ebook img

reference books PDF

42 Pages·2000·0.23 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview reference books

2and Le1c tures TF5N6 I8S/F6N6I7 slocoto ryPtiruc etSenretnI se r1duntac2eL sllawe rdinFas nroiiethaTtimiL forP uhdnaS ivaR . SKOO BECNEREFER NSeetEcwsuosrreiknt Wtyii lallisa,m Stallings , u Prent2i0c0e0-Hall, SecuritTye chnologiefsot rhW eo rlWdi dWee bR,o lf u Oppliger , hcet rA House, 2000 RolfSecurity, Intranet and Internet Oppliger , hcet rA u 1H9o9u8se, BuildiInngt ernFeitr ewallBsr,e Cnhta pmaannd u Elizabeth Zwicky y, l,lsie etdR5an’9iaO9c1ossA NetSweocrukr PirtiyCv:oa mtPmeuu bnliaic caitni on u C.World, namfuaK , R. na mlreP anM d. renic epS , Prent1i9c9e5-Hall, 2 © Ravi Sandhu 2000 1 slocotor Pytiruce Stenretn I 568 TFNI/667 SFNI 0002 gnirpS forP uhdna Siva R. 2and Le1c tures SECRUO SBEW sourcef or R FCs a ndI ETF u http://www. ietf .org l cryptographisco urces u RSA’s frequently asked questions: http://www. rsa .com/ rsalabs /newfaq l NIST encryption home page: http:// csrc .nist .gov /encryption/ l firewall sources u Links to many vendor sites: http://www.waterw.com/~ manower /vendor.html l Firewalls mailing lists and searchable archive: http://lists. gnac .net/firewalls l Firewalls frequently asked questions: http://www. clark .net/pub/ mjr /pubs/ fwfaq l 3 © Ravi Sandhu 2000 ELCY CSESRUO CYTIRUCES Fall u SFNI 26 7noitam rsomfentIsyyStiruceS l SFNI 767 eruceS cinortceleEcremmoC l Spring u slo cy ot StitFore Nrun6IPcr6ee7StnI l Da7tI6aSN5beF acSsu er ity l ytiru creeStup mrsoolCfe dloaMm r2To6FF8NI l 4 © Ravi Sandhu 2000 2 slocotor Pytiruce Stenretn I 568 TFNI/667 SFNI 0002 gnirpS forP uhdna Siva R. 2and Le1c tures OPENING REMARKS YTIRUCESN ITENRETNI Internet insecurity spreads at Internet speed u 7 m 8frs9ooi1wrroM l 1994ina stPntaiasfcsfkwison rgd l 5991 ni skcatta gnifoops PI l sl kaec i cannfiti6eovt9Dra9e1s l 9s9e9s1 uer nilrvioabmE l Internet insecurity grows at super-Internet speed u tenre ten nherIthett sganfiw oesrrtganedi cyntiiruces l )8 8e9c 1nr iayser yedveelb uyoldhg ushoacrhihw( 6 © Ravi Sandhu 2000 3 slocotor Pytiruce Stenretn I 568 TFNI/667 SFNI 0002 gnirpS forP uhdna Siva R. 2and Le1c tures YTIRUCE STENRETNI ni seiradnuob tuc raelc on era erehT u ecapsreb yncredom AOL-Microsoft war of 1999 l Hotmailp asswordb ypasso f1 999 l Ticketmasterd eepw ebl inks l 7 © Ravi Sandhu 2000 SEVITCEJB OYTIRUCES CONFIDENTIALITY disclosure YTIRGETNI AVAILABILITY noitacifidom ssecca USAGE-CONTROL esoprup 8 © Ravi Sandhu 2000 4 slocotor Pytiruce Stenretn I 568 TFNI/667 SFNI 0002 gnirpS forP uhdna Siva R. 2and Le1c tures SEUQINHCE TYTIRUCES noitneverP u accessc ontrol l noitceteD u auditing/intrusiond etection l