安全复习索引修改版V10资料讲解Word下载.docx
《安全复习索引修改版V10资料讲解Word下载.docx》由会员分享,可在线阅读,更多相关《安全复习索引修改版V10资料讲解Word下载.docx(19页珍藏版)》请在冰豆网上搜索。
ISM信息安全管理P48
ISMS信息安全管理体系P49
信息安全管理的目标&
原则&
实施(PDCA)P51-58
SecurityAudit安全审计
Definition定义P60&
62
Process过程P62&
63
内容P64
信息安全审计与信息安全管理的关系P65-66
LevelsofInformationSecurity信息安全级别
Theeightinformationsecuritylevels八个信息安全级别P68-69
信息安全管理等级P72-75
Conclusion总结
Standardorganization标准组织P80
Levelsofimpact(low,moderate,high)影响级别P82-84
Computersecuritychallenges电脑安全挑战P85
Passiveattacks被动攻击(interception拦截,trafficanalysis交通分析)P88-89
Activeattacks主动攻击(interruption中断,fabrication构建,replay,modification)P90-93
Chapter2CryptographicTechniques密码学技术
2.1CryptologyIntroduction密码学介绍
CryptologydefinitionP5-7
History(Manual、Mechanical、Modern)9-12
Concepts&
Items
PlainTextandCipherText无格式文本和密码文本P14
KeyandKeySpace秘钥和秘钥空间P14
CryptosystemServices(confidentiality机密性,integrity完整性,authenticity确定性.Non-reputation不可抵赖性,accesscontrol受控性,symmetric对称性,asymmetric非对称)P15-17
AttributesofStrongEncryption加密技术(confusion混乱,diffusion扩散)P18
2.2SymmetricKeyCryptographicAlgorithms对称密码和密码算法
IntroductionP20-21
AlgorithmTypes&
Modes
blockcipher(块加密)P22&
25
StreamCipher(流加密)P23&
24
ElectronicCodeBook(ECB)Mode(电子密码本模式)P26-30
CipherBlockChaining(CBC)Mode(密码块链接模式)P31-34
CipherFeedback(CFB)Mode(密文反馈模式)P35-37
OutputFeedback(OFB)Mode输出反馈模式P38-39
DataEncryptionStandard(DES)数据加密标准
BackgroundandHistoryP40
**HowDESWorksP42
AdvancedEncryptionStandard高级密码标准(AES)
Introductionp44
**HowAESWorksP45-46
2.3AsymmetricKeyCryptographicAlgorithms非对称秘钥密码算法
IntroductionP48-52
TheRSAAlgorithm
Introductionp53-55
**HowRSAWorksP56-58
公钥和私钥产生p59
加密消息P60
解密消息P61
解码原理P62
ExampleP63-72
DigitalSignatures数字签名P73
2.4HashingAlgorithms(散列算法)
IntroductionP76-77
Message-DigestAlgorithm(MD5)
What’sMD5P78
Chapter3:
AuthenticationTechnologies认证(识别)技术
3.1.Overview
IntroductiontoAuthenticationTechnologies
WhatisAuthentication,identification,authorization?
