B.6 Writing Assignments 420 B.7 Reading/Report Assignments 421 Index 422 ONLINE CHAPTERS Chapter 12 Network Management Security 12.1 Basic Concepts of SNMP 12.2 SNMPvl Community Facility 12.3 SNMPv3 12.4 Recommended Reading and Web Sites 12.5 Key Terms, Review Questions, and Problems Chapter 13 Legal and Ethical Aspects 13.1 Cybercrime and Computer Crime 13.2 Intellectual Property 13.3 Privacy 13.4 Ethical Issues

8 CONTENTS 13.5 Recommended Reading and Web Sites 13.6 Key Terms, Review Questions, and Problems ONLINE APPENDICES Appendix С Standards and Standards-Setting Organizations C.l The Importance of Standards C.2 Internet Standards and the Internet Society C.3 National Institute of Standards and Technology Appendix D TCP/IP and OSI D.l Protocols and Protocol Architectures D.2 The TCP/IP Protocol Architecture D.3 The Role of an Internet Protocol D.4 IPv4 D.5 IPv6 D.6 The OSI Protocol Architecture Appendix E Pseudorandom Number Generation E.l PRNG Requirements E.2 PRNG Using a Block Cipher E.3 PRNG Using a Hash Function or Message Authentication Code Appendix F Kerberos Encryption Techniques F. 1 Password-to-Key Transformation F.2 Propagating Cipher Block Chaining Mode Appendix G G.l Data Compression Using ZIP Compression Algorithm G.2 Decompression Algorithm Appendix H PGP Random Number Generation H.l True Random Numbers H.2 Pseudorandom Numbers Appendix I Glossary References The International Reference Alphabet