- 11
- 0
- 约2.68万字
- 约 85页
- 2019-05-06 发布于广东
- 举报
Chapter 8: Network Security Chapter goals: understand principles of network security: cryptography and its many uses beyond “confidentiality” authentication message integrity key distribution security in practice: firewalls security in application, transport, network, link layers Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Authentication 8.4 Integrity 8.5 Key Distribution and certification 8.6 Access control: firewalls 8.7 Attacks and counter measures 8.8 Security in many layers What is network security? Confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver decrypts message Authentication: sender, receiver want to confirm identity of each other Message Integrity: sender, receiver want to ensure message not altered (in transit, or afterwards) without detection Access and Availability: services must be accessible and available to users Friends and enemies: Alice, Bob, Trudy well-known in network security world Bob, Alice (lovers!) want to communicate “securely” Trudy (intruder) may intercept, delete, add messages Who might Bob, Alice be? … well, real-life Bobs and Alices! Web browser/server for electronic transactions (e.g., on-line purchases) on-line banking client/server DNS servers routers exchanging routing table updates other examples? There are bad guys (and girls) out there! Q: What can a “bad guy” do? A: a lot! eavesdrop: intercept messages actively insert messages into connection impersonation: can fake (spoof) source address in packet (or any field in packet) hijacking: “take over” ongoing connection by removing sender or receiver, inserting himself in place denial of service: prevent service from being used by others (e.g., by overloading resources) Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Authentication 8.4 Integrity 8.5 Key Distribution and certification 8.6 Access control: firewalls 8.7 Attacks and counter
您可能关注的文档
- 电子科技大学微机系统原理与接口技术课件第六章 微机接口基础.ppt
- 电子科技大学微机系统原理与接口技术课件第七章 中断.ppt
- 电子科技大学微机系统原理与接口技术课件第三章 X86指令系统.ppt
- 电子科技大学微机系统原理与接口技术课件第四章 伪指令与程序设计.ppt
- 电子科技大学微机系统原理与接口技术课件第五章 存储器.ppt
- 电子科技大学物理电子学院数据库程序设计课件第2章 关系数据库的模型.ppt
- 电子科技大学物理电子学院数据库程序设计课件第6章 使用高级查询―SQL语言.ppt
- 电子科技大学物理电子学院数据库程序设计课件第7章 窗体设计.ppt
- 电子科技大学物理电子学院数据库程序设计课件第8章 报表.ppt
- 电子科技大学物理电子学院数据库程序设计课件第11章 面向对象程序设计语言―VBA.ppt
最近下载
- 瑞安市江南物流园区城市设计.pdf VIP
- 2025年新版中小学信息技术基础知识竞赛试题(附答案).docx VIP
- 光宝ISA-7X标准泛用型伺服系统技术手册.pdf
- 建筑工程施工发包与承包违法行为认定查处管理办法.pdf VIP
- 通用 2025年民主生活会个人“五个方面+典型案例+上一年整改情况”存在的不足.docx VIP
- 三年级小学生家长会PPT模板期中期末班会成品演讲课件期末家长会 (1).pptx VIP
- 眼视光医学专科专业试卷.docx VIP
- 四川省成都市天立教育集团2024-2025学年高一上学期语文期中联考试卷(含答案).pdf VIP
- 黑彝故事——凉山布拖黑彝地位变迁与身份重建.pdf VIP
- (16篇)领导班子2025年度民主生活会对照检查材料.docx VIP
原创力文档

文档评论(0)