什么是认证、身份识别、授权p6
Authenticationinvolvestwoparties包含两个团体prover&
identifierp7
TwokindofAuthentication一种是整体认证,一种是(部分)信息认证p8-10
Goals认证技术的目标(或说好的认证技术必须要有的条件)p11
ThreeclassesofentityauthenticationP12
TheWeak/StrongAuthenticationScheme弱的和强的几种认证手段
Weak:
基于passwordp13
基于PIN(time-invariantpassword)p14
strong:
secretkey加密p15
publickey加密p16
zero-knowledge加密p17
基于设备的加密p18
TheApplicationofAuthenticationTechnologies
两种认证的services,X.509和Kerberosp19
TheAttacktoAuthentication几种攻击种类p20
Impersonation假冒
Replay重放
Forceddelayattacks强迫延时
Interleaving交错
Oraclesessionoracle会话
Parallelsession并行会话
TheSecurityGuidelinestoProtectAuthenticationSchemes
保证安全的几项原则p21
3.2.PublicKeyInfrastructurePKI的基础设施(基础内容)
IntroductiontoPKI介绍是什么&
用来做什么p24-27
PKIXPKI+X.509P28
End-entity;
PKC公钥证书;
CA证书授权机构;
CR证书仓库p28
End-entity,PKCP30
CA,CR,CRL(证书撤回清单/证书吊销列表),CRLissuer,RA(注册机构)P31-32
PKIdocumentP33
CP(certificate证书policy,certificatepracticestatement)P34
Subscriber签署agreements,relyingpartyagreementsP35
TheManagementofPKIXp36
PublicKeyCertificate证书内容样例p37
TrustHierarchyModel严格信任层次p38
3.3.Kerberos麻省理工学院开发的安全认证系统
WhatisKerberosp40-41
History&
Developmentp42
Description描述(看图)p45-47
Processp48-54
Drawbacks&
Limitations缺点限制p55-56
3.4.X.509
WhatisX.509X.509被广泛使用的数字证书标准p58
HierarchyP59
HistoryandVersionp60
Certificatep61
Structureofcertificatep62-63
Howtogetitp64
Revoke撤回acertificatep65
Securityproblemsp66
Applicationp68
Chapter4:
IntroductiontoInternetSecurity
4.1.NetworkSecurityArchitectures
LevelsofNetworkSecurityArchitectures
网络安全防范体系(物理层,系统层,网络层,应用层,安全管理)p6-9
OSI/ISO7498-2ModelP10-11
PDR,P2DRandPDRRSecurityModelP10
ISO7498-2ArchitecturesP12
Securitylife-cycleP13
Threats,services&
Mechanismsp14
SecuritydomainsandsecuritypoliciesP15
TypesofsecuritypoliciesP17
Securitythreat/attack,safeguards,vulnerabilitiesP18
RiskP19
ClassificationofthreatsP20
FundamentalthreatsP21
PrimaryenablingthreatsP22
Thetwoplantingthreats(Trojanhorse,trapdoor)P23
ISOsecurityservicesP24
Administrativesecurity,mediasecurity,emanationssecurity,lifecyclecontrolsP25
Fivemaincategoriesofsecurityservice
AuthenticationP27
accesscontrolP28
dataconfidentialityP29
dataintegrityP30
non-reputationP32
ISOsecuritymechanisms(8种方法)p33-36
Encryptionmechanisms
Digitalsignaturemechanisms
Accesscontrolmechanisms
Dataintegritymechanisms
Authenticationexchangemechanisms
Trafficpaddingmechanisms
Routingcontrolmechanisms
Notarizationmechanisms
TCP/IPsecurityp47
4.2.IPSec
Introduction将IP包先加密在传输p49&
52
HowIPsecprotectus
Whatdoweneedtoprotectp53
HowdoesIPsecprovideusp54-56
SomeBasicConceptsAboutIPSecp23
基本概念:
SA;
SAD;
SPI;
SPD;
AH;
ESP(比AH多了加密的功能);
TunnelMode;
TransportMode;
p58--65
ESPprotocol
Tunnelmode&
Transportmode(ESP)p67-77
报文datagram
装包过程
拆包过程
AHProtocol提供完整性量度和来源认证,不提供加密P79-82
GatewayandRoadWarriormodeP85
IPSec的通常应用情况P84
IKE(KeymanagementofIPSec)86
使用IKE的IPsec的密钥协商分为两个阶段p88-89
4.3.SSL/TLS
Introductionp91-93
一个简化后的SSL/TLS模型p94-96
HowTLSWorksp97-104
会话、连接、写模式、读模式、安全套件、预主密钥、记录层协议、握手协议、应用数据协议
TLS握手(以RSA为例子)p105-111
KeyGeneration握手密钥协商成功后进行密钥保护通信过程(密钥的生成,主密钥的计算,密钥块的计算,应用数据协议)P112
