Table of Contents
PPT Slide
Selected Topics
“Internet” vs. "Intranet"
"Extranet"
Secure Computers and Networks
Security Questions
What’s the “Security” Problem?
What’s the “Security” Problem? (cont.)
How Big Is The Problem?
Measuring Risk
Case Study: DoD Vulnerability
Types of Security Breaches
...And a Proliferation of Tools
Security and Internet Commerce
Commerce Over the Internet?
...And A Recurring Theme
Site Security
Protecting Physical Assets
ADSL and Cable Modems
Site Security Handbook
Local Security Policies
User Security Handbook
Passwords
Alternatives to Passwords
Viruses
Is the Internet Unsecure?
Is the Internet Unsecure? (cont.)
TCP/IP (v4) Protocol Suite
TCP/IP Protocol Insecurity
TCP/IP Protocol Vulnerabilities
TCP/IP Application Vulnerabilities
SMURF DoS Attack
E-Mail Vulnerabilities
Web/Browser Vulnerabilities
Cookies and IE5
UNIX Overview
Some UNIX Weaknesses
Unix Security Tools (or Weapons)
nmap
queso
Windows NT Overview
NT's C2 Security Mechanisms
Windows NT Security Architecture
Windows NT Security Tools
Back Orifice/Back Orifice 2000
Firewalls
Firewall Philosophies
Firewalls and Security Policies
Private Communication and Transactions on the Internet
Hash Functions
Hashing: UNIX Password File
Secret Key Cryptography
Public Key Cryptography
Sample Application
PGP: Signatures
PGP: Encryption
A Few Words About DES...
Secure Communication Protocols
Certificates
Certificates in Real-Life...
Sample Browser Certificate
Certificate Chain
Conclusions
Security Measures Being Employed
For More Information...
Questions? Comments? Queries?
Acronyms and Abbreviations
Acronyms and Abbreviations (cont.)
|