Network Security: A Systems Approach

teleforce1 pts0 comments

Network Security: A Systems Approach — Network Security: A Systems Approach Version 1.1-dev documentation

Network Security: A Systems Approach

View page source

Next

Network Security: A Systems Approach

Peterson and Davie

Table of Contents

Foreword

Preface<br>Acknowledgements

Chapter 1. Introduction<br>1.1 A Short History of Internet Security

1.2 Threats and Trust

1.3 Threats to Network Security

Chapter 2. Design Principles<br>2.1 Security Requirements

2.2 Broader System Requirements

2.3 Principles for Secure Systems

2.4 Best Practices

2.5 Summary

Chapter 3. Cryptographic Primitives<br>3.1 Principles of Ciphers

3.2 Secret-Key Ciphers

3.3 Public-Key Ciphers

3.4 Message Authentication

Chapter 4. Key Distribution<br>4.1 Predistribution of Public Keys

4.2 Distribution of Secret Keys

4.3 Diffie-Hellman Key Exchange

Chapter 5. Authentication Protocols<br>5.1 Freshness and Timeliness Techniques

5.2 Public-Key Authentication Protocols

5.3 Secret-Key Authentication Protocols

Chapter 6. Transport Security<br>6.1 Handshake Protocol

6.2 Record Protocol

6.3 Session Resumption and Zero RTT Operation

6.4 QUIC, HTTP/3 and TLS

6.5 A Systems View of TLS

Chapter 7. Subsystem Security<br>7.1 Pretty Good Privacy

7.2 Secure Shell

7.3 IP Security

7.4 Virtual Private Networks

7.5 Web Authentication and Passkeys

7.6 Wireless Security

Chapter 8. Infrastructure Security<br>8.1 BGP and Routing Security

8.2 DNS and Naming Security

8.3 DoS Mitigation

Chapter 9. Firewalls<br>9.1 Basic Principles of Firewalls

9.2 Strengths and Weaknesses of Firewalls

9.3 Distributed Firewalls

9.4 Zero Trust Security

9.5 Intrusion Detection and Prevention

About The Book<br>Read the Book

Build the Book

Contribute to the Book

About The Authors

Read The Latest!

Print Copies

security chapter systems network approach authentication

Related Articles