Managing Secure Network
-
This paper proposes and implements a model combining Zalo and end-toend encryption to apply in digital transformation. The main idea is to promote the strengths of the Zalo social network to exchange information and manage work but ensure information confidentiality for both the server and man-in-the-middle attacks based on the end-to-end encryption model.
14p viyoko 01-10-2024 3 1 Download
-
Module 2: Automating an installation of Microsoft Windows XP Professional. The following topics are covered in this module: Introduction to automating an installation of Windows XP Professional; creating answer files; creating a uniqueness database file; performing an automated installation of Windows XP Professional; overview of creating and deploying an image; preparing a reference computer; creating, testing, and deploying an image; managing security settings by using security center.
42p nomoney2 10-02-2017 46 3 Download
-
Module 5: Configuring and managing file systems. The following topics are covered in this module: Working with file systems, managing data compression, securing data by using EFS. At the end of this module, you will be able to configure and manage file systems. This includes: Configuring disk compression, securing files by using EFS.
21p nomoney2 10-02-2017 37 2 Download
-
Module 1: Overview of Microsoft ISA Server 2004. This module provides an introduction to ISA Server 2004. It introduces the core functionality provided by ISA Server 2004 and presents an overview of how ISA Server 2004 integrates with other security practices to form a defense-in-depth approach to network security. The module also describes the most common deployment scenarios for ISA Server 2004.
15p nomoney2 10-02-2017 53 3 Download
-
Module 9: Securing network traffic by using IPSec. This module provides you with the knowledge and skills to secure network traffic and to use certificates with IPSec for increased security. After completing this module, students will be able to: Implement IPSec, understand IPSec deployment scenarios, monitor IPSec.
24p nomoney2 10-02-2017 51 3 Download
-
Chapter 7 - Quản trị bảo mật cho hệ thống (Security management system). After studying this chapter you will be able to: Understand the purpose of a network firewall and the kinds of firewall technology available on the market; understand the role of routers, switches, and other networking hardware in security; determine when VPN or RAS technology works to provide a secure network connection.
76p nhanmotchut_3 20-10-2016 67 5 Download
-
Chapter 12 - Policies and disaster recovery. The main contents of this chapter include all of the following: Policies and procedures, privilege management, education and documentation, communication, disaster recovery, business continuity.
45p nhanmotchut_3 20-10-2016 41 6 Download
-
Chapter 10 - Public key infrastructure. After completing this chapter, students will be able to: Explain cryptography strengths and vulnerabilities, define public key infrastructure (PKI), manage digital certificates, explore key management.
34p nhanmotchut_3 20-10-2016 38 4 Download
-
In this chapter, you will learn to: Differentiate between two categories of cryptography schemes; understand four aspects of security; understand the concept of digital signature; understand the role of key management in entity authentication; know how and where IPSec, TLS, and PPG provide security.
41p tangtuy09 26-04-2016 57 3 Download
-
In this chapter, you will learn to: Identify security threats to enterprise networks. Describe methods to mitigate security threats to enterprise networks. Configure basic router security. Disable unused router services and interfaces. Use the Cisco SDM one-step lockdown feature. Manage files and software images with the Cisco IOS Integrated File System (IFS).
157p youcanletgo_01 04-01-2016 46 5 Download
-
Learning objectives of this chapter include: Secure the physical installation of and the administrative access to Cisco routers based on different network requirements using the CLI and CCP; configure administrative roles using privilege levels and role-based CLI; Implement the management and reporting features of syslog, SNMP, SSH, and NTP;...
175p youcanletgo_01 04-01-2016 51 6 Download
-
This chapter include objectives: Describle the principles of secure network design, describle threat identificaion and risk analysis, describle risk managenment and risk avoidance, describle the Cisco SecureX architecture, describle operation security,...
82p youcanletgo_01 04-01-2016 75 4 Download
-
Learning objectives of this chapter include: Identify the devices and protocols used in a small network; explain how a small network serves as the basis of larger networks; explain the need for basic security measures on network devices; identify security vulnerabilities and general mitigation techniques;...
55p youcanletgo_01 29-12-2015 66 4 Download
-
In this chapter: Explain the basic concepts of a switched environment, configure initial settings on a Cisco switch, configure switch ports to meet network requirements, configure the management switch virtual interface, describe basic security attacks in a switched environment, describe security best practices in a switched environment, configure the port security feature to restrict network access.
52p youcanletgo_01 29-12-2015 89 6 Download
-
Use ISA Server to: Provide proxy and caching services to conserve Internet bandwidth. Configure dial-up connections to the Internet. Block all inbound network traffic. Provide secure configurations using network templates and server publishing wizards.
15p nhqkhtn 24-08-2013 89 4 Download
-
Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header Encapsulating Security Payload Combinations of Security Associations Key Management
31p muathu_102 28-01-2013 115 10 Download
-
An integrated collection of tools for network monitoring and control. Single operator interface Minimal amount of separate equipment. Software and network communications capability built into the existing equipment SNMP key elements: Management station Managament agent Management information base Network Management protocol Get, Set and Notify
20p muathu_102 28-01-2013 71 3 Download
-
Users and Security Security domain The database administrator defines the names of the users who are allowed to access a database. A security domain defines the settings that apply to the user. Authentication mechanism A user who requires access to the database can be authenticated by one of the following: Data dictionary Operating system Network The means of authentication is specified at the time the user is defined in the database and can be altered later. This lesson covers authentication by database and by operating system only.
20p trinh02 28-01-2013 81 3 Download
-
To use data encryption algorithms in network communications, all parities must first agree on using the same secret keys Rely on couriers Set up a meeting to determine a secret key Use postal service, email service, phone service … However, these conventional methods are inflexible for network communication applications Public-key cryptography (PKC) Invented in the 1970’s Without the need of sharing prior secrets to distribute secret keys securely Can also be used for authentication
39p muathu_102 28-01-2013 69 4 Download
-
LANs, WANs, WLANs are known as edge networks May be contained within businesses or homes Needs to be protected from the rest of the Internet! Why firewall? Encryption? Cannot stop malicious packets from getting into an edge network Authentication? Can determine whether an incoming IP packet comes from a trusted user However, not all host computers have resources to run authentication algorithms Host computers managed by different users with different skill levels.
38p doilan 26-01-2013 68 4 Download