Current location - Quotes Website - Personality signature - Introduction to information security catalogue
Introduction to information security catalogue
order

Chapter 1 Overview of Information Security

1. 1 some questions

1.2 A story

1.3 information and information security

1.3. 1 Definition of information

1.3.2 Definition of information security

1.3.3P2DR2 security model

1.3.4 information security architecture

1.3.5 the goal of information security

1.4. Information security threats

1.4. 1 physical layer security risk analysis

1.4.2 network layer security risk analysis

1.4.3 security risk analysis of operating system layer

1.4.4 application layer security risk analysis

1.4.5 management security risk analysis

1.5 Requirements and Implementation of Information Security

1.5. 1 information security requirements

1.5.2 implementing information security

1.6 information security development process

1.7 exercise

Chapter 2 Fundamentals of Network Security

2. 1OSI reference model

2.2TCP/IP reference model

2.3 Common network services

Web service

FTP service

Email service

Telecommunication network service

2.4 Common network commands

2.4. 1ping command

Ipconfig command

Netstat command

address resolution protocol

network program

atcommands

Tracert command

Route command

Nbtstat command

2.5 practice

Chapter 3 Network Scanning and Network Monitoring

3. 1 hacker overview

3. 1. 1 The concept of hacker

3. The concept of1.2 attack

3. 1.3 Classification of attacks

3.2 Network stepping on the spot

3.3 Network scanning

3.3. 1 Overview of security vulnerabilities

3.3.2 Why do you want to scan the network?

3.3.3 Scan after finding the target.

3.3.4 Port scanning for detecting open services

Vulnerability scanning

Introduction to scanning tools

3.4 Network monitoring

3. 4. 1 working principle of hub and network card

3.4.2 Working principle of network monitoring

3.4.3 Hazards of network monitoring

3.4.4 Prevention and detection of network monitoring

3.4.5 Common network monitoring tools

3.5 practice

Chapter 4 Hacking Technology

4. 1 General process of attack

4.2 Methods and techniques of attack

4.2. 1 password cracking attack

4.2.2 Buffer overflow attack

4.2.3 Deception attack

DoS/DDoS attack

SQL injection attack

Network worm

4.2.7 Social engineering

4.3 practice

Chapter V Network Backdoor and Network Stealth

5. 1 Trojan attack

5. 1. 1 Trojan horse overview

5. 1.2 Common types and deception methods

5. 1.3 Trojan example

5. 1.4 Prevention of Trojan horses

5.2 Network Backdoor

5.3 Clear the attack marks

5.3. 1Windows Clear the attack trace.

5.3.2UNIX clears the attack trace under UNIX.

5.4 practice

Chapter 6 Computer Virus and Malware

6. 1 computer virus overview

6. 1. 1 the concept of computer virus

6. 1.2 causes of computer virus

6. 1.3 Computer Virus History

6. 1.4 characteristics of computer virus

6. 1.5 Naming of computer viruses

6. 1.6 antivirus software

6.2 Typical virus analysis

6.2. 1U disk "Run Auto ..." folder virus and its cleaning method

6.2.2U virus in autorun.inf file of U disk and its cleaning method.

6.2.3U disk RavMonE.exe virus and its removal method.

arp virus

6.2.5 "Panda Burning Incense" Virus

6.2.6QQ and MSN virus

6.2.7 Introduction of Typical Mobile Phone Virus

6.3 Malware

Overview of malware

Types of malware

Removal of Malware

6.4 practice

Chapter 7 Physical Environment and Equipment Safety

7. 1 physical layer security threats

7.2 Physical layer security protection

7.3 Physical layer security equipment

7.3. 1 computer network physical security isolation card

7.3.2 Other physical isolation equipment

7.4 Physical layer management security

7.4. 1 Isolation management of internal network and external network

7.4.2 Internal network security management

7.5 practice

Chapter VIII Firewall Technology

8. 1 firewall overview

8. 1. 1 Definition of firewall

8. 1.2 development history of firewall

8. 1.3 rules of firewall

8. 1.4 characteristics of firewall

8. 1.5 Other functions of firewall

8.2 firewall technology

8.2. 1 packet filtering technology

8.2.2 Application of Gateway Technology

8.2.3 Circuit-level Gateway Technology

8.2.4 State detection technology

Proxy server technology

8.2.6 Network Address Translation Technology

Personal firewall

Distributed firewall

8.3 firewall architecture

8.3. 1 related terms

Dual host architecture

Shielded host architecture

Shielded subnet architecture

8.4 Hardware implementation technology of firewall

8.5 Performance indicators of firewall

8.6 Common functional indicators of firewall

8.7 Introduction of Common Firewall Products

8.8 Development trend of firewall

8.9 practice

Chapter 9 Intrusion Detection Technology

9. 1 Overview of Intrusion Detection

Why does 9. 1. 1 need an intrusion detection system?

