Tài liệu miễn phí An ninh - Bảo mật
Download Tài liệu học tập miễn phí An ninh - Bảo mật
WLAN technologies are becoming increasingly popular, and promise to be the platform for many future applications:
Home Entertainment Networking
Example WLAN/WPAN Technologies:
IEEE 802.11
8/30/2018 2:18:38 AM +00:00
Why has CompTIA (the high-profile Computer Technology Industry Association behind the wildly popular A+ and Network+ certifications) targeted security for its latest credential?
Thanks to soaring e-business initiatives and worldwide Internet connectivity, recent survey stats from the Computer Security Institute (CSI) show we need more network security specialists-fast!
Boasting a one-of-a-kind integration of text, DVD-quality instructor-led training, and Web-based exam simulation and remediation, Security+ Study Guide & DVD Training System gives students 100% coverage of official CompTIA Security+ exam objectives plus realistic test prep....
8/30/2018 2:18:38 AM +00:00
Understanding programming and programming languages requires knowledge of the underlying theoretical model. This book explores aspects of programming that are amenable to mathematical proof. The author describes a programming theory which is aspects of programming that are amenable to mathematical proof. The author describes a programming theory which is
8/30/2018 2:18:38 AM +00:00
A comprehensive yet comprehensible and witty guide to the latest advances in computer network security protocols. The author team includes Charlie Kaufman, currently chief security architect for Lotus Notes, and formerly Network Security Architect at Digital Equipment Corporation;
8/30/2018 2:18:38 AM +00:00
o Nắm vững các khái niệm cơ bản an ninh mạng o Hiểu và giải thích
• Các bước phân tích, tìm kiếm thông tin trong mạng • Các nguy cơ mất thông tin • Cách thức phòng chống tấn công
o Thiết kế được hệ thống tường lửa phòng/phát hiện/chống lại các loại tấn công o Tự nghiên cứu kiến thức về an ninh mạng
4
.
8/30/2018 2:18:38 AM +00:00
OSI, TCP/IP model
o IP, TCP packet architecture o Protocols: HTTP, DNS…
Network devices, router, switch, firewall, … Wireless network: AP, wave,… Overview of network security
o o o o o o o Definitions Tasks of Network Security Attacks, services and mechanisms Security attacks Security services Methods of Defense A model for Internetwork Security
3
.OSI model
4
.TCP/IP model
5
.
8/30/2018 2:18:38 AM +00:00
Tham khảo sách 'cwnatmcertified wireless network administratorofficial study guideendorsed by the wireless lan associationindustry approved!tmexam pw0-100objective-by-objective coverage of the cwna certification examvendor-neutral wireless network trainin', công nghệ thông tin, an ninh - bảo mật phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả
8/30/2018 2:18:38 AM +00:00
Now more than ever, it is imperative that users be able to protect their system from hackers trashing their Web sites or stealing information. Written by a reformed hacker, this comprehensive resource identifies security holes in common computer and network systems, allowing system administrators to discover faults inherent within their network- and work toward a solution to those problems.
8/30/2018 2:18:38 AM +00:00
Security+ FastPass is the streamlined tool you need to bone up for the Security+ exam[SYO-101]. The enclosed CD lets you practice, practice, practice, andyou’ll keep the book—packed with concise, objective-focused coverageand review questions—at your side until the minute you sit down to take thetest.
8/30/2018 2:18:38 AM +00:00
Hệ mật Elgamal dựa trên bài toán logarithm rời rạc là bài toán được dùng nhiều trong nhiều thủ tục mật mã. Bởi vậy ta sẽ dành nhiều thời gian để thảo luận về bài toán quan trọng này. ở các phần sau sẽ xem xét sơ lược một số hệ mật khoá công khai quan trọng khác bao gồm các hệ thoóng loại Elgamal dựa trên các trường hữu hạn và các đường cong elliptic, hệ mật xếp ba lô Merkle-Helman và hệ mật McElice....
8/30/2018 2:18:37 AM +00:00
An toàn thông tin có mục đích là phải tổ chức việc xử lý, ghi nhớ và trao đổi thông tin sao cho tính cẩn mật, toàn vẹn, sẵn sàng và đáng tin cậy được bảo đảm ở mức độ đầy đủ.
Ngày nay vấn đề an toàn thông tin được xem là một trong những quan tâm hàng đầu của xã hội, có ảnh hưởng rất nhiều đến hầu hết các ngành khoa học tự nhiên, kỹ thuật, khoa học xã hội và kinh tế.
8/30/2018 2:18:37 AM +00:00
Trường Checksum thực hiện kết hợp khóa và gói tin thành một gói tin chứng thực MAC (Message Authenticateion Code). Sau khi thực hiện Sender sẽ gửi MAC và gói tin tới Receiver trên một kênh không bảo mật. Receiver sau khi nhận được MAC và hàm băm của Sender sẽ thực hiện quá trình băm như của Sender để tạo ra một MAC khác. Sau đó Receiver sẽ thực hiện so sánh MAC của Sender và MAC của mình. Nếu giống nhau thì dữ liệu là toàn vẹn, nếu khác nhau thì dữ liệu không toàn vẹn.
...
8/30/2018 2:18:37 AM +00:00
Mã hóa là gì ? а) tập hợp các phương pháp và phương tiện bảo vệ thông tin khỏi việc truy cập trái phép bằng cách ẩn yếu tố tồn tại các thông tin bí mật. b) môn khoa học về các phương thức biến đổi (mã hóa ) thông tin với mục đích bảo vệ thông tin khỏi người truy cập trái phép c) môn khoa học (và thực tế ứng dụng nó ) về các ph ương pháp và phương thức giải mã 2. Steganography là gì ? а) bảo vệ thông tin khỏi truy cập trái...
