Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
2Activity

Table Of Contents

1.2 SECURITY SERVICES
1.3 SECURITY MECHANISM
1.4 SECURITY ATTACKS
1.5 HACKERS AND CRACKERS
1.6 COMMON INTRUSION TECHNIQUES
2.1.1 The Security Environment:
2.1.2 The Internet Worm:
2.1.3 Generic Security Attacks:
2.1.4 Design Principles for Security:
2.1.5 User Authentication:
2.2.1 Protection Domains
2.2.2. Protection Models
2.2.3.Covert Channels
2.3. DAC (Discretionary Access Control)
2.4. MANDATORY ACCESS CONTROL
2.5. WINDOWS 2000 AUTHENTICATION
2.6. UNIX AUTHENTICATION
3.1 CRYPTOGRAPHY INTRODUCTION
3.2.1 Conventional Encryption/Private-key Cryptography
3.2.2 Two-key/Public-key Cryptography
3.6 POLYALPHABETIC SUBSTITUTION
3.7 CRYPTANALYSIS
3.8. FIESTEL NETWORKS
3.9.1 Key Scheduling
3.9.2 Plaintext Preparation
3.9.3 DES Core Function
3.9.4 How to use the S-Boxes
3.9.5 Ciphertext Preparation
3.9.6 Encryption and Decryption
3.9.7 Strength of DES
3.10 COMPARISON OF MODERN SYMMETRIC KEY ALGORITHMS
3.11.1 ECB (Electronic Code Book)
3.11.2CBC (Cipher Block Chaining)
3.11.3CFB (Cipher Feed Back)
3.11.4OFB (Output Feed Back)
3.11.5 CTR (Counter)
3.12.1 Comparison of Symmetric Key and Public Key Cryptography
3.13.1 Key Generation
3.13.2 Encrypting messages
3.13.3 Decrypting messages
3.13.4 A working example
3.13.5 Security of RSA
3.13.6 Practical Considerations
3.13.7 Comparison of RSA and DES
3.14.2 Security
3.14.3 Authentication
3.15.1 MAC
3.15.2 HASH Functions
3.16. DIGITAL SIGNATURE
4.1.1 AS Exchange
4.1.2 TGS Exchange
4.1.3 Client/Server Exchange
4.2. X.509
4.3.1 PGP
4.3.2 S/MIME
4.4.1 Session Establishment
4.4.2 Key Exchange Method
4.4.3 Cipher for Data Transfer
4.4.4 SSL Record Protocol - Architecture
4.5.1 Encapsulating Security Payload
4.5.2 Authentication Header
4.5.3 Operating modes
4.6.1 Terminologies
4.6.2 Types of Firewalls
4.7.1 Java Sandbox Architecture
4.7.2 Security Manager
4.7.3 What the Security Manager Is Set Up to Do for Untrusted Applets
5.1. TYPES OF SECURITY
5.2. THREATS TO DATABASES
5.3. DATABASE ADMINISTRATOR (DBA)
5.5. TYPES OF DISCRETIONARY PRIVILEGES
5.6. MANDATORY ACCESS CONTROL FOR MULTILEVEL SECURITY
5.7. INTRODUCTION TO STATISTICAL DATABASE SECURITY
0 of .
Results for:
No results containing your search query
P. 1
Sic

Sic

Ratings: (0)|Views: 38|Likes:

More info:

Published by: Chithra Kaviyappilly on May 18, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less

05/25/2012

pdf

text

original

You're Reading a Free Preview
Pages 4 to 46 are not shown in this preview.
You're Reading a Free Preview
Pages 50 to 103 are not shown in this preview.
You're Reading a Free Preview
Pages 107 to 112 are not shown in this preview.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->