فهرست مطالب :
Cover......Page 1
Contents......Page 6
Preface......Page 11
About the Author......Page 17
Chapter 1 Introduction......Page 18
1.1 Computer Security Concepts......Page 21
1.2 The OSI Security Architecture......Page 25
1.3 Security Attacks......Page 26
1.4 Security Services......Page 28
1.5 Security Mechanisms......Page 32
1.6 Fundamental Security Design Principles......Page 33
1.7 Attack Surfaces and Attack Trees......Page 37
1.8 A Model for Network Security......Page 40
1.10 Key Terms, Review Questions, and Problems......Page 43
Chapter 2 Symmetric Encryption and Message Confidentiality......Page 46
2.1 Symmetric Encryption Principles......Page 47
2.2 Symmetric Block Encryption Algorithms......Page 53
2.3 Random and Pseudorandom Numbers......Page 60
2.4 Stream Ciphers and RC4......Page 64
2.5 Cipher Block Modes of Operation......Page 69
2.6 Key Terms, Review Questions, and Problems......Page 74
Chapter 3 Public-Key Cryptography and Message Authentication......Page 79
3.1 Approaches to Message Authentication......Page 80
3.2 Secure Hash Functions......Page 85
3.3 Message Authentication Codes......Page 92
3.4 Public-Key Cryptography Principles......Page 97
3.5 Public-Key Cryptography Algorithms......Page 101
3.6 Digital Signatures......Page 110
3.7 Key Terms, Review Questions, and Problems......Page 113
Chapter 4 Key Distribution and User Authentication......Page 120
4.1 Remote User Authentication Principles......Page 121
4.2 Symmetric Key Distribution Using Symmetric Encryption......Page 124
4.3 Kerberos......Page 125
4.4 Key Distribution Using Asymmetric Encryption......Page 138
4.5 X.509 Certificates......Page 140
4.6 Public-Key Infrastructure......Page 147
4.7 Federated Identity Management......Page 150
4.8 Key Terms, Review Questions, and Problems......Page 156
Chapter 5 Network Access Control and Cloud Security......Page 161
5.1 Network Access Control......Page 162
5.2 Extensible Authentication Protocol......Page 165
5.3 IEEE 802.1X Port-Based Network Access Control......Page 169
5.4 Cloud Computing......Page 171
5.5 Cloud Security Risks and Countermeasures......Page 177
5.6 Data Protection in the Cloud......Page 179
5.7 Cloud Security as a Service......Page 183
5.8 Addressing Cloud Computing Security Concerns......Page 186
5.9 Key Terms, Review Questions, and Problems......Page 187
Chapter 6 Transport-Level Security......Page 188
6.1 Web Security Considerations......Page 189
6.2 Transport Layer Security......Page 191
6.3 HTTPS......Page 208
6.4 Secure Shell (SSH)......Page 209
6.5 Key Terms, Review Questions, and Problems......Page 221
Chapter 7 Wireless Network Security......Page 223
7.1 Wireless Security......Page 224
7.2 Mobile Device Security......Page 227
7.3 IEEE 802.11 Wireless LAN Overview......Page 231
7.4 IEEE 802.11i Wireless LAN Security......Page 237
7.5 Key Terms, Review Questions, and Problems......Page 252
Chapter 8 Electronic Mail Security......Page 254
8.1 Internet Mail Architecture......Page 255
8.2 E-mail Formats......Page 259
8.3 E-mail Threats and Comprehensive E-mail Security......Page 267
8.4 S/MIME......Page 269
8.5 Pretty Good Privacy......Page 280
8.6 DNSSEC......Page 281
8.7 DNS-Based Authentication of Named Entities......Page 285
8.8 Sender Policy Framework......Page 287
8.9 DomainKeys Identified Mail......Page 290
8.10 Domain-Based Message Authentication, Reporting, and Conformance......Page 296
8.11 Key Terms, Review Questions, and Problems......Page 301
Chapter 9 IP Security......Page 303
9.1 IP Security Overview......Page 304
9.2 IP Security Policy......Page 310
9.3 Encapsulating Security Payload......Page 315
9.4 Combining Security Associations......Page 323
9.5 Internet Key Exchange......Page 326
9.6 Cryptographic Suites......Page 334
9.7 Key Terms, Review Questions, and Problems......Page 336
Chapter 10 Malicious Software......Page 338
10.1 Types of Malicious Software (Malware)......Page 339
10.2 Advanced Persistent Threat......Page 342
10.3 Propagation—Infected Content—Viruses......Page 343
10.4 Propagation—Vulnerability Exploit—Worms......Page 348
10.5 Propagation—Social Engineering—Spam E-mail, Trojans......Page 354
10.6 Payload—System Corruption......Page 356
10.7 Payload—Attack Agent—Zombie, Bots......Page 357
10.8 Payload—Information Theft—Keyloggers, Phishing, Spyware......Page 358
10.9 Payload—Stealthing—Backdoors, Rootkits......Page 360
10.10 Countermeasures......Page 361
10.11 Distributed Denial of Service Attacks......Page 368
10.12 Key Terms, Review Questions, and Problems......Page 373
Chapter 11 Intruders......Page 376
11.1 Intruders......Page 377
11.2 Intrusion Detection......Page 382
11.3 Password Management......Page 397
11.4 Key Terms, Review Questions, and Problems......Page 407
Chapter 12 Firewalls......Page 411
12.1 The Need for Firewalls......Page 412
12.2 Firewall Characteristics and Access Policy......Page 413
12.3 Types of Firewalls......Page 415
12.4 Firewall Basing......Page 421
12.5 Firewall Location and Configurations......Page 424
12.6 Key Terms, Review Questions, and Problems......Page 429
Appendix A Some Aspects of Number Theory......Page 433
A.1 Prime and Relatively Prime Numbers......Page 434
A.2 Modular Arithmetic......Page 436
Appendix B Projects for Teaching Network Security......Page 438
B.1 Research Projects......Page 439
B.3 Programming Projects......Page 440
B.6 Firewall Projects......Page 441
B.9 Reading/Report Assignments......Page 442
References......Page 443
Credits......Page 449
B......Page 451
C......Page 452
D......Page 453
F......Page 454
I......Page 455
K......Page 456
M......Page 457
P......Page 458
R......Page 459
S......Page 460
V......Page 461
X......Page 462