没有合适的资源?快使用搜索试试~ 我知道了~
温馨提示
Table of Contents About the Tutorial i Audience i Prerequisites i Disclaimer & Copyright i Table of Contentsii 1. NETWORK SECURITY — OVERVIEW 1 Physical Network 1 Network Protocol 2 Goals of Network Security 6 Achieving Network Security 6 2. NETWORK SECURITY — APPLICATION LAYER SECURITY 8 E-mail Security 8 PGP 13 S / MIME 15 DNS Security 16 Summary 18
资源推荐
资源详情
资源评论
Network Security
i
About the Tutorial
Network Security deals with all aspects related to the protection of the sensitive
information assets existing on the network. It covers various mechanisms developed to
provide fundamental security services for data communication.
This tutorial introduces you to several types of network vulnerabilities and attacks followed
by the description of security measures employed against them. It describes the
functioning of most common security protocols employed at different networking layers
right from application to data link layer. After going through this tutorial, you will find
yourself at an intermediate level of knowledge regarding network security.
Audience
This tutorial is prepared for beginners to help them understand the basics of network
security. The ones who are keen on taking up career in the field of Information and
Network security, this tutorial is extremely useful. For all other readers, this tutorial is a
good learning material.
Prerequisites
We assume the reader has a basic understanding of computer networking and
cryptography. Knowledge about communication protocols is a plus.
Disclaimer & Copyright
Copyright 2018 by Tutorials Point (I) Pvt. Ltd.
All the content and graphics published in this e-book are the property of Tutorials Point (I)
Pvt. Ltd. The user of this e-book is prohibited to reuse, retain, copy, distribute or republish
any contents or a part of contents of this e-book in any manner without written consent
of the publisher.
We strive to update the contents of our website and tutorials as timely and as precisely as
possible, however, the contents may contain inaccuracies or errors. Tutorials Point (I) Pvt.
Ltd. provides no guarantee regarding the accuracy, timeliness or completeness of our
website or its contents including this tutorial. If you discover any errors on our website or
in this tutorial, please notify us at contact@tutorialspoint.com.
Network Security
ii
Table of Contents
About the Tutorial .................................................................................................................................... i
Audience .................................................................................................................................................. i
Prerequisites ............................................................................................................................................ i
Disclaimer & Copyright ............................................................................................................................. i
Table of Contents .................................................................................................................................... ii
1. NETWORK SECURITY — OVERVIEW ..................................................................................... 1
Physical Network .................................................................................................................................... 1
Network Protocol .................................................................................................................................... 2
Goals of Network Security ....................................................................................................................... 6
Achieving Network Security .................................................................................................................... 6
2. NETWORK SECURITY — APPLICATION LAYER SECURITY ....................................................... 8
E-mail Security ........................................................................................................................................ 8
PGP ....................................................................................................................................................... 13
S / MIME ............................................................................................................................................... 15
DNS Security ......................................................................................................................................... 16
Summary ............................................................................................................................................... 18
3. NETWORK SECURITY — SECURITY IN TRANSPORT LAYER .................................................. 19
Need for Transport Layer Security ......................................................................................................... 19
Secure Socket Layer (SSL) ...................................................................................................................... 20
TLS Protocol .......................................................................................................................................... 27
Secure Browsing - HTTPS ....................................................................................................................... 28
Secure Shell Protocol (SSH) ................................................................................................................... 30
Benefits & Limitations ........................................................................................................................... 32
Summary ............................................................................................................................................... 32
剩余14页未读,继续阅读
资源评论
concisedistinct
- 粉丝: 6547
- 资源: 237
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- whl@pip install pyaudio ERROR: Failed building wheel for pyaudio
- Constantsfd密钥和权限集合.kt
- 基于Java的财务报销管理系统后端开发源码
- 基于Python核心技术的cola项目设计源码介绍
- 基于Python及多语言集成的TSDT软件过程改进设计源码
- 基于Java语言的歌唱比赛评分系统设计源码
- 基于JavaEE技术的课程项目答辩源码设计——杨晔萌、李知林、岳圣杰、张俊范小组作品
- 基于Java原生安卓开发的蔚蓝档案娱乐应用设计源码
- 基于Java、Vue、JavaScript、CSS、HTML的毕设设计源码
- 基于Java和HTML的CMS看点咨询系统设计源码
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功