Security Engineering: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
'''Abstract:''' As a user of the Internet, you are fortunate to be tied into the world's greatest communication and information exchange - but not without a price. As a result of this connection, your computer, your organization's network, and everywhere the network reaches are all vulnerable to potentially disastrous infiltration by hackers. [W. Cheswick. Firewalls and Internet Security] |
|||
---- |
|||
*[[Security Concerns]] (Authenticity, Integrity, Privacy, Non-Repudiation) |
*[[Security Concerns]] (Authenticity, Integrity, Privacy, Non-Repudiation) |
||
*[[Passwords]] |
*[[Passwords]] |
Revision as of 17:08, 18 October 2004
Abstract: As a user of the Internet, you are fortunate to be tied into the world's greatest communication and information exchange - but not without a price. As a result of this connection, your computer, your organization's network, and everywhere the network reaches are all vulnerable to potentially disastrous infiltration by hackers. [W. Cheswick. Firewalls and Internet Security]
- Security Concerns (Authenticity, Integrity, Privacy, Non-Repudiation)
- Passwords
- Access Control
- Attack Types (Denial of Service, Man in the Middle)
- Encryption Algorithms (DES, RSA)
- Distributed Systems
- Digital Certificates and Digital Signatures
- Authentication Mechanisms
- Monitoring Systems
- Emission Security
- Copyright Protection (Digital Rights Management - DRM)
- Secure Documents (PDF, EFS/Windows)
- Security in E-Commerce Systems
- Biometry
- Network Attack & Defense (Introduction, Defense against Network Attacks, Trojans, Viruses, Intrusion Detection, chkrootkit, Nessus)