Network Security
1. Digital Signature
2. Circuit level gateways
3. Network Security: Definition and Objectives:
4. CIA Triad
5. types of threats and attacks in network security:
6. network security models—Bell LaPadula, Biba, and Clark Wilson:
7. Network Security Architecture
8. Defense in Depth (DiD) strategy
9. symmetric key encryption
10. asymmetric key encryption
11. Hash Functions
12. Application level gateways
13. Secure Routing
14. Endpoint Security in network security
15. Data Security Layer
16. Access Control in network security
17. endpoint security
18. Application Security
19. basics of cryptography
20. Public Key Infrastructure (PKI)
21. Wi Fi security and its vulnerabilities
22. Virtual Private Networks (VPNs)
23. Asymmetric key systems
24. Terminology and abbreviations
25. Background to network security
26. Network security when using your computer
27. Threats to communication networks
28. Important terminology and information for making the most of this section
29. Potential network vulnerabilities
30. Tapping into transmission media
31. Principles of encryption
32. An overview of symmetric key systems
33. The components of a symmetric key system
34. Introduction
35. Vulnerability to attack
36. Hybrid systems
37. Implementing encryption in networks
38. Link layer encryption
39. Encryption and integrity
40. Freshness
41. Authentication
42. Access control
43. Firewalls