merkow ppt 12-JRM
merkow ppt 12-JRM merkow ppt 12-JRM
OSI Reference Model and TCP/IP cont. � FTP (File Transfer Protocol) � TFTP (Trivial File Transfer Protocol) � SMTP (Simple Mail Transfer Protocol) � RPC (Remote Procedure Call) � HTTP (Hyper Text Transfer Protocol) © Pearson Education Information Security: Principles and Practices 10
OSI Model and Security � Security Services � Authentication � Access control � Data confidentiality � Data integrity � Nonrepudiation � Logging and monitoring � Security Mechanisms � Encipherment � Digital signature � Access control � Data integrity � Authentication � Traffic padding � Routing protocol � Notarization © Pearson Education Information Security: Principles and Practices 11
- Page 1 and 2: Information Security Principles and
- Page 3 and 4: Network Security in Context � Con
- Page 5 and 6: OSI Reference Model cont. © Pearso
- Page 7 and 8: OSI Reference Model and TCP/IP cont
- Page 9: OSI Reference Model and TCP/IP cont
- Page 13 and 14: Data Network Types cont. � Intern
- Page 15 and 16: Basic Security Infrastructures cont
- Page 17 and 18: Basic Security Infrastructures cont
- Page 19 and 20: Firewalls � Firewalls typically r
- Page 21 and 22: Firewalls cont. � Bastion Hosts
- Page 23 and 24: Firewalls cont. � Limitations of
- Page 25 and 26: Application-Level Gateway Firewall
- Page 27 and 28: Screened Host Firewall System (Sing
- Page 29 and 30: Screened-Subnet Firewall System ©
- Page 31 and 32: Intrusion Detection Systems (IDS) -
- Page 33 and 34: Intrusion Detection Systems (IDS) c
- Page 35 and 36: Virtual Private Networks (VPNs) �
- Page 37 and 38: Virtual Private Networks (VPNs) con
- Page 39 and 40: Virtual Private Networks (VPNs) con
- Page 41: Summary � The Telecommunications,
OSI Model and Security<br />
� Security Services<br />
� Authentication<br />
� Access control<br />
� Data confidentiality<br />
� Data integrity<br />
� Nonrepudiation<br />
� Logging and<br />
monitoring<br />
� Security Mechanisms<br />
� Encipherment<br />
� Digital signature<br />
� Access control<br />
� Data integrity<br />
� Authentication<br />
� Traffic padding<br />
� Routing protocol<br />
� Notarization<br />
© Pearson Education Information Security:<br />
Principles and Practices 11