CHAPTER 1 INTRODUCTION
1.1 The OSI Security Architecture
1.2 Security Attacks
1.3 Security Services
1.4 Security mechanisms
1.5 A Model for Network Security
1.6 Internet Standards and the Internet Society
1.7 Outline of This Book
1.8 Recommended Reading
1.9 Internet and Web Resources
PART ONE CRYPTOGRAPHY
CHAPTER 2 SYMMETRIC ENCRYPTION AND MESSAGE CONFIDENTIALITY
2.1 Symmetric Encryption Principles
2.2 Symmetric Encryption Algorithms
2.3 Cipher Block Modes of Operation
2.4 Location of Encryption Devices
2.5 Key Distribution
2.6 Recommended Reading and Web Sites
2.7 Key Terms,Review Questions,and Problems
CHAPTER 3 PUBLIC-KEY CRYPTOGRAPHY AND MESSAGE AUTHENTICATION
3.1 Approaches to Message Authentication
3.2 Secure Hash Functions and HMAC
3.3 Public-Key Cryptography Principles
3.4 Public-Key Cryptography Algorithms
3.5 Digital Signatures
3.6 Key Management
3.7 Recommended Reading and Web Sites
3.8 Key Terms,Review Questions,and Problems
PART TWO NETWORK SECURITY APPLICATIONS
CHAPTER 4 AUTHENTICATION APPLICATIONS
4.1 Kerberos
4.2 X.509 Authentication Service
4.3 Recommended Reading and Web Sites
4.4 Key Terms,Review Questions,and Problems
Appendix 4A Kerberos Encryption Techniques
CHAPTER 5 ELECTRONIC MAIL SECURITY
5.1 Pretty Good Privacy
5.2 S/MIME
5.3 Recommended Web Sites
5.4 Key Terms,Review Questions,and Problems
Appendix ** Data Compression Using Zip
Appendix 5B RADIX-64 Conversion
Appendix 5C PGP Random Number Generation
CHAPTER 6 IP SECURITY
6.1 IP Security Overview
6.2 IP Security Architecture
6.3 Authenticastion Header
6.4 Encapsulating Security Payload
6.5 Combining Security Associations
6.6 Key Management
6.7 Recommended Reading and Web Sites
6.8 Key Terms,Review Ouestions,and Problems
Appendix 6A Internetworking and Internet Protocols
CHAPTER 7 WEB SECURITY
7.1 Web Security Considerations
7.2 Secure Socket Layer and Transport Layer Security
7.3 Secure Electronic Transaction
7.4 Recommended Reading and Web Sites
7.5 Key Terms,Review Questions,and Problems
CHAPTER 8 NETWORK MANAGEMENT SECURITY
8.1 Basic Concepts of SNMP
8.2 SNMPv1 Community Facility
8.3 SNMPv3
8.4 Recommended Reading and Web Sites
8.5 Key Terms,Review Questions,and Problems
PART THREE SYSTEM SECURITY
CHAPTER 9 INTRUDERS
9.1 Intruders
9.2 Intrusion Detection
9.3 Password Management
9.4 Recommended Reading and Web Sites
9.5 Key Terms,Review Questions,and Problems
Appendix 9A The Base-Rate Fallacy
CHAPTER 10 MALICIOUS SOFTWARE
10.1 Viruses and Related Threats
10.2 Virus Countermeasures
10.3 Recommended Reading and Web Site
10.4 Key Terms,Review Questions,and Problems
APPENDICES
APPENDIX A STANDARDS CITED IN THIS BOOK
A.1 ANSI Standards
A.2 Internet RFGs
A.3 ITU-T Recommendations
A.4 NIST Federal Information Processing Standards
APPENDIX B SOME ASPECTS OF NUMBER THEORY
B.1 Prime and Relatively Prime Numbers
B.2 Modular Arithmetic
GLOSSARY
REFERENCES
INDEX