Were you searching to download Computer Network Security PDF? Well, you are at right place. I have given the download link of the pdf below but before that please go through the table of content of the pdf to know what topics are covered in that pdf.
Download Computer Network Security PDF
Book 1: Network Security Tutorial
Table of content
- Why Security?
- Internet Evolution
- Breach Sources
- Types of Security
- Goals of Information Security
- Access Control
- Authentication
- Examples of Tokens
- Trusted Network
- Strong Authentication
- Two-factor Authentication
- Authorization
- Authentication vs. Authorization
- Authorization Concepts
- Single Sign On
- Types of Access Control
- Accountability
- Integrity
- Risk, Threat and Vulnerability
- Vulnerability
- Threat
Also Download: Introduction to Computer Network PDF
- Risk Management vs. Cost of Security
- Attack Sources
- General Threats
- Reconnaissance Attack
- Man-in-the-Middle Attack
- Session Hijacking
- Denial of Service (DoS) Attack
- Layered Security &
Attack Mitigation - Attacks on Different Layers
- Layer 2 Attacks
- ARP Spoofing 1
- MAC Flooding
- DHCP Attacks
- DHCP Attack Types
- Layer 3 Attacks
- Ping Flood
- Mitigating Sniffing Attacks
- Routing Attacks
- TCP Attacks
- TCP Attacks
- Application Layer Attacks
- Application Layer Attacks
- Application Layer DDoS: Slowloris
- Web Application Security Risks
- DNS Changer
- Rogue DNS Servers
- Top DNS Changer Infections
- DNS Vulnerabilities
- DNS Cache Poisoning
- DNS Amplification
- Common Types of Attack
- Wireless Attacks
- Man in the Middle Attacks (Wireless)
- Botnet
- Password Cracking
- Pharming and Phishing
- Security on Different Layers
- Link-Layer Security
- Layer 2 Forwarding Protocol
- Point to Point Tunneling Protocol
- Layer 2 Tunneling Protocol
- PPPoE
- Transport Layer Security
- SSL/TLS
- SSL Handshake
- Advantages of SSL
- Applications Using SSL/TLS
- Secure Shell Protocol (SSH)
- Application Layer Security
- HTTPS
- Pretty Good Privacy (PGP)
- MIME
- Securing the Nameserver
- DNSSEC
- Cryptography
- Crypto Core
- History: Ciphers
- How to Break a Substitution Cipher
- Transposition Cipher
- History: Rotor Machines (1870-1943)
- Modern Crypto Algorithms
- Encryption
- Encryption and Decryption
- Symmetric Key Algorithm
- Symmetric Encryption
- Symmetric Key Algorithm
- Block and Stream Cipher
- Block Cipher
- Stream Cipher
- Data Encryption Standard (DES)
- DES: Illustration
- Triple DES
- 3DES: Illustration
- Advanced Encryption Standard (AES)
- Rivest Cipher
- RC4
- Block Cipher Modes
- Electronic Codebook (ECB)
- Ciphertext Block Chaining (CBC)
- Cipher Feedback (CFB)
- Output Feedback (OFB)
- Selecting a Block Cipher Mode
- Asymmetric Key Algorithm
- Asymmetric Encryption
- Asymmetric Key Algorithm
- Symmetric vs. Asymmetric Key
- Hash Functions
- Digital Signature
- Digital Signature Process
- Signature Verification Process
- Public Key Infrastructure
- Functions of a PKI
- Public Key Infrastructure
- Components of a PKI
- Certificates
- Digital Certificate
- X.509 Certificate Usage
- Every certificate contains…
- Certificate Authority
- Certificate Revocation Lists
- Resource Registration
- What is the APNIC Database?
- Whois Database Query – Clients
- Object Types
- Database Object
- Inter-Related Objects
- New Members
- Inetnum / Inet6num Objects
- Whois – Inet6num Example
- Person Object
- What is a ‘nic-hdl’?
- How a Role Object Works
- Replacing Contacts in the DB
– Using Person Objects - Replacing Contacts in the DB
– Using a Role Object - Whois – Role vs Person Objects
- IRT Object
- Database Protection – Maintainers
- Database Protection
- Database Protection
Maintainer Object - Maintainer Hierarchy Diagram
- Customer Privacy
- What Needs to be Visible?
