Top banner

Thursday, January 21, 2010

Internet Security

Why require a security ? Picking a Security Policy , Strategies for a Secure Network ,
The Ethics of Computer Security, Security Threats and levels, Security Plan (RFC
2196)

Stealing Passwords.
Social Engineering.
Bugs and Backdoors.
Authentication Failures.
Protocol Failures.
Information Leakage.
Exponential Attacks—Viruses and Worms.
Denial-of-Service Attacks.
Botnets.
Active Attacks

What are viruse, Trojan Horse, Worms? How to protect the computer against virus
What is the Structure of viruse?

Kinds of Firewalls.
Packet Filters.
Application-Level Filtering.
Circuit-Level Gateways.
Dynamic Packet Filters.
Distributed Firewalls.
What Firewalls Cannot Do
Filtering Services.
Reasonable Services to Filter.
Digging for Worms.
Packet Filtering
Implementing policies (Default allow , Default Deny ) on proxy

Introduction to Basic encryption and Decryption,
Diffie's Hellman Key Exchange
Concept of Public key and Private key
Digital Signatures

No comments:

Post a Comment