8/30/2018 2:18:37 AM +00:00
Security Attack: Any action that compromises the security of information.
Security Mechanism: A mechanism that is designed to detect, prevent, or recover from a security attack.
Security Service: A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms.
8/30/2018 2:18:37 AM +00:00
Classified along three independent dimensions:
The type of operations used for transforming plaintext to ciphertext
The number of keys used
symmetric (single key)
asymmetric (two-keys, or public-key encryption)
The way in which the plaintext is processed
8/30/2018 2:18:37 AM +00:00
Requirements - must be able to verify that:
1. Message came from apparent source or author,
2. Contents have not been altered,
3. Sometimes, it was sent at a certain time or sequence.
Protection against active attack (falsification of data and transactions)
8/30/2018 2:18:37 AM +00:00
key concerns are confidentiality and timeliness
to provide confidentiality must encrypt identification and session key info
which requires the use of previously shared private or public keys
need timeliness to prevent replay attacks
provided by using sequence numbers or timestamps or challenge/response
8/30/2018 2:18:37 AM +00:00
It is availiable free on a variety of platforms.
Based on well known algorithms.
Wide range of applicability
Not developed or controlled by governmental or standards organizations
8/30/2018 2:18:37 AM +00:00
Internetworking and Internet Protocols (Appendix 6A)
IP Security Overview
IP Security Architecture
Authentication Header
Encapsulating Security Payload
Combinations of Security Associations
Key Management
8/30/2018 2:18:37 AM +00:00
Web Security Considerations
Secure Socket Layer (SSL) and Transport Layer Security (TLS)
Secure Electronic Transaction (SET)
Recommended Reading and WEB Sites
8/30/2018 2:18:37 AM +00:00
An integrated collection of tools for network monitoring and control.
Single operator interface
Minimal amount of separate equipment. Software and network communications capability built into the existing equipment
SNMP key elements:
Management station
Managament agent
Management information base
Network Management protocol
Get, Set and Notify
8/30/2018 2:18:37 AM +00:00
Intruders
Intrusion Techniques
Password Protection
Password Selection Strategies
Intrusion Detection
Viruses and Related Threats
Malicious Programs
The Nature of Viruses
Antivirus Approaches
Advanced Antivirus Techniques
Recommended Reading and WEB Sites
8/30/2018 2:18:37 AM +00:00
Effective means of protection a local system or network of systems from network-based security threats while affording access to the outside world via WAN`s or the Internet.Effective means of protection a local system or network of systems from network-based security threats while affording access to the outside world via WAN`s or the Internet
8/30/2018 2:18:37 AM +00:00
Anger underneath
We've been dominated by sadists
Yes, I am a criminal
Looking for an “elsewhere”
This is it... this is where I belong...
Wide range rebellion
You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it's for our own good, yet we're the criminals
We make use of a service already existing without paying for what could be dirt-cheap if it wasn't run by profiteering gluttons
your three-piece psychology and 1950's technobrain
8/30/2018 2:18:37 AM +00:00
Basic Identification
Port Scanning
OS fingerprinting & Application scanning
Advanced Identification
Stealth operations
Inline systems detection
Security policy bypassing
Fragmentation tricks
ISN prediction & Spoofing
Evading detection
Bouncing
8/30/2018 2:18:37 AM +00:00
Basic Identification
Port Scanning
OS fingerprinting & Application scanning
Advanced Identification
Stealth operations
Inline systems detection
Security policy bypassing
Fragmentation tricks
ISN prediction & Spoofing
8/30/2018 2:18:37 AM +00:00
“Access control includes authentication, authorization and audit. It also includes measures such as physical devices, including biometric scans and metal locks, hidden paths, digital signatures, encryption, social barriers, and monitoring by humans and automated systems.” -- Wikipedia
8/30/2018 2:18:37 AM +00:00
We have looked at protocols for distributing and establishing keys used for authentication and confidentiality
But who should you give these keys to? Who should you trust? What are the rules governing when to and not to give out security credentials
In this lecture, we will look at the broad area of secure and trusted systems
We will focus on access control models
These methods are often used to abstract the requirements for a computer system
But, they hold for general systems where security is a concern (e.g. networks, computers, companies…)
...
8/30/2018 2:18:37 AM +00:00
We have looked at confidentiality services, and also examined the information theoretic framework for security.
Confidentiality between Alice and Bob only guarantees that Eve cannot read the message, it does not address:
Is Alice really talking to Bob?
Is Bob really talking to Alice?
In this lecture, we will look at the following problems:
Entity Authentication: Proof of the identity of an individual
Message Authentication: (Data origin authentication) Proof that the source of information really is what it claims to be
Message Signing: Binding information to a particular entity
Data Integrity: Ensuring that information has not been altered by unknown entities
...
8/30/2018 2:18:37 AM +00:00
We have covered basic cryptographic tools that will be useful for building things. But, before you can build, you need to know the structural weaknesses of your tools…
We will now talk about these weaknesses… and the subjects of cryptanalysis and protocol failures
DES:
Internet Challenges and EFF
Multiple DES and Meet in the Middle attack
RSA:
Low Exponent Attacks
Protocol Failures… Be careful, here be dragons!
Hash Functions:
Birthday Attacks and Implications
8/30/2018 2:18:37 AM +00:00