- X.509 Certificate + 3779 Ext
- Resource Certification
- Terminologies
- Resource Certification Benefits
- Resource Public Key Infrastructure
- Route Origin Attestations (ROAs)
- More Info on RPKI
- IP Security (IPSec)
- Virtual Private Network
- VPN Implementations
- VPN Protocols
- Advantages of VPN
- Disadvantages of VPN
- IPsec
- IPsec Standards
- Benefits of IPsec
- Benefits of IPsec
- Different Layers of Encryption
- IPsec Modes
- Tunnel vs. Transport Mode IPsec
- IPsec Architecture
- Security Associations (SA)
- Security Associations
- Security Parameter Index (SPI)
- How to Set Up SA
- ISAKMP
- Selectors
- Authentication Header (AH)
- AH Header Format
- Encapsulating Security Payload (ESP)
- ESP Header Format
- Packet Format Alteration for AH
Transport Mode - Packet Format Alteration for ESP
Transport Mode - Packet Format Alteration for AH
Tunnel Mode - Packet Format Alteration for ESP
Tunnel Mode - Internet Key Exchange (IKE)
- IKE Modes
- Overview of IKE
- ISAKMP Header Format
- ISAKMP Message Format
- IKE Phase 1 (Main Mode)
- KE Phase 1 (Aggressive Mode)
- KE Phase 2 (Quick Mode)
- IPSec Best Practices
- Configuring IPSec
- IPSec Layout
- Router Configuration
Click on the link below to Introduction to Computer Networking PDF:
Book 2
Network Security Basics
Table of content
Introduction to Network security
- Security Overview
- Defining Basic Security Concepts
- Knowledge is Power
- Think Like a Thief
- The Intrusion Triangle
- Removing Intrusion Opportunities
- Security Terminology
Addressing Security Objectives
- Protecting the Servers
- Keeping Workstations Secure
- Protecting Network Devices
- Securing the Cable
- Safely Going Wireless
- Have Laptop, Will Travel
- The Paper Chase
- Removable Storage Risks
- Physical Security Summary
Preventing Accidental Compromise of Data
- Know Your Users
- Educate Your Users
Preventing Intentional Internal
Security Breaches
- Hiring and Human Resource Policies
- Detecting Internal Breaches
- Preventing Intentional Internal Breaches
Preventing Unauthorized External Intrusions
- External Intruders with Internal Access
- Tactical Planning
Recognizing Network Security Threats
- Understanding Intruder Motivations
- Recreational Hackers
- Profi t-motivated Hackers
- Vengeful Hackers
- Hybrid Hackers
Classifying Specific Types of Attacks
- Social engineering attacks
- What is social engineering?
- Denial of Service (DOS) Attacks
- Distributed Denial of Service attacks
- DNS DOS attack
- SYN attack/LAND attack
- Ping of Death
- Teardrop
- Ping Flood (ICMP flood)
- SMURF attack
- UDP bomb or UDP flood
- UDP Snork attack
- WinNuke (Windows out-of-band attack)
- Mail bomb attack
- Scanning and Spoofing
- IP half scan attack
- IP Spoofing
- Source Routing attack
- Other protocol exploits
- System and software exploits
- Trojans, viruses and worms
- Viruses
Also Download: Introduction to Computer Network PDF
Designing a Comprehensive Security Plan
- Evaluating Security Needs
- Assessing the type of business
- Assessing the type of data
- Assessing the network connections
- Assessing management philosophy
- Understanding Security Ratings
- Legal Considerations
- Designating Responsibility for Network Security
- Responsibility for Developing the Security Plan
and Policies - Responsibility for Implementing and Enforcing the
Security Plan and Policies
Designing the Corporate Security Policy
- Developing an Effective Password Policy
- Password Length and Complexity
- Who creates the password?
- Password Change Policy
- Summary of Best Password Practices
- Educating Network Users on Security Issues
Click on the link below to Computer Network Security PDF:
Book 3
Network Security
Table of Content
Network Security Components
ISP Example
Enterprise Example
Current Threats and
Attack Methods
Attack Trends
Vulnerability Exploit Cycle
Increasingly Serious Impacts
Evolving Dependence
The Community’s Vulnerability
Unauthorized Use
Sophisticated attacks + Dependency + Vulnerability
Classes of Attacks
Reconnaissance Methods
Network Sniffers
ISP Example
Enterprise Example
This is the table of content of Computer Network Security PDF
Access Methods
Access Methods Access Methods cont’d
IP Packet
IP: Packet Format
IP Spoofing IP Spoofing
IP: Normal Routing
IP: Source Routing
IP Unwanted Routing
IP Unwanted Routing (Cont.)
IP Spoofing Using Source
Routing
Transport Control Protocol
TCP connection establishment
TCP blind spoofing
TCP session hijacking
Denial of Service Methods
IP Normal Fragmentation
IP Normal Fragmentation (Cont.)
IP Normal Reassembly
This is the table of content of Computer Network Security PDF
Also Download: Basic Network Security Pdf Download
IP Reassembly Attack
SYN attack
SMURF Attack
DDoS Step 1: Find Vulnerable Hosts
DDoS Step 2: Install Software on DDoS Step
Masters and Agents
DDoS Step 3: Launch the attack
Security Policy
Why a Site Security Policy?
Security Policy Topics
Site Security Policy Resources
Policies Affecting Your
Customers
Securing Your Network
Securing Your Network
Securing Your Operational
Network
Secure Initial System Setup – 1
Domain Name Servers
Protecting System Password Information
Manage Networks Securely
Click on the link below to Computer Network Security PDF:
Leave a comment