没有合适的资源?快使用搜索试试~ 我知道了~
温馨提示
![preview](https://dl-preview.csdnimg.cn/89495073/0001-21d2b560c62f93c7db81af34c138fa36_thumbnail.jpeg)
![preview-icon](https://csdnimg.cn/release/downloadcmsfe/public/img/scale.ab9e0183.png)
试读
15页
Table of Contents About the Tutorial i Audience i Prerequisites i Disclaimer & Copyright i Table of Contentsii 1. NETWORK SECURITY — OVERVIEW 1 Physical Network 1 Network Protocol 2 Goals of Network Security 6 Achieving Network Security 6 2. NETWORK SECURITY — APPLICATION LAYER SECURITY 8 E-mail Security 8 PGP 13 S / MIME 15 DNS Security 16 Summary 18
资源推荐
资源详情
资源评论
![application/x-zip](https://img-home.csdnimg.cn/images/20210720083736.png)
![application/x-rar](https://img-home.csdnimg.cn/images/20210720083606.png)
![application/x-rar](https://img-home.csdnimg.cn/images/20210720083606.png)
![md](https://img-home.csdnimg.cn/images/20210720083646.png)
![rar](https://img-home.csdnimg.cn/images/20210720083606.png)
![zip](https://img-home.csdnimg.cn/images/20210720083736.png)
![pdf](https://img-home.csdnimg.cn/images/20210720083512.png)
![zip](https://img-home.csdnimg.cn/images/20210720083736.png)
![zip](https://img-home.csdnimg.cn/images/20210720083736.png)
![md](https://img-home.csdnimg.cn/images/20210720083646.png)
![rar](https://img-home.csdnimg.cn/images/20210720083606.png)
![zip](https://img-home.csdnimg.cn/images/20210720083736.png)
![zip](https://img-home.csdnimg.cn/images/20210720083736.png)
![rar](https://img-home.csdnimg.cn/images/20210720083606.png)
![zip](https://img-home.csdnimg.cn/images/20210720083736.png)
![docx](https://img-home.csdnimg.cn/images/20210720083331.png)
![pdf](https://img-home.csdnimg.cn/images/20210720083512.png)
![](https://csdnimg.cn/release/download_crawler_static/89495073/bg1.jpg)
![](https://csdnimg.cn/release/download_crawler_static/89495073/bg2.jpg)
Network Security
i
About the Tutorial
Network Security deals with all aspects related to the protection of the sensitive
information assets existing on the network. It covers various mechanisms developed to
provide fundamental security services for data communication.
This tutorial introduces you to several types of network vulnerabilities and attacks followed
by the description of security measures employed against them. It describes the
functioning of most common security protocols employed at different networking layers
right from application to data link layer. After going through this tutorial, you will find
yourself at an intermediate level of knowledge regarding network security.
Audience
This tutorial is prepared for beginners to help them understand the basics of network
security. The ones who are keen on taking up career in the field of Information and
Network security, this tutorial is extremely useful. For all other readers, this tutorial is a
good learning material.
Prerequisites
We assume the reader has a basic understanding of computer networking and
cryptography. Knowledge about communication protocols is a plus.
Disclaimer & Copyright
Copyright 2018 by Tutorials Point (I) Pvt. Ltd.
All the content and graphics published in this e-book are the property of Tutorials Point (I)
Pvt. Ltd. The user of this e-book is prohibited to reuse, retain, copy, distribute or republish
any contents or a part of contents of this e-book in any manner without written consent
of the publisher.
We strive to update the contents of our website and tutorials as timely and as precisely as
possible, however, the contents may contain inaccuracies or errors. Tutorials Point (I) Pvt.
Ltd. provides no guarantee regarding the accuracy, timeliness or completeness of our
website or its contents including this tutorial. If you discover any errors on our website or
in this tutorial, please notify us at contact@tutorialspoint.com.
![](https://csdnimg.cn/release/download_crawler_static/89495073/bg3.jpg)
Network Security
ii
Table of Contents
About the Tutorial .................................................................................................................................... i
Audience .................................................................................................................................................. i
Prerequisites ............................................................................................................................................ i
Disclaimer & Copyright ............................................................................................................................. i
Table of Contents .................................................................................................................................... ii
1. NETWORK SECURITY — OVERVIEW ..................................................................................... 1
Physical Network .................................................................................................................................... 1
Network Protocol .................................................................................................................................... 2
Goals of Network Security ....................................................................................................................... 6
Achieving Network Security .................................................................................................................... 6
2. NETWORK SECURITY — APPLICATION LAYER SECURITY ....................................................... 8
E-mail Security ........................................................................................................................................ 8
PGP ....................................................................................................................................................... 13
S / MIME ............................................................................................................................................... 15
DNS Security ......................................................................................................................................... 16
Summary ............................................................................................................................................... 18
3. NETWORK SECURITY — SECURITY IN TRANSPORT LAYER .................................................. 19
Need for Transport Layer Security ......................................................................................................... 19
Secure Socket Layer (SSL) ...................................................................................................................... 20
TLS Protocol .......................................................................................................................................... 27
Secure Browsing - HTTPS ....................................................................................................................... 28
Secure Shell Protocol (SSH) ................................................................................................................... 30
Benefits & Limitations ........................................................................................................................... 32
Summary ............................................................................................................................................... 32
剩余14页未读,继续阅读
资源评论
![avatar-default](https://csdnimg.cn/release/downloadcmsfe/public/img/lazyLogo2.1882d7f4.png)
![avatar](https://profile-avatar.csdnimg.cn/default.jpg!1)
![avatar-vip](https://csdnimg.cn/release/downloadcmsfe/public/img/user-vip.1c89f3c5.png)
concisedistinct
- 粉丝: 1271
- 资源: 146
上传资源 快速赚钱
我的内容管理 展开
我的资源 快来上传第一个资源
我的收益
登录查看自己的收益我的积分 登录查看自己的积分
我的C币 登录后查看C币余额
我的收藏
我的下载
下载帮助
![voice](https://csdnimg.cn/release/downloadcmsfe/public/img/voice.245cc511.png)
![center-task](https://csdnimg.cn/release/downloadcmsfe/public/img/center-task.c2eda91a.png)
安全验证
文档复制为VIP权益,开通VIP直接复制
![dialog-icon](https://csdnimg.cn/release/downloadcmsfe/public/img/green-success.6a4acb44.png)