Download presentation
Presentation is loading. Please wait.
Published byJulian Marsh Modified over 9 years ago
1
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages caused by the use of these programs or from the use of the information contained herein”
2
Figure 13-1 The Security Policy Development Life Cycle
3
Figure 13-4 Security vs. Productivity Balance
4
Figure 13-7 Assests, Threats, Vulnerabilities, Risks, and Protective Measures
5
Figure 13-13 Representative Security Architecture
6
Figure 13-18 Collaborative Software Infection/Reinfection Cycle
7
Figure 13-19 Virus Infection Points of Attack and Protective Measures
8
Figure 13-20(a) Packet Filters and Application Gateways
9
Figure 13-20(b) Proxies, Trusted Gateways, and Dual-Homed Gateways
10
Figure 13-21 Enterprise Firewall Architecture
11
Figure 13-24 Challange-Response vs. Time-Synchronous Token Authentication
12
Figure 13-25 Kerberos Architecture
13
Figure 13-26 Private Key Encryption, Public Key Encryption, and Digital Signature Encryption
14
Figure 13-28 Remote Authentication Dial-In User Services (RADIUS) Architecture
15
Figure 13-29 Tunneling Protocols Enable Virtual Private Networks
16
Figure 13-30 IP Packet Plus Authentication and Encryption Headers
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.