Toc It Security
Toc It Security
Number of Days – 3
About IT Security
Introduction
o Secret Key Cryptography
o Public-Key Cryptography
o Hash Functions
o Why Three Encryption Techniques?
o The Significance of Key Length
Trust Models
o PGP Web of Trust
o Kerberos
o Public Key Certificates and Certificate Authorities
Anti-virus
Anti-spyware
Browser choice
Options
Advanced Features
Wireless Security
Accidental association
Malicious association
Ad-hoc networks
Non-traditional networks
Man-in-the-middle attacks
Denial of service
Network injection
Counteracting risks
MAC ID Filtering
Static IP Addressing
Regular WEP
Wpav1
Additions To Wpav1
Tkip
Eap
EAP-Versions
Leap
Peap
802.11i Security
Wpav2
Additions To Wpav2
Wapi
RF Shielding
IDS Terminology
o Types of Intrusion-Detection systems
o Passive system vs. reactive system
o Statistical anomaly and signature based IDSes
o Limitations
o IDS evasion techniques
o Development
Firewalls
o Types
o Network layer and packet filters
o Application-layer
o Proxy server
Introduction
Means
Manifestations
Methods of attack
ICMP flood
Teardrop attack
Peer-to-peer attacks
Permanent denial-of-service attacks
Application level floods
Nuke
Distributed attack
Reflected attack
Degradation-of-service attacks
Unintentional attack
Denial-of-Service Level II
Blind Denial of Service
Incidents
Performing DoS-attacks
Surviving Attacks
Introduction
Firewalls
Switches
Routers
Application Front End Hardware
IPS Based Prevention
Prevention Via Proactive Testing
Side Effects Of Dos Attacks
Backscatter
Denial-Of-Service Attacks And The Law
Reported Threats
Known Attacks
Cyber Counterintelligence
Proactive Cyber Defence
Background
Security And Systems Design
Financial Cost
Reasons
Vulnerabilities
Exploits
Eavesdropping
Social Engineering And Human Error
Denial Of Service Attacks
Indirect Attacks
Backdoors
Direct Access Attacks
Reducing Vulnerabilities
Security Measures
Difficulty With Response