New User Special Price Expires in

Let's log you in.

Sign in with Facebook


Don't have a StudySoup account? Create one here!


Create a StudySoup account

Be part of our community, it's free to join!

Sign up with Facebook


Create your account
By creating an account you agree to StudySoup's terms and conditions and privacy policy

Already have a StudySoup account? Login here

Network Security

by: Federico Kerluke

Network Security ISA 656

Federico Kerluke
GPA 3.58

Angelos Stavrou

Almost Ready


These notes were just uploaded, and will be ready to view shortly.

Purchase these notes here, or revisit this page.

Either way, we'll remind you when they're ready :)

Preview These Notes for FREE

Get a free preview of these Notes, just enter your email below.

Unlock Preview
Unlock Preview

Preview these materials now for free

Why put in your email? Get access to more of this material and other relevant free materials for your school

View Preview

About this Document

Angelos Stavrou
Class Notes
25 ?




Popular in Course

Popular in Information Security Assurance

This 7 page Class Notes was uploaded by Federico Kerluke on Monday September 28, 2015. The Class Notes belongs to ISA 656 at George Mason University taught by Angelos Stavrou in Fall. Since its upload, it has received 54 views. For similar materials see /class/215089/isa-656-george-mason-university in Information Security Assurance at George Mason University.

Similar to ISA 656 at Mason

Popular in Information Security Assurance


Reviews for Network Security


Report this Material


What is Karma?


Karma is the currency of StudySoup.

You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!

Date Created: 09/28/15
N llll39lllll39 liilaterial Test Conditions lntroduction cmtogam Web Security lpsec Applications lntrusion Detection Network Security ISA 656 Review Angelos Stavrou Decem ber 4 2007 Material If it39s in my slides or I said it in class you39re responsible for it There may be some questions based on the Labs You re responsible for the assigned Labs and Homeworks at about the level of class coverage 331 N univunn The Exam Tli am Material Test Conditions lntroduction Cryptography Web Security lpsec Applications lntrusion Detection Worms and Denial of Service N uuunn lntroduction cmtogram Web Security lpsec Applications lntrusion Detection Worms and Denial of Service The Exam I 720pm 930pm Thursday Dec 11th in the Lab STl 128 I Same style of questions as the midterm I I39m not asking you to write programs Test Conditions I Open book I Open notes posted code manuals Labs I You can bring a calculator but save your energy you won t need it I No laptops IM Chatting or phones 231 431 N unnv The Exam introduction er Kinds of Threats Assets Cryptography Web Securig lPsec AEEilCaLlOHS intrusion Detection Worms and Denial of Service N llll39lllll39 The Exam introduction Terminoiogy or Threats Cyptogmphy Web Security lPsec AEEilCaLlOHS intrusion Detection Terminology I Confidentiality integrity availability I Threats attacks and vulnerabilities 5 31 Assets I Protect what I Bandwidth CPU data identity I Attacker powers 731 N uunvunn The Exam introduction C ryptography Web Security lPsec AEBilCaLlOnS intrusion Detection Worms and Denial of Service N nunnun The Exam introduction C ggtograghy Certificates Web Security lPsec AEBilCaLlOnS intrusion Detection Worms and Denial of Service Kinds of Threats I Joy hackers I Criminals I Competitors I Nation states I Insiders Ciphers I What is a cryptosystem I What is a block cipher What are generic properties of block ciphers I What are the different modes of operation What are their properties When would you use each mode I What is a stream cipher 631 831 Public Key Cryptography unnv The Exarn What is it What is it good for Limitations introduction Cryptography Ciphers How are public key systems used v Random numbers and where they come from n i Certificates Digital signatures Web Securig iPsec Applications intrusion Detection 931 SSL llll39lllll39 TheEXam What is SSL Client authentication types introduction Cyptogmphy Web Security Properties and reqUIrements tificates Browser Security Uses Trust model iPsec Applications intrusion Detection 1131 N uunvunn The Exam introduction ryptography h Web Security iPsec Applications intrusion Detection N uuunn The Exarn introduction C gptography Web Security ecu rity Continuing Authentication Web Server Security Email Security quot3 iPsec Applications intrusion Detection Certificates Trust properties CAs Authorization versus identity certificates Web of trust Types of certificates Revocation Web Certificates Root certificates The browser vendor s role Bindings H uman factors 1031 1231 N unnv The Exam introduction C wvtogmphy Web Securig SSL Web Certificates m Li Continuing Authentication eb erverSecurity ty AEEiiCaLiOHS intrusion Detection Worms and Denial of Service N u u I n u I n The Exam introduction 4910th Web Security Web Certificates AEEiiCaLiOHS intrusion Detection Browser Security Why is it a problem Active content Javascript ActiveX 1331 Web Server Security Why Trust model Scripts and their dangers Injection attacks Permissions 1531 uunvunn The Exam I introduction C ryptography I Web Security SSL I Web Certificates rowser Security b Server Security AEBiiCaLiOnS intrusion Detection Worms and Denial of Service nunnun The Exam introduction C ggtograghy Web Security SSL Web Certificates AEBiiCaLiOnS intrusion Detection N Continuing Authentication Cookies Embedded values Cryptographically sealing data 1431 N Email Security Usual evaluation How to sign and encrypt Details Threats eavesdropping password theft spool file 1631 quot Phishing unnv TheExam I What is it lntroducuon prtogmphy I How it39s done Web Securig I 55L I Tracmg Web Certi cates Browser Security Continuing Authentication b ServerSecurity Defenses lpsec AEEllCaUOnS intrusion DeLeCUOn Worms and Denial of Service 1731 N lPsec TheExam What is lPsec and why ESP and AH SPI SAs Tunnel and transport mode lntroduction Cygtogmghy Web Security packet processing Attacking lpsec AEEllCaUOnS intrusion DeLeCUOn 1931 N uunvunn The Exam lntroduction Cryptography Web Security 551 Web Certi cates Browser Security Continuing Authentication Web Server Security Email Security mg lpsec AEBlicaLions intrusion DeLeCUOn Worms and Demal of Service N uuunn The Exam lntroduction C ggtograghy Web Security lpsec lpsec Attacking lpsec AEBlicaLions intrusion DeLeCUOn Worms and Demal of Service Defenses Mutual authentication Personalization DKIM Non reusable credentials MITM attacks human factors Packet Processing I Outbound and inbound I SPD and SADB I Rule characteristics 1831 2031 N Attacking lPsec llIIV I Cut and paste attacks introduction prtogmphy I Probable plaintext Web Securig I I ipeee I Interactions With other layers iPsec Packet Processing AEEiiCaLiOHS intrusion Detection Worrns and Denial of Service 2131 SSH llll39lllll39 The Exam I Featu res introduction cnmem I Security model Web Security ipeee I Client authentication Applications Appicauons I Connection forwarding I SSH Agent intrusion Detection 2331 N univunn The Exam introduction Cryptography Web Security iPsec Applications e SSH SID intrusion Detection Worms and Deniai of Service N uivunn The Exam introduction ngtograghy Web Security iPsec Applications Applications SSH intrusion Detection Worms and Denial of Service Applications I SSH I SIP Networked storage SIP SIP architecture What s at risk Protecting voice versus signaling What type of crypto is used where Complex scenarios 2231 2431 N llIIV The Exam lnLroducuon C ryptogmplw Web Secu rig lPsec AEEllCaUOnS lntruslon Detection Limits of Network lDS lDS Architecture Worms and Demal of Service N llll39lllll39 The Exam lntroducuon Cyptogmphy Web Security lpsec Applications imam Detection What is lDS7 Limits of Network lDS Worms and Demal of Service What is IDS I Purpose I Host versus network IDS I Logs and traces 2531 IDS Architecture Detector Database Analyzer Countermeasu re Signature versus anomaly 2731 N univunn The Exam lntroducuon C ryptograplwy Web Security lPsec AEBllcanns lntrusion Detection l5 lDS7 N uuunn The Exam lntroducuon Cgptography Web Security lPsec Applications lntmsion Detection Worms and Demal e Denial orsamca Routing Attacks Wireless Security Limits of Network IDS I Insertion and evasion attack I Checksum errors I TTLs I TCP normalization 2631 Worms Worms versus viruses Spread program versus social engineering I I I Payloads I Spam I Detection 2831


