Client Server - Security

Jan Newmarch jan@newmarch.name


Last modified: March 17, 1997. These slides are Copyright Jan Newmarch, 1997.

1. Security

2. Security threats

3. Orange Book

4. Orange Book

5. Orange Book

6. ISO Protocol

7. ISO Security - Functions and Levels

8. ISO Security - Mechanisms

9. ISO Security - Mechanisms

10. ISO Security - Mechanisms

11. ISO Security - Mechanisms

12. Security Policies

13. Security Functions Needed

14. Software Vulnerability

15. Security Locations

16. Host Security

17. Network Security

18. Routers

19. Firewalls

20. Filter Mechanisms

21. IP Header Information

22. Filtering by IP Header

23. TCP and UDP Ports

24. TCP Header Information

25. Filtering by TCP Header

26. UDP Header Information

27. Filtering by UDP Header

28. Remote Procedure Call

29. Spoofing Header Information

30. Proxy servers

31. Security of Common Applications: Telnet

32. Telnet: Outgoing Packets, From Client

33. Telnet: Incoming Packets, From Server

34. Telnet: Incoming Packets, From Client

35. Telnet: Outgoing Packets, From Server

36. Telnet Filtering

37. FTP Filtering

38. X11 Filtering

39. RPC Filtering

40. Lessons for Client/Server

41. Use Logging

42. IP verification

43. User Configurable Files

44. Passwords

45. Handshaking

46. Simple Security Layer

47. Encrypt Data

48. Protocol Design

49. Encryption

50. Ciphers

51. Private Key

52. DES

53. DES Algorithm

54. DES Algorithm

55. Private Key Problems

56. Key Distribution Centre

57. Session Keys

58. Public Key

59. Public Key Encryption

60. Digital Signature

61. Secure Verified Data

62. Session Keys

63. RSA Public Key Algorithm

64. Pretty Good Privacy

65. PGP Keys

66. PGP Encryption

67. PGP Decryption

68. PGP Key Management

69. PGP Use in Programs

70. Web of Trust

71. References