Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cryptography and System Security (Hashes, Message Digests and Digital…
Cryptography and System Security
Network Security and Applications
Denial of Service
Classic DOS attacks
ICMP flood, SYN flood, UDP flood
Source Address spoofing
Distributed Denial of Service
Defenses against Denial of Service Attacks
Internet Security Protocols
SSL, IPSEC
PGP, Firewalls, IDS and types, Honey pots
Network security basics
.
TCP/IP vulnerabilities (Layer wise)
Packe Sniffing, ARP spoofing, port scanning, IP spoofing, TCP syn flood
DNS Spoofing
System Security
Software Vulnerabilities
cross-site
scripting
SQL injection
Format string
Buffer Overflow
Malware
Viruses
Worms
Trojans
Logic
Bomb
Bots
Rootkits
Symmetric and Asymmetric key Cryptography and key Management
DES
Double DES, Triple DES, Advanced Encryption Standard (AES)
block cipher modes of operation
Stream Ciphers
RC5 algorithm.
Block cipher principles
Public key cryptography
Principles of public key cryptosystems-The
RSA algorithm
The knapsack algorithm
ElGamal Algorithm
Key management techniques
using symmetric and asymmetric
algorithms and trusted third party
Diffie Hellman Key exchange
algorithm
Authentication Protocols & Digital signature schemes
User Authentication and Entity Authentication
One-way and mutual authentication schemes
Needham Schroeder Authentication protocol
Kerberos Authentication protocol
Digital Signature Schemes
RSA
EIGamal and Schnorr signature scheme
Introduction & Number Theory
Security Goals, Services, Mechanisms and attacks, The OSI security architecture
Network security model
Classical Encryption techniques
Symmetric cipher model
mono-alphabetic and polyalphabetic substitution techniques
Vigenere cipher
Hill cipher
playfair cipher
transposition techniques
steganography
keyed and keyless transposition ciphers
Modular Arithmetic and Number Theory
Euclid‘s algorithm
Prime numbers-Fermat‘s and Euler‘s theorem
Testing for primality -The Chinese remainder theorem
Discrete logarithms
Hashes, Message Digests and Digital Certificates
Cryptographic hash functions
Properties of secure hash function
MD5
SHA-1
MAC
HMAC
CMAC
Digital Certificate
PKl
X.509