Security Engineering: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
(9 intermediate revisions by 7 users not shown) | |||
Line 1: | Line 1: | ||
'''Abstract:''' As a user of the Internet, you are fortunate to be tied into the world's greatest communication and information exchange - but not without a price. As a result of this connection, your computer, your organization's network, and everywhere the network reaches are all vulnerable to potentially disastrous infiltration by hackers. [W. Cheswick. Firewalls and Internet Security] |
|||
⚫ | |||
*[[Attack Types]] |
|||
---- |
|||
*[[Denial of Service]] |
|||
*[[Man in the Middle]] |
|||
*[[ |
*[[Access Control]] |
||
*[[Attack Types ]](Denial of Service, Man in the Middle) |
|||
⚫ | |||
*[[Authentication Mechanisms]] |
*[[Authentication Mechanisms]] |
||
*[[Monitoring Systems|Monitoring Systems (Intrusion Detection)]] |
|||
⚫ | |||
*[[Copyright Protection|Copyright Protection (DRM)]] |
|||
⚫ | |||
*[[Biometry]] |
*[[Biometry]] |
||
*[[Copyright Protection]] (Digital Rights Management - DRM) |
|||
*[[Distributed Systems]] |
|||
⚫ | |||
⚫ | |||
*[[Encryption Algorithms]] (DES, RSA) |
|||
*[[Monitoring Systems]] |
|||
*[[Network Attack & Defense]] (Introduction, Defense against Network Attacks, Trojans, Viruses, Intrusion Detection, chkrootkit, Nessus) |
|||
*[[Network Attack & Defense II]] (Trojans, Viruses, Intrusion Detection, chkrootkit) |
|||
* [[One-Time Passwords]] (ditto) |
|||
*[[Passwords]] |
|||
⚫ | |||
⚫ | |||
*[[Security in E-Commerce Systems]] |
|||
*[[Trusting Trust]] |
|||
* [[Virtual Private Networks]] (not part of seminar, but on topic) |
|||
* [[Software Security]] (not part of seminar, but on topic) |
Latest revision as of 14:39, 18 June 2005
Abstract: As a user of the Internet, you are fortunate to be tied into the world's greatest communication and information exchange - but not without a price. As a result of this connection, your computer, your organization's network, and everywhere the network reaches are all vulnerable to potentially disastrous infiltration by hackers. [W. Cheswick. Firewalls and Internet Security]
- Access Control
- Attack Types (Denial of Service, Man in the Middle)
- Authentication Mechanisms
- Biometry
- Copyright Protection (Digital Rights Management - DRM)
- Distributed Systems
- Digital Certificates and Digital Signatures
- Emission Security
- Encryption Algorithms (DES, RSA)
- Monitoring Systems
- Network Attack & Defense (Introduction, Defense against Network Attacks, Trojans, Viruses, Intrusion Detection, chkrootkit, Nessus)
- Network Attack & Defense II (Trojans, Viruses, Intrusion Detection, chkrootkit)
- One-Time Passwords (ditto)
- Passwords
- Secure Documents (PDF, EFS/Windows)
- Security Concerns (Authenticity, Integrity, Privacy, Non-Repudiation)
- Security in E-Commerce Systems
- Trusting Trust
- Virtual Private Networks (not part of seminar, but on topic)
- Software Security (not part of seminar, but on topic)