Content text Network Security Final.pdf
3.6.3 Authenticated Encryption ................................................................................................47 3.7 Authentication......................................................................................................................50 3.7.1 Authentication Basics...................................................................................................54 3.7.2 Passwords.....................................................................................................................54 3.7.3 Attacking Passwords.....................................................................................................56 3.7.4 Understanding Authentication, Authorization, and Encryption.................................60 Unit 4 - Security and Protection...........................................................................................................63 4.1 Network Security..................................................................................................................63 4.1.1 Network Infrastructure Analysis..................................................................................68 4.1.2 Encryption and Decryption in Network .......................................................................69 4.1.3 Firewall and its types....................................................................................................72 4.1.4 Wired and Wireless Security........................................................................................79 4.1.5 Virtual Private Network ...............................................................................................80 4.2 System Security ....................................................................................................................84 4.3 Email, Web, and Database Security .....................................................................................87 4.3.1 Email Security:..............................................................................................................87 4.3.2 Web and Database Security .........................................................................................89 4.4 User Security.........................................................................................................................92 4.5.1 Access............................................................................................................................92 4.5.2 Files and devices...........................................................................................................94 4.5.3 Electronic communications..........................................................................................95 4.5 Program security ..................................................................................................................96 4.5.1 Common Security-Related Programming Problems....................................................97 Unit 5 - Threats, Assessment and Solutions......................................................................................100 5.1 Malware..............................................................................................................................101 5.1.1 Introduction................................................................................................................101 5.1.2 How can I tell if I have a malware infection?.............................................................101 5.1.3 How do I get malware? ..............................................................................................102 5.1.4 Types of Malwares......................................................................................................103 5.1.5 Defenses......................................................................................................................104 5.2 Vulnerability Analysis (Assessment)..................................................................................106 5.2.1 Penetration Studies....................................................................................................107 5.2.2 Vulnerability Classifications.......................................................................................109 5.3 Auditing ..............................................................................................................................110 5.3.1 What is a Network Security Audit?............................................................................111 5.3.2 How is Network Security Audit performed? / Designing an Auditing System .........112
5.3.3 Examples: Auditing File Systems................................................................................114 5.4 Intrusion Detection.............................................................................................................115 5.4.1 What is an Intrusion Detection System?....................................................................115 5.4.2 Classification/Organization of Intrusion Detection System (IDS) .............................115 5.4.3 Detection Method of IDS............................................................................................118 5.5 Attacks and Responses.......................................................................................................118 5.5.1 Attacks and Representing Attacks..............................................................................118 5.5.2 Intrusion Response.....................................................................................................121 5.5.3 Digital Forensics..........................................................................................................122