Computer Network Security and Cyber Ethics
Computer Network Security and Cyber Ethics
Computer Network Security and Cyber Ethics
A Guide to Computer
Network Security
4) Springer
Contents
xi
xii Contents
Exercises 40
Advanced Exercises 41
References 41
Exercises 58
Advanced Exercises 58
References 59
Exercises 86
Advanced Exercises 87
References 88
Exercises 105
References 106
xiv Contents
Exercises 131
References 131
Exercises 143
References 143
Exercises 168
References 169
Exercises 183
References 184
Exercises 203
References 204
Contents xvii
10 Authentication 207
10.1 Definition 207
10.2 Multiple Factors and Effectiveness of Authentication 208
10.3 Authentication Elements 210
10.3.1 Person or Group Seeking Authentication 210
10.3.2 Distinguishing Characteristics for Authentication 210
10.3.3 The Authenticator 211
10.3.4 The Authentication Mechanism 211
10.3.5 Access Control Mechanism 212
10.4 Types of Authentication 212
10.4.1 Nonrepudiable Authentication 212
10.4.2 Repudiable Authentication 213
10.5 Authentication Methods 213
10.5.1 Password Authentication 214
10.5.2 Public-Key Authentication 216
10.5.3 Remote Authentication 220
10.5.4 Anonymous Authentication 222
10.5.5 Digital Signature-Based Authentication 222
10.5.6 Wireless Authentication 223
10.6 Developing an Authentication Policy 223
Exercises 224
References 225
11 Cryptography 227
11.1 Definition 227
11.1.1 Block Ciphers 229
11.2 Symmetrie Encryption 230
11.2.1 Symmetrie Encryption Algorithms 231
11.2.2 Problems with Symmetrie Encryption 233
11.3 Public Key Encryption 233
11.11 Public Key Encryption Algorithms 236
11.3.2 Problems with Public Key Encryption 236
11.3.3 Public Key Encryption Services 236
11.4 Enhancing Security: Combining Symmetrie and Public
Key Encryptions 237
11.5 Key Management: Generation, Transportation, and Distribution 237
11.5.1 The Key Exchange Problem 237
11.5.2 Key Distribution Centers (KDCs) 238
11.5.3 Public Key Management 240
11.5.4 Key Escrow 242
xviii Contents
Exercises 247
References 248
12 Firewalls 249
12.1 Definition 249
12.2 Types of Firewalls 252
12.2.1 Packet Inspection Firewalls 253
12.2.2 Application Proxy Server: Filtering Based
an Known Services 257
12.2.3 Virtual Private Network (VPN) Firewalls 261
12.2.4 Small Office or Home (SOHO) Firewalls 262
12.3 Configuration and Implementation of a Firewall 263
12.4 The Demilitarized Zone (DMZ) 264
12.4.1 Scalability and Increasing Security in a DMZ 266
12.5 Improving Security Through the Firewall 267
12.6 Firewall Forensics 268
12.7 Firewall Services and Limitations 269
12.7.1 Firewall Services 269
12.7.2 Limitations of Firewalls 269
Exercises 270
References 271
Exercises 297
References 298
Exercises 327
xx Contents
References 328
Exercises 350
References 350
Exercises 362
References 363
Exercises 394
References 395
xxii Contents
Exercises 420
References 422
Exercises 437
References 438
Exercises 446
References 447
References 453
xxiv Contents
Part IV Projects
22 Projects 457
22.1 Introduction 457
22.2 Part I: Weekly/Biweekly Laboratory Assignments 457
22.3 Part 11: Semester Projects 461
22.3.1 Intrusion Detection Systems 461
22.3.2 Scanning Tools for System Vulnerabilities 464
22.4 The Following Tools Are Used to Enhance Security in Web
Applications 466
22.4.1 Public Key Infrastructure 466
22.5 Part III: Research Projects 467
22.5.1 Consensus Defense 467
22.5.2 Specialized Security 467
22.5.3 Protecting an Extended Network 467
22.5.4 Automated Vulnerability Reporting 467
22.5.5 Turn-Key Product for Network Security Testing 468
22.5.6 The Role of Local Networks in the Defense of the National
Critical Infrastructure 468
22.5.7 Enterprise VPN Security 468
22.5.8 Perimeter Security 469
22.5.9 Enterprise Security 469
22.5.10 Password Security – Investigating the Weaknesses 469
Index 471