ABSTRACT

Contents 1.1 Related Works .................................................................................................................... 2 1.2 Introduction ....................................................................................................................... 3 1.3 About Information Systems and Security and Applicable Areas ......................................... 4

1.3.1 The Basics ............................................................................................................... 4 1.3.2 Cryptography to the Rescue .................................................................................... 4

1.4 Challenges in Information Security versus Traditional Security ......................................... 5 1.5 Areas in Secure Computing ................................................................................................ 5

1.5.1 Protocol Attacks and Prevention, Secure Protocols ................................................. 6 1.5.1.1 TCP Sequence Number Prediction Attack ............................................... 6 1.5.1.2 Routing Protocol Attacks .......................................................................... 7 1.5.1.3 Server Attacks ........................................................................................... 8 1.5.1.4 Some Other Services/Protocols ................................................................. 9 1.5.1.5 Trivial Issues ............................................................................................10