The purpose of this book is to teach all aspects of computer security to anyone interested in knowing it.
Contents
- The Basics of Computer Security
- Why is security needed?
- The OSI security architecture
- Threats
- Vulnerabilities
- The infiltrators
- How to protect yourself?
- Cryptography
- Types of encryption
- Symmetric key encryption
- Stream cipher
- Block cipher
- The Data Encryption Standard(DES)
- The Advanced Encryption Standard(AES)
- Asymmetric key encryption
- Knapsack
- RSA
- Diffie Hellman Key Exchange Algorithm
- Session key distribution
- Public key distribution
- PKI
- Hash Functions
- MD5
- SHA-1
- Tiger Hash Function
- Birthday problem
- Access Control
- Authentication
- Access Control Matrix
- Access Control List
- Security Models
- Covert channels
- Software Security
- Network Security
This article is issued from Wikibooks. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.