Network Security | Know It All | Complete Guide

Computer networks are typically a shared resource used by many applications representing different interests. The Internet is particularly widely shared, being used by competing businesses, mutually antagonistic governments, and opportunistic criminals. Unless security measures are taken, a network conversation or a distributed application may be compromised by an adversary. Consider some threats to secure use of, for example, the World Wide Web. Suppose you are a customer using a credit card to order an item from a website. An obvious threat is that an adversary would eavesdrop on your network communication, reading your messages to obtain your credit card information. How might that eavesdropping be accomplished? It is trivial on a broadcast network such as an Ethernet, where any node can be confi gured to receive all the message traffi c on that network. Wireless communication can be monitored without any physical connection. More elaborate approaches include wiretapping and planting spy software on any of the chain of nodes involved. Only in the most extreme cases, such as national security, are serious measures taken to prevent such monitoring, and the Internet is not one of those cases. It is possible and practical, however, to encrypt messages so as to prevent an adversary from understanding the message contents. A protocol that does so is said to provide confi dentiality. Taking the concept a step further, concealing the quantity or destination of communication is called traffi c confi dentiality—because merely knowing how much communication is going where can be useful to an adversary in some situations.

Even with confi dentiality there still remain threats for the website customer…

CHAPTER 1 Network Security Overview …
1.1 Cryptographic Tools …
1.2 Key Predistribution…
1.3 Authentication Protocols…
1.4 Secure Systems…
1.5 Firewalls…
1.6 Conclusion…
Further Reading…

CHAPTER 2 Network Attacks …
2.1 Introduction …
2.2 Network Attacks and Security Issues…
2.3 Protection and Prevention…
2.4 Detection…
2.5 Assessment and Response…
2.6 Conclusion…
References…

CHAPTER 3 Security and Privacy Architecture …
3.1 Objectives…
3.2 Background…
3.3 Developing a Security and Privacy Plan…
3.4 Security and Privacy Administration…
3.5 Security and Privacy Mechanisms…
3.6 Architectural Considerations…
3.7 Conclusion…

CHAPTER 4 Network Security Algorithms …

4.1 Searching for Multiple Strings in Packet Payloads…
4.2 Approximate String Matching …
4.3 IP Traceback via Probabilistic Marking…
4.4 IP Traceback via Logging…
4.5 Detecting Worms…
4.6 Conclusion…

CHAPTER 5 Concepts in IP Security …
5.1 The Need for Security…
5.2 Choosing Where to Apply Security…
5.3 Components of Security Models…
5.4 IPsec…
5.5 Transport-Layer Security…
5.6 Securing the Hypertext Transfer Protocol…
5.7 Hashing and Encryption: Algorithms and Keys…
5.8 Exchanging Keys…
Further Reading…

CHAPTER 6 IP Security in Practice …
6.1 IP Security Issues…
6.2 Security Goals…
6.3 Encryption and Authentication Algorithms…
6.4 IPsec: The Protocols…
6.5 IP and IPsec…
6.6 Implementing and Deploying IPsec…
6.7 Conclusion…

CHAPTER 7 Security in Wireless Systems …
7.1 Introduction…
7.2 Security and Privacy Needs of a Wireless System…
7.3 Required Features for a Secured Wireless Communications
System …
7.4 Methods of Providing Privacy and Security in Wireless
Systems …
7.5 Wireless Security and Standards…
7.6 IEEE 802.11 Security…
7.7 Security in North American Cellular/PCS Systems…
7.8 Security in GSM, GPRS, and UMTS…
7.9 Data Security…
7.10 Air Interface Support for Authentication Methods…
7.11 Summary of Security in Current Wireless Systems…
7.12 Conclusion…
References…

CHAPTER 8 Mobile Security and Privacy …
8.1 Security Primer…
8.2 Cellular Network Security…
8.3 Wireless LAN Security…
8.4 Bluetooth Security…

8.5 Ad Hoc Network Security …
8.6 Mobile Privacy…
8.7 Conclusion…
Further Reading…
References…

CHAPTER 9 Optical Network Survivability …
9.1 Basic Concepts…
9.2 Protection in SONET/SDH…
9.3 Protection in IP Networks…
9.4 Why Optical Layer Protection…
9.5 Optical Layer Protection Schemes…
9.6 Interworking between Layers …
9.7 Conclusion…
Further Reading…
References…

CHAPTER 10 Intrusion Response Systems: A Survey …
10.1 Introduction …
10.2 Static Decision-Making Systems…
10.3 Dynamic Decision-Making Systems…
10.4 Intrusion Tolerance through Diverse Replicas…
10.5 Responses to Specifi c Kinds of Attacks…
10.6 Benchmarking Intrusion Response Systems…
10.7 Thoughts on Evolution of IRS Technology…
10.8 Conclusion…
References…

Download PDF

Happy learning!

9 Likes