- Chicken: the so-called “chicken” is a kind of very image of metaphor, metaphor that can be our control computer, each other can be a WINDOWS system, can also be a UNIX/LINUX system, can be a ordinary PC, also can be large server, we can like operating their computers to manipulate them, and not be found by the other party.
2. Trojans: Programs that appear to be normal, but when run by a program, gain control of the entire system. There are a lot of hackers are enthusiastic about using trojans to control other people’s computers, such as Gray Pigeon, black hole,PcShare and so on.
3. Web Trojan: disguised as ordinary web page files on the surface or directly insert the code into the normal web page files, when someone visits, the web Trojan will use the other system or browser vulnerabilities will automatically configure the Trojan server download to the visitor’s computer automatic execution.
4. Horse hanging: is in other people’s website files into the web Trojan or the code into the other party’s normal web files, in order to make visitors horse.
Written by renowned author William Stallings, this book is an important and influential textbook in the field of network security.
● Chapter Introduction 1.1 Computer Security Concepts 1.1.1 Definition of Computer Security 1.1.2 Computer Security challenges 1.2 OSI Security Architecture 1.3 Security Attacks 1.3.1 Passive Attacks 1.3.2 Active Attacks 1.4 Security Services 1.4.1 Authentication 1.4.2 Access Control 1.4.3 Data Confidentiality 1.4.4 Data integrity 1.4.5 Non-repudiation 1.4.6 Availability Services 1.5 Security Mechanisms 1.6 Basic Security Design Guidelines 1.7 Attack Surfaces and Attack Trees 1.7.1 Attack Surfaces 1.7.2 Attack Trees 1.8 Network Security Model 1.9 Standards Chapter 2 Symmetric Encryption and Message Confidentiality 2.1 Symmetric Encryption Principles 2.1.1 Cryptography 2.1.2 Cryptanalysis 2.1.3 Feistel Password structure 2.2 Symmetric block encryption algorithm 2.2.1 Data Encryption Standard 2.2.2 Triple DES 2.2.3 Good Encryption Standard 2.3 Random and pseudorandom numbers 2.3.1 Applications of random numbers 2.3.2 True random number generator, pseudorandom number generator and pseudorandom function 2.3.3 Algorithm design 2.4 Stream Ciphers and RC4 2.4.1 Stream Ciphers structure 2.4.2 RC4 Algorithm 2.5 Block Ciphers Working Mode 2.5.1 Electronic Ciphers This mode 2.5.2 Block Link Mode 2.5.3 Password feedback mode 2.5.4 Counter mode 2.6 Keywords, Thoughts and Exercises 2.6.1 Keywords 2.6.2 Thinking questions 2.6.3 Exercises Chapter 3 Public Key Cryptography and Message Authentication 3.1 Message Authentication Methods 3.1.1 Message Authentication Using conventional Encryption 3.1.2 Non-encrypted Message Authentication 3.2 Secure Hash Function 3.2.1 Requirements of Hash Function 3.2.2 Security of Hash function 3.2.3 Simple Hash Function 3.2.4 SHA Hash Function 3.3 Message Authentication Code 3.3.1 HMAC 3.3.2 MAC Based on block Passwords 3.4 Principles of Public Key Cryptography 3.4.1 Public Key Cryptography 3.4.2 Application of public Key cryptography 3.4.3 Public Key Password Requirements 3.5 Public Key Cryptography Algorithm 3.5.1 RSA Public Key Cryptography Algorithm 3.5.2 Diffie-Hellman Key Exchange 3.5.3 Other Public Key Cryptography Algorithms 3.6 Digital Signature…… Chapter 4 Key Distribution and User Authentication Chapter 5 Network Access Control and Cloud Security Chapter 6 Transport Layer Security Chapter 7 Wireless Network Security Chapter 8 Email Security Chapter 9 IP Security Chapter 0 Malware Chapter 1 Intruders Chapter 2 Firewalls Appendix A Some number theory results Appendix B Network security teaching project References
Content abstract
Written by William Stallings, this book is an important and influential textbook in the field of network security. Book is a basic and important network security a textbook or reference, this paper mainly introduces the basic framework of network security, the main standards and important applications, the book consists of three parts, part introduces the basic concepts of the modern cryptography, important cryptographic algorithm, and the function and role in the solution of network security password algorithm; The second part introduces the core and important content of network security, including the basic architecture and main standards of key distribution, user authentication, network access control, cloud security, transport layer security, wireless network security, E-mail security and network layer security. The second part is system security, mainly introduces the basic contents and methods of malicious software, intruder and firewall. The book can be used as a teaching material for undergraduates and postgraduates majoring in computer, information security and network security in colleges and universities, as well as a reference book for readers learning the basic content of network security to understand the basic principles of network security.
Note: Nuggets for free access to network security information