tailieunhanh - Lecture Computer networking: A top-down approach (6/e): Chapter 8 - James F. Kurose, Keith W. Ross

Chapter 8: Network security. The chapter is structured as follows: What is network security? Principles of cryptography, message integrity, authentication, securing e-mail, securing TCP connections: SSL, network layer security: IPsec, securing wireless LANs, operational security: firewalls and IDS. | Chapter 8 Security Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students, readers). They’re in PowerPoint form so you see the animations; and can add, modify, and delete slides (including this one) and slide content to suit your needs. They obviously represent a lot of work on our part. In return for use, we only ask the following: If you use these slides (., in a class) that you mention their source (after all, we’d like people to use our book!) If you post any slides on a www site, that you note that they are adapted from (or perhaps identical to) our slides, and note our copyright of this material. Thanks and enjoy! JFK/KWR All material copyright 1996-2012 Kurose and . Ross, All Rights Reserved Network Security Chapter 8: Network Security Chapter goals: understand principles of network security: cryptography and its | Chapter 8 Security Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students, readers). They’re in PowerPoint form so you see the animations; and can add, modify, and delete slides (including this one) and slide content to suit your needs. They obviously represent a lot of work on our part. In return for use, we only ask the following: If you use these slides (., in a class) that you mention their source (after all, we’d like people to use our book!) If you post any slides on a www site, that you note that they are adapted from (or perhaps identical to) our slides, and note our copyright of this material. Thanks and enjoy! JFK/KWR All material copyright 1996-2012 Kurose and . Ross, All Rights Reserved Network Security Chapter 8: Network Security Chapter goals: understand principles of network security: cryptography and its many uses beyond “confidentiality” authentication message integrity security in practice: firewalls and intrusion detection systems security in application, transport, network, link layers Network Security Chapter 8 roadmap What is network security? Principles of cryptography Message integrity, authentication Securing e-mail Securing TCP connections: SSL Network layer security: IPsec Securing wireless LANs Operational security: firewalls and IDS Network Security What is network security? confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver decrypts message authentication: sender, receiver want to confirm identity of each other message integrity: sender, receiver want to ensure message not altered (in transit, or afterwards) without detection access and availability: services must be accessible and available to users Network Security Friends and enemies: Alice, Bob, Trudy .

TÀI LIỆU MỚI ĐĂNG