Network Security Topics and Sub-Topics As Per Chapterwise
Network Security Topics and Sub-Topics As Per Chapterwise
CHAPTER 1 - INTRODUCTION
1.1 COMPUTER SECURITY CONCEPTS
A Definition of Computer Security
Examples
o CONFIDENTIALITY
o INTEGRITY
o AVAILABILITY
The Challenges of Computer Security
1.2 THE OSI SECURITY ARCHITECTURE
4.2 KERBEROS
Kerberos Version 4
o A SIMPLE AUTHENTICATION DIALOGUE
o A MORE SECURE AUTHENTICATION DIALOGUE
o THE VERSION 4 AUTHENTICATION DIALOGUE
o KERBEROS REALMS AND MULTIPLE KERBERI
Kerberos Version 5
o DIFFERENCES BETWEEN VERSIONS 4 AND 5
o THE VERSION 5 AUTHENTICATION DIALOGUE
5.4 HTTPS
Connection Initiation
Connection Closure
7.2 S/MIME
RFC 5322
Multipurpose Internet Mail Extensions
o OVERVIEW
o MIME CONTENT TYPES
o MIME TRANSFER ENCODINGS
o MULTIPART EXAMPLE
o CANONICAL FORM
S/MIME Functionality
o CRYPTOGRAPHIC ALGORITHMS
S/MIME Messages
o SECURING A MIME ENTITY
o ENVELOPEDDATA
o SIGNEDDATA
o CLEAR SIGNING
o REGISTRATION REQUEST
o CERTIFICATES-ONLY MESSAGE
S/MIME Certificate Processing
o USER AGENT ROLE
o VERISIGN CERTIFICATES
Enhanced Security Services
CHAPTER 8 - IP SECURITY
8.1 IP SECURITY OVERVIEW
Applications of IPsec
Benefits of IPsec
Routing Applications
IPsec Documents
IPsec Services
Transport and Tunnel Modes
o TRANSPORT MODE
o TUNNEL MODE
CHAPTER 9 – INTRUDERS
9.1 INTRUDERS
Intruder Behavior Patterns
o HACKERS
o CRIMINALS
o INSIDER ATTACKS
Intrusion Techniques
CHAPTER 11 – FIREWALLS
11.1 THE NEED FOR FIREWALLS