Information Assurance

Information Assurance

Manuel Mogollon (University of Dallas, USA)
Copyright: © 2008 |Pages: 18
DOI: 10.4018/978-1-59904-837-6.ch002
OnDemand PDF Download:
$37.50

Abstract

The TCP/IP protocol is becoming the world standard for network and computer communications. The number of TCP/IP applications on the Internet and in corporate networks is continually growing, with a resulting increase in network vulnerability. When data communications security is discussed in this text, it refers to communications security for the TCP/IP protocol and to the security mechanisms implemented at the different layers of the TCP/IP stack protocol. This chapter also describes, in a general way, which security mechanisms are used for specific security services.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Foreword
John H. Nugent
Acknowledgment
Manuel Mogollon
Chapter 1
Classic Cryptography  (pages 1-14)
Manuel Mogollon
Chapters 1 and 2 cover information on classic cryptography and the aspects of information security related to security services and mechanisms. The... Sample PDF
Classic Cryptography
$37.50
Chapter 2
Information Assurance  (pages 15-32)
Manuel Mogollon
The TCP/IP protocol is becoming the world standard for network and computer communications. The number of TCP/IP applications on the Internet and in... Sample PDF
Information Assurance
$37.50
Chapter 3
Manuel Mogollon
Mathematics plays an important role in encryption, public-key, authentication, and digital signatures. Knowing certain basic math concepts such as... Sample PDF
Number Theory and Finite Fields
$37.50
Chapter 4
Manuel Mogollon
In the world of communications, assurance is sought that (1) a message is not accidentally or deliberately modified in transit by replacement... Sample PDF
Confidentiality: Symmetric Encryption
$37.50
Chapter 5
Manuel Mogollon
Asymmetric encryption is a form of cryptography in which one key is used to encipher and the other to decipher. The two keys are mathematically... Sample PDF
Confidentiality: Asymmertic Encrypton
$37.50
Chapter 6
Manuel Mogollon
In this chapter, methods that can check if a message was modified are explained; this includes the Message Authentication Code (MAC), hash... Sample PDF
Integrity and Authentication
$37.50
Chapter 7
Access Authentication  (pages 152-188)
Manuel Mogollon
Unless a corporation can reliably authenticate its network users, it is not possible to keep unauthorized users out of its networks. Authentication... Sample PDF
Access Authentication
$37.50
Chapter 8
Manuel Mogollon
For the same level of security that public-key cryptosystems such as RSA have, elliptic curve cryptography (ECC) offers the benefit of smaller key... Sample PDF
Elliptic Curve Cryptograpy
$37.50
Chapter 9
Manuel Mogollon
In public-key encryption, the secrecy of the public key is not required, but the authenticity of the public key is necessary to guarantee its... Sample PDF
Certificates and Public Key Infrastructure
$37.50
Chapter 10
Electronic Mail Security  (pages 246-265)
Manuel Mogollon
In previous chapters of this book, crypto systems, security mechanisms, and security services have been discussed and reviewed as separate crypto... Sample PDF
Electronic Mail Security
$37.50
Chapter 11
VPNS and IPSEC  (pages 266-299)
Manuel Mogollon
Virtual private networks (VPN) and IPsec are discussed in this chapter. A VPN emulates a private wide area network (WAN) facility using IP networks... Sample PDF
VPNS and IPSEC
$37.50
Chapter 12
TLS, SSL, and SET  (pages 300-333)
Manuel Mogollon
In an Internet commercial transaction, the secure Web server and the buyer’s computer authenticate each other and encipher the data transmitted... Sample PDF
TLS, SSL, and SET
$37.50
Chapter 13
Web Services Security  (pages 334-408)
Manuel Mogollon
A service is an application offered by an organization that can be accessed through a programmable interface. Web services allow computers running... Sample PDF
Web Services Security
$37.50
Chapter 14
Wireless Security  (pages 409-446)
Manuel Mogollon
The nature of wireless is that of a physically open medium which makes authentication, access control, and confidentiality necessary in the... Sample PDF
Wireless Security
$37.50
Glossary of Terms
About the Author