Security Engineering: Difference between revisions

From
Jump to navigation Jump to search
No edit summary
 
No edit summary
 
(9 intermediate revisions by 7 users not shown)
Line 1: Line 1:
'''Abstract:''' As a user of the Internet, you are fortunate to be tied into the world's greatest communication and information exchange - but not without a price. As a result of this connection, your computer, your organization's network, and everywhere the network reaches are all vulnerable to potentially disastrous infiltration by hackers. [W. Cheswick. Firewalls and Internet Security]
*[[SecurityConcerns|Security Concerns (Authenticity, Integrity, Privacy, Non-Repudiation)]]

*[[Attack Types]]
----
*[[Denial of Service]]

*[[Man in the Middle]]
*[[Encryption Algorithms]]
*[[Access Control]]
*[[Attack Types ]](Denial of Service, Man in the Middle)
*[[Digital Certificates and Digital Signatures]]
*[[Authentication Mechanisms]]
*[[Authentication Mechanisms]]
*[[Monitoring Systems|Monitoring Systems (Intrusion Detection)]]
*[[Emission Security]]
*[[Copyright Protection|Copyright Protection (DRM)]]
*[[Secure Documents|Secure Documents (PDF, EFS/Windows)]]
*[[Biometry]]
*[[Biometry]]
*[[Copyright Protection]] (Digital Rights Management - DRM)
*[[Distributed Systems]]
*[[Digital Certificates and Digital Signatures]]
*[[Emission Security]]
*[[Encryption Algorithms]] (DES, RSA)
*[[Monitoring Systems]]
*[[Network Attack & Defense]] (Introduction, Defense against Network Attacks, Trojans, Viruses, Intrusion Detection, chkrootkit, Nessus)
*[[Network Attack & Defense II]] (Trojans, Viruses, Intrusion Detection, chkrootkit)
* [[One-Time Passwords]] (ditto)
*[[Passwords]]
*[[Secure Documents]] (PDF, EFS/Windows)
*[[Security Concerns]] (Authenticity, Integrity, Privacy, Non-Repudiation)
*[[Security in E-Commerce Systems]]
*[[Trusting Trust]]
* [[Virtual Private Networks]] (not part of seminar, but on topic)
* [[Software Security]] (not part of seminar, but on topic)

Latest revision as of 14:39, 18 June 2005

Abstract: As a user of the Internet, you are fortunate to be tied into the world's greatest communication and information exchange - but not without a price. As a result of this connection, your computer, your organization's network, and everywhere the network reaches are all vulnerable to potentially disastrous infiltration by hackers. [W. Cheswick. Firewalls and Internet Security]