ABSTRACT

Unlike data communications of the past, today's networks consist of numerous devices that handle the data as it passes from the sender to the receiver. However, security concerns are frequently raised in circumstances where interconnected computers use a network not controlled by any one entity or organization. Introduction to Network Security exam

part |2 pages

Part I Introduction to Network Concepts and Threats

chapter 1|20 pages

Network Architecture

chapter 2|16 pages

Network Protocols

chapter 3|22 pages

The Internet

chapter 4|22 pages

Taxonomy of Network-Based Vulnerabilities

part |2 pages

Part II Lower-Layer Security

chapter 5|50 pages

Physical Network Layer Overview

chapter 6|86 pages

Network Layer Protocols

chapter 7|38 pages

Transport Layer Protocols

part |2 pages

Part III: Application Layer Security

chapter 8|10 pages

Application Layer Overview

chapter 9|50 pages

Email

chapter 10|46 pages

Web Security

chapter 11|58 pages

Remote Access Security

part |2 pages

Part IV Network-Based Mitigation

chapter 12|18 pages

Common Network Security Devices