Network Securities: Applications and Standards provides the following features to facilitate learning: UPDATED! The text includes the most recent innovations in a comprehensive coverage of the field. *UPDATED! Professors in the field have reviewed this book since the last edition to clarify and tighten the narrative and improve illustrations. *NEW! Chapter on network access control includes a general overview of the topic plus discussions of the Extensive Authentication Protocol and IEEE 802.1X. *NEW! Section on cloud security covers the security issues related to cloud computing. *NEW! Online chapter on SHA-3 discusses the new cryptographic hash standard, which was adopted in 2012. *NEW! Section on mobile device security introduces this essential aspect of enterprise network security. *UPDATED! Chapter on malicious software now focuses on backdoor/rootkit malware more commonly installed by social engineering attacks, rather than more classic direct infections like viruses and worms. *NEW! Sample Syllabi guide instructors in using the text for a limited amount of time. *NEW! Learning Objectives begin each chapter.
The text is organized into three parts to help students better retain core subjects *Part I: Cryptography presents a concise survey of the cryptographic algorithms and protocols underlying network security applications, including encryption, hash functions, message authentication, and digital signatures. *Part II: Network Security Applications covers important network security tools and applications such as key distribution, Kerberos, X.509v3 certificates, Extensible Authentication Protocol, S/MIME, IP Security, SSL/TLS, IEEE 802.11i WiFi security, and cloud security. *Part III: System Security looks at system-level security issues including the threat of countermeasures for malicious software and intruders and the use of firewalls.
|
Chapter 1 Introduction 1.1.Computer Security Concepts 1.2.The OSI Security Architecture 1.3.Security Attacks 1.4.Security Services 1.5.Security Mechanisms 1.6.Fundamental Security Design Princples 1.7.Attack Surfaces and Desing Principles 1.8.A Model for Network Security 1.9.Standards 1.10.Key Terms,Review Questions,and Problems
PART ONE CRYPTOGRAPHY Chapter 2 Symmetric Encryption and Message Confidentiality 2.1.Symmetric Encryption Principles 2.2.Symmetric Block Encryption Algorithms 2.3.Random and Pseudorandom Numbers 2.4.Stream Ciphers and RC4 2.5.Cipher Block Modes of Operation 2.6.Recommended Reading 2.7.Key Terms, Review Questions, and Problems Chapter 3 Public-Key Cryptography and Message Authentication 3.1.Approaches to Message Authentication 3.2.Secure Hash Functions 3.3.Message Authentication Codes 3.4.Public Key Cryptography Principles 3.5.Public-Key Cryptography Algorithms 3.6.Digital Signatures 3.7.Key Terms, Review Questions, and Problems
PART TWO NETWORK SECURITY APPLICATIONS Chapter 4 Key Distribution and User Authentication 4.1.Remotc User Authentication Principles 4.2.Symmetric Key Distribution Using Symmetric Encryption 4.3.Kerberos 4.4.Key Distribution Using Asymmetric Encryption 4.5.X.509 Certificates 4.6.Public Key Infrastructure 4.7.Federated Identity Management 4.8.Key Terms, Review Questions, and Problems Chapter 5 Network Access Control and Cloud Security 5.1.Network Access Control 5.2.Extensible Authentication Protocol 5.3.IEEE 802.1X Port-Based Network Access Control 5.4.Cloud Computing 5.5.Cloud Security Risks and Countermeasures 5.6.Data Protection in the Cloud 5.7.Cloud Security as a Service 5.8.Addressing Cloud Computing Security Concerns 5.9.Key Terms, Review Questions, and Problems Chapter 6 Transport-Level Security 6.1.Web Security Considerations 6.2.Transport Layer Security (TLS) 6.3.HTTPS 6.4.Secure Shell (SSH) 6.5.Key Terms, Review Questions, and Problems Chapter 7 Wireless Network Security 7.1.Wireless Security 7.2.Mobile Device Security 7.3.IEEE 802.11 Wireless LAN Overview 7.4.IEEE 802.11i Wireless LAN Security 7.5.Key Terms, Review Questions, and Problems Chapter 8 Electronic Mail Security 8.1.Internet Mail Architecture 8.2.E-mail Formats 8.3.E-mail Threats and Comprehensive E-mail Security 8.4.S/MIME 8.5.Pretty Good Privacy (PGP) 8.6.DNSSEC 8.7.DNS-Based Authentication of Named Entities 8.8.Sender Policy Framework 8.9.DomainKeys Identified Mail (DKIM) 8.10.Domain-Based Message Authentication,Reportig,and Conformance 8.11.Key Terms, Review Questions, and Problems Chapter 9 IP Security 9.1.IP Security Overview 9.2.IP Security Policy 9.3.Encapsulating Security Payload 9.4.Combining Security Associations 9.5.Internet Key Exchange 9.6.Cryptographic Suites 9.7.Key Terms, Review Questions, and Problems
PART THREE SYSTEM SECURITY Chapter 10 Malicious Software 10.1.Types of Malicious Software 10.2.Advanced Persistent Threat 10.3.Propagation - Infected Content - Viruses 10.4.Propagation - Vulnerability Exploit - Worms 10.5.Propagation - Social Engineering - SPAM, Trojans 10.6.Payload - System Corruption 10.7.Payload - Attack Agent - Zombie, Bots 10.8.Payload - Information Theft - Keyloggers, Phishing, Spyware 10.9.Payload Stealthing - Backdoors, Rootkits 10.10.Countermeasures 10.11.Distributed Denial of Service Attacks 10.12.Key Terms, Review Questions, and Problems Chapter 11 Intruders 11.1.Intruders 11.2.Intrusion Detection 11.3.Password Management 11.4.Key Terms, Review Questions, and Problems Chapter 12 Firewalls 12.1.The Need for Firewalls 12.2.Firewall Characteristics 12.3.Types of Firewalls 12.4.Firewall Basing 12.5.Firewall Location and Configurations 12.6.Key Terms, Review Questions, and Problems
|