9. 1.2 concept of intrusion detection

9. 1.3 Intrusion detection history

9. 1.4 the role of intrusion detection system

9. 1.5 classification of intrusion detection system

9. 1.6 Architecture of Intrusion Detection System

9.2 Intrusion detection technology

9.2. 1 anomaly detection technology

9.2.2 Misuse Detection Technology

9.2.3 Other intrusion detection technologies

9.3 standardization of ids

9.3. Progress of Standardization of1IDS

9.3.2 Intrusion Detection Working Group

9.3.3 Public Intrusion Detection Framework

9.4 Development of Intrusion Detection

9.4. 1 Problems in Intrusion Detection System

9.4.2 Development direction of intrusion detection technology

9.4.3 From IDS to IPS and IMS

9.5 practice

Chapter 10 VPN technology

10. 1VPN overview

The concept of 10. 1. 1VPN

Characteristics of 10. 1.2VPN

Classification of 10. 1.3VPN

10.2VPN technology

10.2. 1VPN security technology

10.2.2VPN tunnel protocol

10.2.3MPISVPN

10.2.4 VPN based on IPv6

10.3VPN application new technology

10 . 3 . 1

Secure multicast based on VPN

Development trend of 10.4VPN

10.5 exercise

Chapter 1 1 Windows operating system security

11.1Introduction to Windows Operating System

1 1.2Windows2000 security configuration

1 1.2. 1 guarantee account

1 1.2.2 Set the security password.

1 1.2.3 Set the screen saver password.

1 1.2.4 Shut down unnecessary services.

1 1.2.5 Close unnecessary ports.

1 1.2.6 Start the system audit strategy.

1 1.2.7 Turn on the password policy.

1 1.2.8 account locking policy.

1 1.2.9 Download the latest patch.

1 1.2. 10 closes the system and enjoys it by default.

11.2.11prohibits TTL from judging the host type.

1 1.3 Precautions for installing Windows operating system

1 1.4 patch the operating system.

1 1.5 motion

Chapter 12 UNIX and Linux operating system security

12.1Overview of UNIX and Linux operating systems

12.2UNIX and Linux system security

12.2. 1 password security of the system

12.2.2 account security

65438 and SGID

12.2.4 service security

12.3 exercise

Chapter 13 Cryptography Basis

13. 1 encryption overview

13. 1. 1 cryptology development history

13. 1.2 Basic concepts of cryptography

13. 1.3 Basic types of cryptographic systems

13. 1.4 classification of cryptographic systems

13. 1.5 password attack

13.2 classical cryptography

13.2. 1

13.2.2 instead of password

13.2.3 transposition password

13.3 symmetric encryption

13.3. 1 Overview of Symmetric Encryption

13.3.2DES encryption algorithm

13.4 asymmetric encryption

13.4. 1 Overview of Asymmetric Encryption

13.4.2RSA algorithm

13.5 hash function

13.5. 1 Overview of Hash Function

13.5.2MD5 algorithm

13.6 digital signature'

13.6. 1 uses asymmetric encryption algorithm for digital signature.

13.6.2 Digital signature using symmetric encryption algorithm.

13.6.3 digital signature algorithm and confidentiality of digital signature

Absolute security and relative security of 13.7 password

13.7. 1 is not absolutely safe.

Relative safety

The new direction of 13.8 cryptography

13.9 exercise

Chapter 14 PKI principle and application

14. 1PKI overview

The function of 14. 1. 1PKI

The architecture of 14. 1.2PKI

Composition of 14. 1.3PKI

14. 1.4PKI standard

14.2 certifiCAte authority ca

14.3 digital certificate

14.3. 1 digital certificate overview

14.3.2 digital certificate issuing process

The application of 14.4PKI

14.4. 1 typical PKI application standard

14.4.2 Typical PKI application mode

Development of 14.5PKI

14.6 exercise

Chapter 15 database system security

15. 1 database system security overview

15.2 attack database system

15.2. 1 weak password attack.

15.2.2 exploit vulnerability to attack database.

Single byte overflow attack of 15.2.3SQLServer

15.2.4SQL injection attack

15.3 preventive measures against database attacks

15.3. 1 Overview of database attack defense

15.3.2SQL injection attack SQL prevention

15.4 exercise

16 chapter information security management and laws and regulations

16. 1 information system security management

16. 1. 1 information security management overview

16. 1.2 information security management mode

16. 1.3 information security management system functions

16. 1.4 steps to build an information security management system

16. 1.5BS7799, ISO/IEC 17799 and ISO2700 1.

16.10.6 evaluation and certification of information security products

16.2 information security related laws and regulations

16.2. 1 domestic information security related laws and regulations

16.2.2 foreign information security related laws and regulations

16.3 exercise

Chapter 17 hierarchical protection and risk management of information systems

17. 1 information security level protection

17. 1. 1 China information security level protection

17. 1.2 foreign information security level protection

17.2 information security risk management

17.3 information system risk assessment

17.3. 1 Overview of information security risk assessment

17.3.2 information security risk assessment method

17.4 exercise

Chapter 18 Emergency Response of Information System

18. 1 emergency response overview

18. 1. 1 introduction to emergency response

18. 1.2 international emergency organization

18. 1.3 China Emergency Organization

18.2 emergency response phase

18.3 emergency response method

18.3. 1Windows system emergency response method

18.3.2 using personal software firewall

18.3.3 honeypot technology

18.4 computer crime evidence collection

18.5 exercise

Chapter 19 Data Backup and Recovery

19. 1 Overview of data backup and recovery

19.2 data backup in windows XP

19.2. 1 backup system files

19.2.2 backup hardware configuration file

19.2.3 Back up the registry file.

19.2.4 making system startup disk

Back up the whole system.

19.2.6 Create a system restore point

19.2.7 Set the corresponding policy of WindowsXP when the system stops abnormally.

19.3 data recovery in windows XP

19.3. 1 system restore method

19.3.2 Restore driver

Use "Safe Mode"

19.3.4 emergency recovery of computer "crash"

19.3.5 automatic system fault recovery

19.3.6 Restore routine data.

Use 19.4 data recovery software EasyRecovery.

19.5 exercise

refer to

……