Preface
CHAPTER 1 Introduction
1.1 Attacks,Services,and Mechanisms
1.2 Security Attacks
1.3 Security Services
1.4 A Model for Internetwork Security
1.5 Internet Standards and RFCs
1.6 Recommended Reading
Appendix 1A:Internet and Web Resources
PART ONE CRYPTOGRAPHY
CHAPTER 2 Conventional Encryption and Message Confidentiality
2.1 Conventioanl Encryption Principles
2.2 Conventional Encryption Algorithms
2.3 Cipher Block Modes of Operation
2.4 Location of Encryption Devices
2.5 Key Distribution
2.6 Recommended Reading
2.7 Problems
CHAPTER 3 Public-Key Cryptography and Message Authentication
3.1 Approaches to Message Authentication
3.2 Secure Hash Functions and HMAC
3.3 Public Key Cryptography Principles
3.4 Public-Key Cryptography Algorithms
3.5 Digital Signatures
3.6 Key Management
3.7 Recommended Reading
3.8 Problems
Appendix 3A:Prime Numbers and Modular Arithmetic
PART TWO NETWORK SECURITY APPLICATIONS
CHAPTER 4 Authentication Applications
4.1 Kerberos
4.2 X.509 Directory Authentication Service
4.3 Recommended Reading and Web Sites
4.4 Problems
Appendix 4A:Kerberos Encryption Techniques
CHAPTER 5 Electronic Mail Security
5.1 Pretty Good Privacy(PGP)
5.2 S/MIME
5.3 Recommended Web Sites
5.4 Problems
Appendix 5A:data Compressioin Using ZIP
Appendix 5B:Radix-64 Conversion
Appendix 5C:PGP Random Number Generation
CHAPTER 6 IP Security
6.1 IP Security Overview
6.2 IP Security Architecture
6.3 authentication Header
6.4 Encapsulating Security Payload
6.5 Combining Security Associations
6.6 Key Management
6.7 Recommended Reading and Web Sites
6.8 Problems
Appendix 6A:Internetworking and Internet Protocols
CHAPTER 7 Web Security
7.1 Web Securiyt Requirements
7.2 Secure Sockets Layer(SSL)and Transport Layer Security(TLS)
7.3 Secure Electronic Transaction(SET)
7.4 Recommended Reading and Web Sites
7.5 Problems
CHAPTER 8 Network Management Security
8.1 Basic Concepts of SNMP
8.2 SNMPv1 Community Facility
8.3 SNMPv3
8.4 Recommended Reading and Web Sites
8.5 Problems
PART THREE SYSTEM SECURITY
CHAPTER 9 Intruders and Viruses
9.1 Intruders
9.2 Viruses and Related Threats
9.3 Recommended Reading and Web Sites
9.4 Problems
CHAPTER 10 Firewalls
10.1 Firewall Design Principles
10.2 Trusted Systems
10.3 Recommended Reading
10.4 Problems
APPENDIX A RFCs Cited in this Book
APPENDIX B Projects for Teaching Network Security
B.1 Research Projects
B.2 Programming Projects
B.3 Reading/Report Assignments
GLOSSARY
REFERENCES
INDEX