Next generation SSH2 implementation securing data in motion
New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH i...
Autor principal: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Burlington, MA :
Syngress Pub
c2009.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627712006719 |
Tabla de Contenidos:
- Front Cover; Next Generation SSH2 Impementation: Securing Data in Motion; Lead Author and Technical Editor; Contributing Authors; Contents; Acknowledgments; Chapter 1: Introduction; Introduction; Why Is There a Need To Use SSH?; What SSH Does and Does Not Do; Comparison Between SSH and SSHv2; Encryption Standards; What Is SCP and SFTP?; SSH and the C-I-A Triad; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2: OSI Model and Then Some; Introduction; 50,000 Foot View of the OSI Model; Application Layer (7); Presentation Layer (6); Session Layer (5); Transport Layer (4)
- Network Layer (3)Data Link Layer (2); Physical Layer (1); Using the OSI Model to Troubleshoot; Applying the OSI Model to Forensics; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3: An Introduction To Cryptography; What is Cryptography?; Cryptography and Information Security; Confidentiality; Integrity; Authentication; Non-Repudiation; Cryptographic Protocols and Applications; Domain Name Server Security Extensions; Secure Sockets Layer/Transport Layer Security; Secure Hypertext Transfer Protocol; Secure Shell Protocol; Internet Protocol Security; Cryptographic Systems
- Symmetric Key CryptosystemsAsymmetric Key Cryptosystems; Introducing Cryptographic Algorithms and Ciphers; Block Ciphers; Electronic Code Book Mode; Cipher Block Chaining Mode; Output Feedback Mode; Cipher Feedback Mode; Stream Ciphers; Synchronous Stream Ciphers; Asynchronous Stream Ciphers; Cryptographic Key Management; Internet Security Association and Key Management Protocol; Diffie-Hellman Key Exchange Protocol; Cryptographic Functions; Basic Cryptographic Functions; One-way Functions; Cryptographic Hash Functions; Message Digest Algorithm 5; Secure Hash Algorithm
- RACE Integrity Primitives Evaluation Message DigestMessage Authentication Codes; Digital Signatures; Attacks on Cryptosystems; Plaintext-Based Attacks; Ciphertext-Based Attacks; Cryptography and SSH; Transport Layer; User Authentication Layer; Connection Layer; SSH Key Exchange; Encryption Algorithms Supported by SSH; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4: SSH Features; Introduction to SSH; SSH Standards; SSH Message Types; SSH-TRANS; SSH-USERAUTH; SSH-CONNECT; SSH vs. Telnet/Rlogin; SSH Client/Server Overview; Packet Capture Detection; Summary
- Solutions Fast TrackFrequently Asked Questions; Chapter 5: SSH Shortcomings; Introduction; Attacking SSL: Hacking the User; Concepts of Attacking the User with Social Engineering; Getting the Request to the Target: Physical Attack; Attacking with Technology; Attacking in person; Blending attacks; Attacking the Psyche; Giving Away the Farm; Methods of Attacking; E-mail; Phishing; Spear Phishing; Site Redirection; Key Loggers; Hardware; Trojans; Recognizing an SE Attack; How Do You Know if You're Under an SE Attack?; SE Tripwires; Responding to an SE Event; Having Front Line Staff Respond
- IT Responses