Why require a security ? Picking a Security Policy , Strategies for a Secure Network ,
The Ethics of Computer Security, Security Threats and levels, Security Plan (RFC
2196)
Stealing Passwords.
Social Engineering.
Bugs and Backdoors.
Authentication Failures.
Protocol Failures.
Information Leakage.
Exponential AttacksViruses and Worms.
Denial-of-Service Attacks.
Botnets.
Active Attacks
What are viruse, Trojan Horse, Worms? How to protect the computer against virus
What is the Structure of viruse?
Kinds of Firewalls.
Packet Filters.
Application-Level Filtering.
Circuit-Level Gateways.
Dynamic Packet Filters.
Distributed Firewalls.
What Firewalls Cannot Do
Filtering Services.
Reasonable Services to Filter.
Digging for Worms.
Packet Filtering
Implementing policies (Default allow , Default Deny ) on proxy
Introduction to Basic encryption and Decryption,
Diffie's Hellman Key Exchange
Concept of Public key and Private key
Digital Signatures
No comments:
Post a Comment