| Basic Security Concepts - Why is Computer and Network Security Important | |
| Background and History | |
| The Security Trinity | |
| Information Security | |
| Risk Assessment | |
| Security Models | |
| Basic Terminology | |
| More Basic Terminology | |
| Threats, Vulnerabilities and Attacks - Protocols | |
| The OSI Reference Model | |
| TCP/IP Protocol Suite | |
| Useful Web Sites | |
| Search Engines | |
| Mailing Lists | |
| Encryption, Digital Signatures and Certification - Cryptography | |
| Stream Ciphers | |
| Breaking Ciphers | |
| Block Ciphers | |
| Encryption | |
| Public Key Cryptosystems | |
| Message Integrity | |
| Authentication | |
| Digital Signatures | |
| Competing Standards | |
| Digital Certificates | |
| Limitations of Digital Certificates | |
| Certificate Authorities | |
| Public Key Infrastructure | |
| The Future | |
| The Limitations of Encryption | |
| Kerberos - How Kerberos Works | |
| Kerberos' Limitations | |
| Encryption on the WWW - The World Wide Web | |
| Secure Sockets Layer (HTTPS). Secure HTTP (SHTTP). Microsoft's Internet Explorer | |
| Viewing Digital Certificates with Internet Explorer | |
| Viewing the Encryption Strength of IE5 | |
| Viewing Certification Authorities with IE5 | |
| Netscape Navigator | |
| Viewing Digital Certificates with Navigator | |
| Authenticode Certificates | |
| E-Mail - E-Mail Issues | |
| E-Mail Issues | |
| Secure E-Mail Protocols | |
| Web-Based E-Mail Services | |
| Security of Stored Messages | |
| Identity: Spoofing and Hiding | |
| E-Mail as a weapon | |
| E-Mail Policies | |
| E-Mail Privacy | |
| Auto-Responses | |
| Operating System Security - Passwords | |
| Password Attacks | |
| Onetime Passwords | |
| Access Control | |
| Data Redundancy | |
| General Recommendations | |
| Modems | |
| Useful Tools | |
| LAN Security - LAN Guidelines | |
| Controlling End-User Access | |
| Concurrent Logins | |
| Available Disk Space | |
| Restrictions to Location or Workstation | |
| Time/Day Restrictions | |
| Access to Directories and Trustee Rights | |
| File Attributes | |
| Other Privileges | |
| Single Sign-On | |
| Policy-Based Network Management | |
| Honeypot Systems | |
| Network Segmentation | |
| Static IP Addresses vs. DHCP | |
| Media and Protocols - Network Media | |
| Plenum Cabling and Risers | |
| WANs | |
| Redundancy and Alternative Connections | |
| Routers and SNMP - Router Issues | |
| SNMP | |
| Virtual Private Networks - Encryption on the Network | |
| Node-to-Node Encryption | |
| End-to-End Encryption | |
| Where to Encrypt | |
| Virtual Private Networks | |
| PPTP | |
| L2TP | |
| IPSec | |
| SOCKS | |
| Firewalls - Firewalls Pros and Cons | |
| Types of Firewalls | |
| Packet Filters vs | |
| Proxies | |
| Firewall Configurations | |
| Restricting Users' Access to the Internet | |
| Firewall Products | |
| Personal Firewalls | |
| Biometrics - Identification and Authentication | |
| Biometric Identification and Authentication | |
| Biometric Identification Reliability | |
| Backup Authentication | |
| Environmental Conditions | |
| User Acceptance | |
| Security of the Biometric System | |
| Interoperability | |
| Costs vs. Savings | |
| Policies and Procedures - Policies vs. Procedures | |
| Information Security Policy Objectives | |
| Developing Security Policies | |
| Policy and Procedure Manuals | |
| Policy Awareness & Education | |
| Policy Enforcement | |
| Policy Format | |
| Security Policy Suggestions | |
| Information Protection Team | |
| Crisis Management Planning | |
| Sources for Information Policies | |
| Auditing and Intrusion Detection - What is an Audit | |
| Operational Security Audits | |
| System Security Auditing | |
| Activity and Usage Auditing | |
| Audit Mistakes | |
| Deficiencies of Traditional Audit Techniques | |
| Intrusion Detection | |
| Intrusion Detection Systems | |
| Host-Based Intrusion Detection Systems | |
| Network-Based Intrusion Detection Systems | |
| Knowledge-Based Intrusion Detection Systems | |
| Statistical-Based Intrusion Detection Systems | |
| Defense In-Depth Approach | |
| Future Directions | |
| Crisis Management Planning - Crisis Management | |
| Disaster Recovery Planning | |
| Computer Security Incident Response Plan | |
| Browser Security - Cookie Files | |
| Cache Files | |
| Autocomplete | |
| Table of Contents provided by Publisher. All Rights Reserved. |