incidenth andling l ecnatpeccA u practicality l 9 © Ravi Sandhu 2000 THREATS, VULNERABILITIES ASSETS AND RISK skcatta elbissop era STAERHT u sessenkaew era SEITILIBARENLUV u dna noitamrofni era STESSA u noitcetor pdee ntah tsecruoser ,staerh tf otnemssess aseriuqe rKSIR u stes sda nsaeitilibarenluv 10 © Ravi Sandhu 2000 5 slocotor Pytiruce Stenretn I 568 TFNI/667 SFNI 0002 gnirpS forP uhdna Siva R. 2and Le1c tures KSIR AttacOkutsider u insider attack n AttackInsider u o utsidera ttack n 11 © Ravi Sandhu 2000 YTIRUCE SN OEVITCEPSREP Nos ilverb ullets u A process NOT a turn-key product u Requiresa c onservatives tance u Requiresd efense-in-depth u As econdaryo bjective u Absolutes ecurityd oesn ote xist u Security in most systems can be improved u 12 © Ravi Sandhu 2000 6 slocotor Pytiruce Stenretn I 568 TFNI/667 SFNI 0002 gnirpS forP uhdna Siva R. 2and Le1c tures YTIRUCE SN OEVITCEPSREP se oedlbissop m siyitiruc eestulosba u si ytirucesni etulosba naem ton elbatpecca 13 © Ravi Sandhu 2000 TERNUGSITANUE&TE HROIRNIGT Y 4SREYAL A ?tahW s yciloP s u ledoM r erutcetihcrA a msinahceM n c ?woH e 14 © Ravi Sandhu 2000 7 slocotor Pytiruce Stenretn I 568 TFNI/667 SFNI 0002 gnirpS forP uhdna Siva R. 2and Le1c tures INTRUSION SCENARIOS SNOISURTN ILACISSALC 1OIRANECS kcat traedisnI u r edseuziro h ytnduaaa e rrselidai senhiT l ssec cdaegelivi rsperiuq craedisnI u smargorp metsys degelivirp ni sgub gnitiolpxe l segelivirp derugifnoc ylroop gnitiolpxe l ot sesroh najorT/sroodkcab llatsnI u fo noitisiuqca tneuqesbus etatilicaf ssec cdaegelivirp 16 © Ravi Sandhu 2000 8 slocotor Pytiruce Stenretn I 568 TFNI/667 SFNI 0002 gnirpS forP uhdna Siva R. 2and Le1c tures SNOISURTN ILACISSALC 2OIRANECS kcatta redistuO u dezirohtua na ot ssecca eriuqcA u tnuocca kcat traedis n nieatartepreP u 17 © Ravi Sandhu 2000 SNOISURTN IKROWTEN 3OIRANECS kcat traedisnI/redistuO u ot slocotorp krowten foopS u n ao tssecc aeriuqc aylevitceffe tnuoc cdaezirohtua 18 © Ravi Sandhu 2000 9 slocotor Pytiruce Stenretn I 568 TFNI/667 SFNI 0002 gnirpS forP uhdna Siva R. 2and Le1c tures ECIVRE SF OLAINED SKCATTA kcatta htiw strop krowten gnidoolF u gniks aemcruos ecivres tenretni fo gnidoolf NYS/PCT u 6991 ni sredivorp 19 © Ravi Sandhu 2000 ERUTCURTSARFNI SKCATTA skcat traetuor u modify router configurations l skcatta revres eman niamod u skcatta ecivres tenretni u webs ites l ftpa rchives l 20 © Ravi Sandhu 2000 10 slocotor Pytiruce Stenretn I 568 TFNI/667 SFNI 0002 gnirpS forP uhdna Siva R.

Description:
Oppliger, Artech House, 2000. ◇ Internet and Intranet Security, Rolf Oppliger, Artech. House, 1998. ◇ Building Internet Firewalls, Brent Chapman and.
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.