版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
Network
SecurityEssentialsApplications
and
StandardsThird
Edition12This
book
is
adapted
from
Cryptography
andNetwork
Security,
Fourth
Edition.Objectives
of
This
Book:Provide
a
practical
survey
of
network
securityapplications
and
standards.
The
emphasis
onapplications
that
are
widely
used
on
the
Internetand
for
corporate
networks,
and
on
standards,especially
Internet
standards,
that
have
beenwidely
deployed.3The
book
is
organized
in
three
Parts:
Part
One—Cryptography:A
concise
survey
ofthe
cryptographic
algorithms
and
protocolsunderlying
network
securityapplications,including
encryption,
hashfunctions,
digital
signatures,
and
key
exchange
Part
Two
—
Network
Security
Applications:Covers
important
network
security
tools
and4applications,
including
Kerberos,
X.509v3certificates,
PGP,
S/MIME,
IP
Security,SSL/TLS,
SET,
and
SNMPv3
Part
Three
—
System
Security:
Look
atsystem-level
security
issues,
including
thethreat
of
and
countermeasures
for
intrudersand
virus,
and
the
use
of
firewalls
and
trustedsystems5Chapter
1Introduction6OutlineSecurity
trendsTheOSI
security
architectureSecurity
attacksSecurity
servicesSecurity
mechanismsMethods
of
DefenseA
model
for
network
SecurityInternet
standards
and
RFCs1.1
Security
Trends7891.2
The
OSI
Security
ArchitectureThe
OSI
security
architecture
focuses
on
securityattacks,
mechanisms,
and
services.
Security
Attack:
Any
action
that
compromises
thesecurity
of
information.
Security
Mechanism:
A
mechanism
that
is
designed
todetect,
prevent,
or
recover
from
asecurity
attack.
Security
Service:
A
service
thatenhancesthesecurity
of
data
processing
systemsand
informationtransfers.
A
security
service
makes
use
of
one
ormore
security
mechanisms.101.3
Security
AttacksPassive
attacks:
attempts
to
learn
or
make
use
ofinformation
from
the
system
but
does
not
affectsystem
resources.
They
are
in
the
nature
ofeavesdroppingon
,
or
monitoring
of
,transmissions.
Thegoal
of
the
opponent
is
to
obtain
information
that
isbeing
transmitted.
Two
types
of
passive
attacks
areRelease
of
message
contentTraffic
analysis1112Active
attacks:
attempts
to
alter
system
resources
oraffect
their
operation.
Involve
some
modification
ofthe
data
stream
or
the
creation
of
a
false
stream
andcan
be
subdivided
into
four
categories:MasqueradeReplayModification
of
messagesDenial
of
service
(DoS)131415Passive
attacks
are
very
difficult
to
detect,
theemphasis
in
dealing
with
passive
attacks
is
onprevention
rather
than
detection.Active
attacks
are
quite
difficult
to
prevent,
insteadthe
goal
is
to
detect
them
and
to
recover
from
anydisruption
or
delays
caused
by
them.16
Interruption:
This
is
an
attack
onavailability
Interception:
This
is
an
attack
onconfidentialityModification:
This
is
an
attack
on
integrity
Fabrication:
This
is
an
attack
onauthenticity171.4
Security
ServicesX800
defines
a
security
service
that
is
providedby
a
protocol
layer
of
communicating
open
systemsand
ensures
adequate
security
of
the
systems
or
ofdata
transfers.RFC
2828
provides
the
following
definition:
aprocessing
or
communication
service
that
is
provideby
a
system
to
give
a
specific
kind
of
protection
tosystem
resources.18Security
services
implement
security
policies
anare
implemented
by
security
mechanisms.X800
divides
security
services
into
fivecategories
and
fourteen
specific
services.(1)
Authenticationpeer
entity
authenticationdata
origin
authenticationAccess
controlData
confidentiality19Data
integrityNonrepudiationAvailability
serviceSecurity
GoalsIntegrity20ConfidentialityAvaliability211.5
Security
MechanismsSecurity
mechanism
are
divided
into
those
that
areimplemented
in
a
specific
protocol
layer
and
those
thare
not
specific
to
any
particular
protocol
layer
orsecurity
service.X800
distinguishes
between
reversible
enciphermenmechanisms
and
irreversible
encipherment
mechanisms.1.6
A
Model
for
Network
Security222324The
security
mechanisms
needed
tocope
with
unwanted
access
fall
into
twobroad
categories:(1)
A
gatekeeper
function(2)
Screening
logic25Methods
of
DefenceEncryption
Software
Controls
(access
limitations
in
adata
base,
in
operating
system
protecteach
user
from
other
users)HardwareControls
(smartcard)Policies(frequent
changes
ofpasswords)PhysicalControls261.7
Internet
Standards
and
theInternet
SocietyThe
Internet
societyInternet
Architecture
Board
(IAB)Internet
Engineering
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025至2031年中国速冻甜玉米仁行业投资前景及策略咨询研究报告
- 2025至2030年中国防滑EVA底露趾毛巾拖鞋数据监测研究报告
- 2025至2030年中国磁选机数据监测研究报告
- 2025至2030年中国变速器支承数据监测研究报告
- 二零二五年度个人心理咨询合同范本下载心理健康护航2篇
- 2025版水电站消防安全检测与维护保养合同范本3篇
- 二零二五年度城市供水供电综合保障服务合同3篇
- 二零二五年度城市社区蔬菜直供购销协议2篇
- 企业聘用合同书
- 课外实践与课堂教育结合开启学生生涯教育新篇章
- 初中公寓主任述职报告
- 中国绿色食品市场调查与分析报告
- 九年级下册沪教版上海化学5.2酸和碱的性质研究 课件
- ISO17025经典培训教材
- 手卫生依从性调查表
- 湖北教育出版社四年级下册信息技术教案
- 背景调查报告
- 五年级语文下册全册教材分析
- 业主委员会成员推荐表
- 九年级下册-2023年中考历史总复习知识点速查速记(部编版)
- GB/T 18103-2022实木复合地板
评论
0/150
提交评论