Buy Material

Are you sure you want to buy this material for

25 Karma

Buy Material

BOOM! Enjoy Your Free Notes!

We've added these Notes to your profile, click here to view them now.


You're already Subscribed!

Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'

Why people love StudySoup

Steve Martinelli UC Los Angeles

"There's no way I would have passed my Organic Chemistry class this semester without the notes and study guides I got from StudySoup."

Kyle Maynard Purdue

"When you're taking detailed notes and trying to help everyone else out in the class, it really helps you learn and understand the I made $280 on my first study guide!"

Bentley McCaw University of Florida

"I was shooting for a perfect 4.0 GPA this semester. Having StudySoup as a study aid was critical to helping me achieve my goal...and I nailed it!"

Parker Thompson 500 Startups

"It's a great way for students to improve their educational experience and it seemed like a product that everybody wants, so all the people participating are winning."

Become an Elite Notetaker and start selling your notes online!

Refund Policy


All subscriptions to StudySoup are paid in full at the time of subscribing. To change your credit card information or to cancel your subscription, go to "Edit Settings". All credit card information will be available there. If you should decide to cancel your subscription, it will continue to be valid until the next payment period, as all payments for the current period were made in advance. For special circumstances, please email


StudySoup has more than 1 million course-specific study resources to help students study smarter. If you’re having trouble finding what you’re looking for, our customer support team can help you find what you need! Feel free to contact them here:

Recurring Subscriptions: If you have canceled your recurring subscription on the day of renewal and have not downloaded any documents, you may request a refund by submitting an email to

Satisfaction Guarantee: If you’re not satisfied with your subscription, you can contact us for further help. Contact must be made within 3 business days of your subscription purchase and your refund request will be subject for review.

Please Note: Refunds can never be provided more than 30 days after the initial purchase date regardless of your activity on the site.