Describe
key principles, such as defense in depth and demilitarized
zones (DMZ)
Provide an overview of the requirement for intrusion
detection systems (IDS) and their implementation
Provide an overview of network security devices and
infrastructures, including proxy servers and firewalls
Describe the methodologies used in network forensics
Describe data hiding and obfuscation and outline obfuscation
methods
|
1. Introduction
to Security -CIA and AAA - protecting against Intruders
- Users, Systems, and Data -Services, Role-Based Security,
and Cloud Computing - Security and Forensic Computing
- ISO 27002 - Risks -Risk Management/Avoidance - Security
Policies -Defining the Policy - Example Risks - Defense-in-Depth
- Gateways and DMZ (Demilitarized Zones) - Layered Model
and Security - Encryption - Layered Approach to Defense
2. Intrusion Detection SystemsTypes of Intrusion - Attack
Patterns - Host/Network-Based Intrusion Detection -
Placement of the IDS - Snort - Example Rules -Running
Snort -User, Machine, and Network Profiling – Honeypots
- In-Line and Out-of-Line IDSs - False and True - Customized
Agent-Based IDS
3. Network Security Elements Objectives - Introduction
- Router (Packet Filtering) Firewalls - Network Address
Translation - PIX/ASA Firewall - Proxy Servers
4. Network Forensics Key Protocols - Ethernet, IP, and
TCP Headers - TCP Connection – ARP – SYN - Application
Layer Analysis - FTP - ICMP - DNS - Port Scan - SYN
Flood - Spoofed Addresses - Application Layer Analysis
- HTTP - Network Logs on Hosts - Tripwire
5. Data Hiding and Obfuscation Obfuscation Using Encryption
- Obfuscation through Tunneling - Covert Channels -
Watermarking and Stenography - Hiding File Contents
- File Contents
|
1. Buchanan,
William J. (2011). Introduction to Security and Network
Forensics, CRC Press, ISBN: 978-0-8493-3568-6
2. Computer Forensics: Investigating Network Intrusions
and Cyber Crime (Ec-Council Press Series:Computer Forensics),
2010
3. Michael E. Whitman, Herbert J. Mattord, "Principles
of Information Security", 2nd Edition,, Cengage
Learning Pub., 2012
4. Eoghan Casey, Digital Evidence and Computer Crime
Forensic science, Computers and Internet', Elsevier
Academic Press -Second Edition, 2011
5. Christof Paar, Jan Pelzl, Understanding Cryptography:
A Textbook for Students and Practitioners, 2nd Edition,
Springer's, 2010
|