Computer networks -- 2007-2008 -- info.uvt.ro/Course 11
Quick links:
- front;
- courses 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13;
- laboratories agenda, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, evaluation, tools, repository.
Computer network security
editAttacks
edit- types:
- internal vs. external;
- organized (distributed);
- phases:
- reconascence:
- gaining access;
- using the "captured" resources;
- DOS -- Denial of service:
- man in the middle:
- sniffing:
- spoofing:
- miscellaneous -- not necessary related to networks:
Solutions
edit- security policy;
- encryption:
- wikipedia:Cryptography;
- wikipedia:Encryption;
- wikipedia:Cipher;
- wikipedia:Key (cryptography);
- wikipedia:Steganography;
- wikipedia:Symmetric-key algorithm:
- wikipedia:Stream cipher;
- wikipedia:Block cipher:
- wikipedia:Block cipher modes of operation -- IV, ECB, CBC, CFB, OFB, CTR;
- wikipedia:Public-key cryptography;
- digital signatures:
- security protocols:
- secure protocols:
- security software / devices: