Client Server - Security
Jan Newmarch
jan@newmarch.name
Last modified: March 17, 1997. These slides are Copyright Jan Newmarch, 1997.
1.
Security
2.
Security threats
3.
Orange Book
4.
Orange Book
5.
Orange Book
6.
ISO Protocol
7.
ISO Security - Functions and Levels
8.
ISO Security - Mechanisms
9.
ISO Security - Mechanisms
10.
ISO Security - Mechanisms
11.
ISO Security - Mechanisms
12.
Security Policies
13.
Security Functions Needed
14.
Software Vulnerability
15.
Security Locations
16.
Host Security
17.
Network Security
18.
Routers
19.
Firewalls
20.
Filter Mechanisms
21.
IP Header Information
22.
Filtering by IP Header
23.
TCP and UDP Ports
24.
TCP Header Information
25.
Filtering by TCP Header
26.
UDP Header Information
27.
Filtering by UDP Header
28.
Remote Procedure Call
29.
Spoofing Header Information
30.
Proxy servers
31.
Security of Common Applications: Telnet
32.
Telnet: Outgoing Packets, From Client
33.
Telnet: Incoming Packets, From Server
34.
Telnet: Incoming Packets, From Client
35.
Telnet: Outgoing Packets, From Server
36.
Telnet Filtering
37.
FTP Filtering
38.
X11 Filtering
39.
RPC Filtering
40.
Lessons for Client/Server
41.
Use Logging
42.
IP verification
43.
User Configurable Files
44.
Passwords
45.
Handshaking
46.
Simple Security Layer
47.
Encrypt Data
48.
Protocol Design
49.
Encryption
50.
Ciphers
51.
Private Key
52.
DES
53.
DES Algorithm
54.
DES Algorithm
55.
Private Key Problems
56.
Key Distribution Centre
57.
Session Keys
58.
Public Key
59.
Public Key Encryption
60.
Digital Signature
61.
Secure Verified Data
62.
Session Keys
63.
RSA Public Key Algorithm
64.
Pretty Good Privacy
65.
PGP Keys
66.
PGP Encryption
67.
PGP Decryption
68.
PGP Key Management
69.
PGP Use in Programs
70.
Web of Trust
71.
References