Selected Topics

11/26/99


Click here to start


Table of Contents

PPT Slide

Selected Topics

“Internet” vs. "Intranet"

"Extranet"

Secure Computers and Networks

Security Questions

What’s the “Security” Problem?

What’s the “Security” Problem? (cont.)

How Big Is The Problem?

Measuring Risk

Case Study: DoD Vulnerability

Types of Security Breaches

...And a Proliferation of Tools

Security and Internet Commerce

Commerce Over the Internet?

...And A Recurring Theme

Site Security

Protecting Physical Assets

ADSL and Cable Modems

Site Security Handbook

Local Security Policies

User Security Handbook

Passwords

Alternatives to Passwords

Viruses

Is the Internet Unsecure?

Is the Internet Unsecure? (cont.)

TCP/IP (v4) Protocol Suite

TCP/IP Protocol Insecurity

TCP/IP Protocol Vulnerabilities

TCP/IP Application Vulnerabilities

SMURF DoS Attack

E-Mail Vulnerabilities

Web/Browser Vulnerabilities

Cookies and IE5

UNIX Overview

Some UNIX Weaknesses

Unix Security Tools (or Weapons)

nmap

queso

Windows NT Overview

NT's C2 Security Mechanisms

Windows NT Security Architecture

Windows NT Security Tools

Back Orifice/Back Orifice 2000

Firewalls

Firewall Philosophies

Firewalls and Security Policies

Private Communication and Transactions on the Internet

Hash Functions

Hashing: UNIX Password File

Secret Key Cryptography

Public Key Cryptography

Sample Application

PGP: Signatures

PGP: Encryption

A Few Words About DES...

Secure Communication Protocols

Certificates

Certificates in Real-Life...

Sample Browser Certificate

Certificate Chain

Conclusions

Security Measures Being Employed

For More Information...

Questions? Comments? Queries?

Acronyms and Abbreviations

Acronyms and Abbreviations (cont.)

Author: Gary C. Kessler

Home Page: ../index.htm