Computer And Network Security
1
|
Chap.1 :- Introduction & Security Threats:
1.1 Threats to Security
· Viruses and Worms
·
Intruders
·
Insiders
·
Criminal Organizations
·
Terrorists
|
2
|
·
Information Warfare
1.2 Avenues of
Attack
·
Steps in Attack
1.3 Security Basics
·
Confidentiality
·
Integrity
·
Availability
|
3
|
1.4Types of Attacks
·
Denial of Service(DOS)
·
Backdoors and trapdoors
·
Sniffing
·
Spoofing
|
4
|
·
Man in the Middle
·
Replay
·
TCP/IP Hijacking
|
5
|
·
Phishing attacks
·
Distributed DOS
·
SQL Injection
|
6
|
1.5Malware:
·
Viruses
·
Logic Bombs
|
7
|
Chap.
4 :- Network Security:
4.1
Firewalls
·
Types of Firewalls
·
How Firewall Works
·
Personal Firewall
·
Network Firewall
·
Software Firewall
·
Hardware Firewall
|
8
|
·
Packet Filtering Firewall
·
Design Principles
·
Trusted Systems
|
9
|
·
Kerberos
|
10
|
4.2 Security Topologies:
·
Security Zones
·
DMZ
·
Internet
·
Intranet
|
11
|
·
VLAN
·
Security Implications
·
Tunneling
|
12
|
4.3 IP Security:
·
Overview
·
Architecture
|
13
|
·
IPSec Configuration
·
IPSec Security
|
14
|
4.4 Email
Security:
·
Security of Email Transmission
·
Malicious Code
|
15
|
·
SPAM
·
Mail Encryption
|
Sign up here with your email
ConversionConversion EmoticonEmoticon