FE-Logo
  • Home
  • Study Material
  • Network Management and Security
    • Introduction to Network security
    • Security attacks
    • Active and Passive attacks
    • Security Services
    • Security Mechanisms
    • A Model Of Inter Network Security
    • Internet Standards
    • Internet Standards and RFC
    • Buffer Overflow
    • Format String Vulnerability
    • Session Hijacking
    • UDP Session Hijacking
    • Route Table Modification
    • Address resolution protocol attacks
    • Man-in-the-middle attack

  • Network Management and Security
    • Conventional Encryption principles
    • Cryptography
    • Cryptanalysis
    • Substitution Encryption Techniques
    • Playfair Ciphers
    • Hill Cipher
    • Polyalphabetic Ciphers
    • Pigpen Cipher
    • Transposition techniques
    • Feistel Cipher Structure
    • Feistel Cipher Decryption
    • Conventional Encryption Algorithms
    • S-DES key generation
    • S-DES Encryption
    • Data Encryption Standard
    • Single round of DES algorithm
    • Triple Data Encryption Standard
    • International Data Encryption Standard
    • Blowfish Algorithm
    • Blowfish Encryption Decryption
    • Advanced encryption standard
    • S-AES Encryption and Decryption
    • S-AES key expansion
    • The AES Cipher
    • Substitute Bytes Transformation
    • ShiftRows Transformation
    • MixColumns Transformation
    • AddRoundKey Transformation
    • AES Key Expansion
    • AES Decryption
    • Cipher Block modes of Operation
    • Cipher Block Chaining Mode
    • Cipher Feed Back Mode
    • Output Feedback Mode
    • Counter Mode
    • Message authentication
    • Message Authentication Code
    • Message Authentication Code Based on DES
    • Hash function
    • MD5 Message Digest Algorithm
    • MD5 Compression Function
    • Secure Hash Algorithm
    • RIPEMD-160
    • HMAC

  • Network Management and Security
    • Public key Cryptography
    • Attack on Public-key Cryptography
    • Applications for public-key cryptosystems
    • RSA algorithm
    • Fermat's and Euler's theorem
    • Security of RSA
    • Key Management
    • Public-key authority
    • Public-key certificates
    • Public Key Distribution of Secret Keys
    • Diffie-Hellman key exchange
    • Man-in-the-Middle Attack on Deffie-Hellman protocol
    • Elliptic curve cryptography
    • Cryptography with Elliptic Curves
    • Digital Signature
    • Digital Signature Standard
    • Kerberos
    • Kerberos Version 4 Authentication Dialogue
    • Overview of Kerberos
    • Kerberos Realms
    • Kerberos version 5
    • X.509 Authentication Service
    • Authentication Procedures
    • X.509 Version 3

  • Network Management and Security
    • Pretty Good Privacy
    • Pretty good privacy Operation
    • Cryptographic Keys and Key Rings
    • PGP Message Format
    • PGP Key Rings
    • PGP Message Transmission and Reception
    • Public Key Management
    • The Use of Trust
    • Operation of Trust Processing
    • PGP “Web of Trustâ€ÂÂ
    • S/MIME
    • MIME Content Types
    • MIME Transfer Encodings
    • MIME canonical form
    • S/MIME Functionality
    • S/MIME Messages
    • S/MIME Certificate Processing
    • Radix-64 Conversion

  • Network Management and Security
    • IP Security Overview
    • Applications of IPSec
    • Benefits of IPSec
    • IP Security Architecture
    • Security Associations
    • IPSec Authentication Header
    • Anti-Replay Service
    • Integrity Check Value
    • Transport and Tunnel Modes
    • Encapsulating Security Payload
    • Transport Mode ESP
    • Tunnel Mode ESP
    • Combining Security Associations
    • Key Management
    • Oakley Key Determination Protocol
    • Aggressive Oakley Key Exchange
    • ISKAMP
    • ISAKMP Payload Types
    • ISAKMP Payload Types
    • ISAKMP Exchanges
    • Network Management
    • Network Management Model
    • Organization Model
    • Information Model
    • Communication Model
    • Simple Network Management Protocol
    • Functionality of SNMP
    • Benefits of SNMP

  • Network Management and Security
    • Firewalls
    • Types of Firewalls
    • Application level gateway
    • Circuit Level Gateway
    • Firewall Configurations
    • Data access control
    • Concept of Trusted Systems
    • Trojan horse Defence
    • Intrusion Detection
    • Approaches to Intrusion Detection
    • Rule Based Intrusion Detection
    • Honeypots
    • Password Management

Branch : Electronics and Communication Engineering | Subject : Network management and security
Network Management and Security
  • Introduction to Network security

    Read topic
  • Security attacks

    Read topic
  • Active and Passive attacks

    Read topic
  • Security Services

    Read topic
  • Security Mechanisms

    Read topic
  • A Model Of Inter Network Security

    Read topic
  • Internet Standards

    Read topic
  • Internet Standards and RFC

    Read topic
  • Buffer Overflow

    Read topic
  • Format String Vulnerability

    Read topic
  • Session Hijacking

    Read topic
  • UDP Session Hijacking

    Read topic
  • Route Table Modification

    Read topic
  • Address resolution protocol attacks

    Read topic
  • Man-in-the-middle attack

    Read topic