ICT212_StudyUnit3 - ICT212 Internet Security STUDY UNIT 3...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
ICT212 Internet Security STUDY UNIT 3
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 2
ICT212 STUDY NOTES STUDY UNIT 3 SIM UNIVERSITY SU3-1 SUMMARY OF UNIT 3 This is the third Unit for the course Internet Security . There are altogether two chapters: Chapter 7 and Chapter 8. Chapter 7, Web Security, focuses on the considerations and approaches to security issues related to Web environment. This is again an important chapter since the Web platform has been widely adopted by businesses and government world wide. Again, I am sure the readers are familiar with applications such as online tax submission, online movie tickets bookings etc. The SSL and SET protocols, which we shall discuss in this chapter, help to facilitate the building of a more secured web environment. Chapter 8 discusses one of the topics in network security that at times may not have received sufficient attention and emphasis: Network Management Security. The security concerning Network Management may not appear in the limelight as frequently as security concerning IP, email or web. Nonetheless, with the growing complexity of networks, network management solution has gained strategic importance, and the associated security concerns have become key issues to address in businesses. Study Guide for UNIT 3 Chapter 7 Web Security The students need to know what the considerations are for Web Security and the SSL Architecture (page 225 – 229 of reference text). For the material from Page 230 – 238 of the reference text, only the main concepts will be examined. The students need to know what the protocols are, the purposes they served, and broadly how they work. On the other hand, detailed steps and computations (e.g the computation in page 228 and the steps in page 237) will not be examined. The material on TLS (page 238 – 243) will not be discussed for this course. For SET, the students need to know the overview as well as the concept of Dual Signature (page 243 – 248). The material from Page 248 – 254 will be useful as additional reading. Chapter 8 Network Management Security The students need to have a basic overall understanding of how SNMP works before moving on to SNMPv3. The basic concepts of SNMP are covered in Page 258 – 268. The more important concepts include the messages/commands used, where in the protocol stack does SNMP sits, the ideas of proxies, etc. The security aspect of SNMPv1 is discussed in Section 8.2, SNMPv1 Community Facility. The main material is in Page 266 & 268. The discussion on SNMPv3 commences in Page 269.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
STUDY UNIT 3 ICT212 STUDY NOTES SU3-2 SIM UNIVERSITY The architectural design from Page 270 – 277 is important, similarly for the concepts of Message Processing Subsystem and USM from Page 278 – 285 (excluding discussion on key localization and the details on message timeliness). As the security mechanisms provided by SNMPv3 is rather complex, we will only briefly touched on VACM. The important concepts are explained in Page 288 – 292. The following table gives some estimates on the time needed for each topic.
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 09/06/2010 for the course IT ICT322 taught by Professor Tan during the Spring '10 term at Singapore Institute of Management.

Page1 / 40

ICT212_StudyUnit3 - ICT212 Internet Security STUDY UNIT 3...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online