ResumeofTLShandshake恢复p118-119
4.4.VPN
Introductionp124
OpenVPN
IntruductionP126-127
工作过程p128-129
Chapter5:
NetworkAttackandDefence
5.1.Overview
NetworkSecurityCrisis(网络安全危机)P7
网络病毒P8
黑客和黑客程序P9
信息生态恶化P10
TypesofNetworkAttack(网络攻击类型)破坏型和入侵型、被动型和主动型P11、12
窃听P13
数据篡改、身份欺骗(IP地址欺骗)P14
盗用口令攻击P15
拒绝服务攻击(DoS)P16
中间人攻击、盗取密钥攻击P17
嗅探器攻击P18
应用层攻击P19
StepsofNetworkAttack(网络攻击步骤)P20-23
准备
实施
善后
PortScan(端口扫描)P24
端口扫描工具(NMap&
superscan)P25-30
PortScanTypes(端口扫描类型)P31
TCP/SYN/UDP/ACK/FINScanningP32-41
IdleScan(空闲扫描)P42-49
MethodsofNetworkDefense(网络防御的方法)P50
Regularsecuritydefend(常规的安全防护)P51
5.2.PasswordCracking(密码破解)
TheVulnerabilityofPasswords(密码的易损性/弱点)P53
PasswordSelectionStrategies(密码选择策略)
Usereducation
Computer-generatedpasswords
Reactivepasswordchecking
Proactivepasswordchecking
UseofhashedpasswordP54-60
PasswordCracking(密码破解)
Usingsystembug(利用系统漏洞直接提取口令)
Bruteforce(暴力破解)
Precomputingpotentialhashvales(字典破解)P62-64
针对口令破解攻击的防范措施P64
UsefulTools(有用的工具)P65
5.3.BufferOverflow(缓冲区溢出)
Background(背景)(definition&
destruction)P68-69
StructureofanAddressSpace(地址空间结构)P71-72
堆栈溢出攻击的例子P73-78
Causeofvulnerability(易损性的原因)P79
AttackClassification(攻击分类)P80
Stackbufferoverflow(栈溢出)P81-85
Heapbufferoverflow(堆溢出)P86
AttackPracticalities(攻击实例)P87-90
ProtectionSolutions(防护方法)P95-107
5.4.DoSAttack(DoS攻击)
Definition(定义)P109
DifferentKindsofDoS(DoS的不同种类)P110
Flooding(过载)
Crashing(摧毁)
DifferentkindsofDoSP111
TCP/IP攻击P112-114
UDP攻击P115-117
5.5.SpoofingAttack(欺骗攻击)
DNSSpoofing(DNS欺骗)P120
MITMattacks(中间人攻击)P120
ARPcachepoisoningP121-128
DNSspoofingP129-137
DefendingAgainstDNSSpoofing(DNS欺骗防御)P141-143
WebSpoofing(Web欺骗/网页仿冒)P144
WhatisWebSpoofing(什么是Web欺骗)P145
Differenttypesofwebspoofing(Web欺骗类型)P147-148
HowtospotaspoofedwebpageP150
IPSpoofing(IP欺骗)P152
TCP/IP简要介绍P154-156
IPspoofingP156-179
DoS/DDoSP180-183
DefendingAgainsttheThreat(防御措施)P184
Chapter6:
Firewall
6.1.IntroductiontoFirewall(防火墙介绍)
WhatIsaFirewall(什么是防火墙&
功能)P6
TypesofFirewall(防火墙的类型)P7&
16-19
PacketfiltersP8-9
StatefulfiltersP10
ApplicationfiltersP11
WhatCanaFirewallDo(防火墙的功能)P20—26
WheretobaseafirewallP28
Bastionhost(堡垒主机)P29
SecuritybastionhostsP30-31
Host-basedfirewallP32
Advantagesofusinghost-basedfirewallsP33
PersonalfirewallP34
DMZnetworkP35-36
VPNnetworkP37-38
DistributedfirewallsP39
6.2.DesignPrinciplesofFirewall(防火墙的设计原则)
PacketFilteringFirewall(包过滤防火墙)
WhatisPacketFilteringFirewall(什么是包过滤防火墙)P42-43
HowPacketFilteringFirewallWorks(包过滤防火墙如何工作)P44-48
WhattoFilter(过滤对象)P48-53
Advantages(优点)P54-55
Disadvantages(弱点)P56-59
PacketFilteringFirewallBasedonthestate(基于状态检测的防火墙)P60
WhatisStatefulInspectionFirewall(什么是状态检测防火墙)P61-62
HowStatefulInspectionFirewallWorks(状态检测技术原理)P63-64
Advantages(优点)P65-66
Disadvantages(缺点)P66
ApplicationLayerFirewall(应用层代理防火墙)(ALG)P67
WhatisProxy(什么是代理服务器)P68-69
FunctionOfferedByProxy(功能)
Authenticationmechanism
Contentfiltering
MaturelogP72-73
Advantages(优点)P74-76
Disadvantage(缺点)P77-78
Bastionhost(堡垒主机)P80
TopologicalGraph(堡垒主机拓扑图)P81-82
堡垒主机的分类P83
传统应用的P84
安全堡垒主机P85
进入控制堡垒主机P86
内控堡垒主机P87-93
PhysicalPlacem