Attacks, Services, Mechanisms, Security Attacks, Security Services, Model for Network Security
Conventional Encryption and Message Confidentiality
Conventional Encryption Principles, Conventional Encryption Algorithms, Location of Encryption Devices, Key
Distribution
Public Key Cryptography and Message Authentication.
Approaches to Message Authentication, SHA-1, MD5, Public-Key Cryptography Principles, RSA, Digital Signatures,
Key Management
Network Security Applications.
Kerberos Motivation, Kerberos Version 4, PGP Notation, PGP Operational Description
IP Security
IP Security Overview, IP Security Architecture, Authentication Header
Web Security.
Web Security Threats, Web Traffic Security Approaches, Overview of Secure Socket Layer and Transport Layer
Security, Overview of Secure Electronic Transaction
Intruders and Viruses
Intruders, Intrusion Techniques, Password Protection, Password Selection Strategies, Intrusion Detection, Malicious
Programs, Nature of Viruses, Types of Viruses, Macro Viruses, Antivirus Approaches
Firewalls.
Firewall Characteristics, Types of Firewalls, Firewall Configuration