Theme Options

NEWSLETTER

Computer Security

1430

New

Computer Security

 

Author: Abhijeet Mirikar, Yogesh Pawar, Shraddha Kulkarni (Deshak)

T.Y.Diploma Sem V, Computer Engineering Group, MSBTE

BI: 1430

ISBN: 978-93-5016-251-4

Solved Question Papers upto 2015 Winter

More details

Rs.162

Rs.180

-10%

Contents

1. Introduction to Computer Security and Security Trends

1. Introduction

1.1 Computer Security

1.2 Need for Security

1.3 Security Basics

1.4  Example of Security

1.5 Challenges for Security

1.6 Model for Security

2. Risk and Threat Analysis

2.1 Assets

2.2 Vulnerabilities

2.3 Threats

2.4 Risk

2.5 Countermeasures

3. Threat to Security

3.1 Viruses and Worms

3.2 Virus

3.3 Phases of Computer Virus Life Cycle

3.4 Types of Viruses

3.5 Worms

3.6 Intruders

3.7 Insiders

3.8 Criminal Organizations

3.9 Information Warfare Avenues of Attack

3.10 Steps in Attack

4. Security Attacks

4.1 Passive Attacks and Active Attacks

4.2 Backdoor and Trapdoor

4.3 Sniffing

4.4 Spoofing

4.5 Man-in-Middle

4.6 TCP/IP Hacking

4.7 Encryption Attacks

5. Malware

2. Identification, Authentication and Operational Security

1. Introduction

1.1 User Name and Password

1.2 Managing Passwords

1.3 Choosing Password

2. Role of People in Security

2.1 Password Selection

2.2 Piggybacking

2.3 Shoulder Surfing

2.4 Dumpster Diving

2.5 Installing Unauthorized Software/Hardware

2.6 Access by Nonemployees

2.7 Security Awareness

2.8 Individual User Responsibilities

3. Access Controls

3.1 DAC

3.2 MAC

3.3 RBAC

3.4 Biometrics

3. Cryptography

1. Introduction

2. Terms Used in Cryptography

2.1 Substitution Techniques

3. Transposition Techniques

3.1 Rail Fence Technique

3.2 Simple Columnar

3.3 Steganography (from Greek word steganos, or ‘covered,’ and graphic or ‘writing’)

4. Hashing – Concept

5. Symmetric and Asymmetric Cryptography

5.1 Introduction to Symmetric Encryption

5.2 Asymmetric Key Cryptography

4. Computer Security Technology and Intrusion Detection

1. Firewalls

1.1 Need for Firewall

1.2 Limitations and Characteristics

1.3 Types of Firewall

1.4 Implementing Firewall

2. Virtual Private Network

2.1 Kerberos Concept

2.2 Security Topologies

3. Intrusion Detection

3.1 Intrusion Detection Systems (IDS)

4. Email Security

4.1 Email Security Standards

4.2 Simple Mail Transfer Protocol (SMTP)

4.3 Privacy Enhanced Mail (PEM)

4.4 Pretty Good Privacy (PGP)

4.5 Secure Multipurpose Internet Mail Extension(S/MIME)

5. IP Security

5.1 IPSec Overview

5.2 IPSec Architecture

5. IT Act and Cyber Law

1. Introduction

2. Deleted File Recovery

2.1 Formatted Partition Recovery

2.2 Data Recovery Tools

2.3 Data Recovery Procedures

2.4 Data Recovery Ethics

3. Introduction to Cyber Crimes

4. Introduction to Cyber Laws

4.1 Introduction to IT Act 2000

4.2 Introduction to IT Act 2008

6. Application and Web Security

1. Application Hardening

1.1 Application Patches

1.2 Web Servers

1.3 Active Directory

2. Web Security Threats

2.1 Web Traffic Security Approaches

2.2 Secure Socket Layer and Transport Layer Security

2.3 Transport Layer Security

2.4 Secure Electronic Transaction (SET)

No customer comments for the moment.

Write a review

Write a review

13 other products in the same category:

Customers who bought this product also bought: