Information & Network Security

Get Started. It's Free
or sign up with your email address
Rocket clouds
Information & Network Security by Mind Map: Information & Network Security

1. Planning for Security

1.1. InfoSec Policy, Standards and Practices

1.2. Architecture

1.2.1. Defence in Depth

1.2.2. Security Perimeter

1.3. Contingency Plan

1.3.1. Incident Response

1.3.2. Disaster Recovery

1.3.3. Business Continuity

1.4. Safeguards

1.4.1. Managerial Control

1.4.2. Operational Control

1.4.3. Technical Control

1.5. Business Impact Analysis

2. Security Technology

2.1. Physical Design

2.2. Firewalls

2.2.1. Packet Filtering

2.2.2. Application Gateways

2.2.3. Circuit Gateways

2.2.4. MAC layer Firewalls

2.2.5. Hybrids

2.3. Protecting Remote Connections

3. Electronic Mail Security

3.1. Pretty Good Privacy (PGP)

3.1.1. 1) PGP provides authentication through the use of digital signature, confidentiality through the use of symmetric block encryption

3.1.2. 2) It based on algorithms are considered extremely secure. Specifically, the package includes RSA, DSS, and Diffie-Hellman for public-key encryption; CAST-128, IDEA, and 3DES for symmetric encryption; and SHA-1 for hash coding

3.1.3. 3) It has a wide applicability and is now on an Internet standards track (RFC 3156)

3.2. S/MIME

4. IP Security

4.1. Authentication Header

4.1.1. 1) The Authentication Header provides support for data integrity and authentication of IP packets

4.1.2. 2) The data integrity feature ensures that undetected modification to a packet's content in transit is not possible

4.1.3. 3) The authentication feature enables an end system or network device to authenticate the user or application and filter traffic accordingly

4.1.4. 4) It also prevents the address spoofing attacks observed in today's Internet

4.1.5. 5 )The AH also guards against the replay attack

4.2. Encapsulating Security Payload (ESP)

4.2.1. 1) The Encapsulating Security Payload provides confidentiality services, including confidentiality of message contents and limited traffic flow confidentiality.

4.2.2. 2) As an optional feature, ESP can also provide an authentication service.

4.3. Combining Security Associations

4.4. Key Management

5. Web Security

5.1. Secure Socket Layer (SSL)

5.2. Transport Layer Security (TLS)

5.3. Secure Electronic Transaction (SET)