首页--工业技术论文--自动化技术、计算机技术论文--计算技术、计算机技术论文--计算机的应用论文--计算机网络论文--一般性问题论文

The Methodology&Strategy for Building an Efficient Security System

摘要第4-5页
ABSTRACT第5页
CHAPTER 1 INTRODUCTION第8-13页
    1.1 INTRODUCTION第8页
    1.2 BACKGOUND AND PURPOSE第8-10页
    1.3 THE FURURE AND EMERGING TRENDS第10-13页
CHAPTER 2 INFORMATION AND NETWORK SECURITY第13-43页
    2.1 METHOD AND STRUCTURE第13页
    2.2 THE OSI REFERENCE MODEL第13-19页
    2.3 TCP/IP ARCHITECTURE第19-22页
    2.4 SECURITY THREATS IN THE NETWORK ENVIRONMENT第22-29页
        2.4.1 Fundamental threats第23页
        2.4.2 IP security threats第23-25页
        2.4.4 Application specific security第25-28页
        2.4.5 Security services第28-29页
    2.5 COMPARING SYMMETRIC AND ASYMMETRIC CRYPTOGRAPHY第29-42页
        2.5.1 Need for encryption第30页
        2.5.2 Forms of cryptosystems第30-41页
        2.5.3 Comparing symmetric and asymmetric cryptography第41-42页
    2.6 SUMMARY第42-43页
CHAPTER 3 IP SECURITY, THE FUTURE OF INFORMATION SECURITY第43-71页
    3.1 IP SECURITY AND IT'S ARCHITECTURE第43页
    3.2 THE IPSEC ROADMAP第43-45页
    3.3 IPSEC IMPLEMENTATION第45-50页
        3.3.1 Host implementation第46-47页
        3.3.2 Bump in the stack第47-48页
        3.3.3 Router implementation第48-49页
        3.3.4 Security architecture第49-50页
        3.3.5 Security association第50页
    3.4 IPSEC MODES第50-55页
        3.4.1 Transport mode第51-52页
        3.4.2 Tunnel mode第52-55页
    3.5 SECURITY ASSOCIATIONS第55-61页
        3.5.1 Security parameter index(SPI)第56页
        3.5.2 SA management第56-58页
        3.5.3 Parameters第58-59页
        3.5.4 Security policy第59-61页
    3.6 IPSEC PROCESSING第61-63页
        3.6.1 Outbound第61-62页
        3.6.2 Inbound第62-63页
        3.6.3 Fragmentation第63页
    3.7 ICMP第63-64页
    3.8 THE IPSEC DOI第64-70页
        3.8.1 Merits of IPSec第64-65页
        3.8.2 Limitations of IPsec第65-70页
    3.9 SUMMARY第70-71页
CHAPTER 4 CREATING AN EFFICIENT NETWORK SECURITY SYSTEM第71-103页
    4.1 CURRENT AND FUTURE TRENDS IN INFORMATION SECURITY第71-72页
    4.2 SECURITY STRATEGIES第72-73页
    4.3 METHODOLOGY FOR DEFINING/BUILDING SECURITY STRATEGIES AND SYSTEMS第73-74页
    4.4 PROPOSED MODEL第74-96页
        4.4.1 Predict possible attacks/analyze risks第75-77页
        4.4.2 Proactive strategy第77-93页
        4.4.3 Make contingency plans第93-94页
        4.4.4 Reactive strategy第94-96页
    4.5 THE COMMON TECHNOLOGIES OF NETWORK SECURITY第96-97页
    4.6 AWARENESS AND CONSCIOUSNESS第97-101页
    4.7 SUMMARY第101-103页
CHAPTER 5 CONCLUSION AND RECOMMENDATIONS第103-105页
    5.1 SUMMARY AND FINAL CONCLUSION第103-104页
    5.2 LIMITATIONS AND RECOMMENDATIONS第104-105页
REFERENCES第105-109页
Acknowledgements第109页

论文共109页,点击 下载论文
上一篇:足球机器人视觉系统的研究
下一篇:基于语义Web的多Agent移动应用平台研究