Selected Topics


Click here to start

Table of Contents

PPT Slide

Selected Topics

“Internet” vs. "Intranet"


Secure Computers and Networks

Security Questions

What’s the “Security” Problem?

What’s the “Security” Problem? (cont.)

How Big Is The Problem?

Measuring Risk

Case Study: DoD Vulnerability

Types of Security Breaches

...And a Proliferation of Tools

Security and Internet Commerce

Commerce Over the Internet?

...And A Recurring Theme

Site Security

Protecting Physical Assets

ADSL and Cable Modems

Site Security Handbook

Local Security Policies

User Security Handbook


Alternatives to Passwords


Is the Internet Unsecure?

Is the Internet Unsecure? (cont.)

TCP/IP (v4) Protocol Suite

TCP/IP Protocol Insecurity

TCP/IP Protocol Vulnerabilities

TCP/IP Application Vulnerabilities

SMURF DoS Attack

E-Mail Vulnerabilities

Web/Browser Vulnerabilities

Cookies and IE5

UNIX Overview

Some UNIX Weaknesses

Unix Security Tools (or Weapons)



Windows NT Overview

NT's C2 Security Mechanisms

Windows NT Security Architecture

Windows NT Security Tools

Back Orifice/Back Orifice 2000


Firewall Philosophies

Firewalls and Security Policies

Private Communication and Transactions on the Internet

Hash Functions

Hashing: UNIX Password File

Secret Key Cryptography

Public Key Cryptography

Sample Application

PGP: Signatures

PGP: Encryption

A Few Words About DES...

Secure Communication Protocols


Certificates in Real-Life...

Sample Browser Certificate

Certificate Chain


Security Measures Being Employed

For More Information...

Questions? Comments? Queries?

Acronyms and Abbreviations

Acronyms and Abbreviations (cont.)

Author: Gary C. Kessler

Home Page: ../index.htm