-
- 주제분류
- 공학 >컴퓨터ㆍ통신 >정보통신공학
-
- 강의학기
- 2014년 2학기
-
- 조회수
- 23,427
-
- 평점
- 5/5.0 (1)
a. Present concepts and major topics of Network Security
b. Introduce technologies of basic cryptography, network security applications and system security
b. Introduce technologies of basic cryptography, network security applications and system security
차시별 강의
| 1. | ![]() |
Introduction 1 | Computer Security Concepts | ![]() |
| 2. | ![]() |
Introduction 2 | OSI Security Architecture, Security Attacks, Security Services, Security Mechanisms, A Model for Network Security | ![]() |
| 3. | ![]() |
Symmetric Encryption & Message Confidentiality 1 | Symmetric Encryption Principles | ![]() |
![]() |
Symmetric Encryption & Message Confidentiality 2 | Symmetric Block Encryption Algorithms, Random and Pseudorandom Numbers | ![]() |
|
| 4. | ![]() |
Symmetric Encryption & Message Confidentiality 3 | Stream Ciphers and RC4, Cipher Block Modes of Operation | ![]() |
![]() |
Symmetric Encryption & Message Confidentiality 4 | Cipher Block Modes of Operation | ![]() |
|
| 5. | ![]() |
Public-Key Cryptogrphy and Message Authentication 1 | Approaches to Message Authentication, | ![]() |
![]() |
Public-Key Cryptogrphy and Message Authentication 2 | Secure Hash Functions | ![]() |
|
| 6. | ![]() |
Public-Key Cryptogrphy and Message Authentication 3 | Message Authentication Codes : HMAC | ![]() |
![]() |
Public-Key Cryptogrphy and Message Authentication 4 | Message Authentication Codes, Public-Key Cryptography Principles | ![]() |
|
| 7. | ![]() |
Public-Key Cryptogrphy and Message Authentication 5 | Public-Key Cryptography Algorithms | ![]() |
![]() |
Public-Key Cryptogrphy and Message Authentication 6 | Public-Key Cryptography Algorithms, Digital Signatures | ![]() |
|
| 8. | ![]() |
Key Distribution and User Authentication 1 | Symmetric Key Distribution Using Symmetric Encryption | ![]() |
![]() |
Key Distribution and User Authentication 2 | Kerberos | ![]() |
|
| 9. | ![]() |
Key Distribution and User Authentication 3 | Kerberos, Key Distribution Using Asymmetric Encryption, X.509 Certificates, | ![]() |
![]() |
Key Distribution and User Authentication 4 | X.509 Certificates | ![]() |
|
| 10. | ![]() |
Key Distribution and User Authentication 5 | Public-Key Infrastructure, Federated Identity Management | ![]() |
| 11. | ![]() |
Transport-Level Security 1 | Web Security Considerations, SSL and TLS | ![]() |
![]() |
Transport-Level Security 2 | Secure Socket Layer (SSL), Transport Layer Security (TLS), HTTPS | ![]() |
|
![]() |
Transport-Level Security 3 | Secure Shell (SSH) | ![]() |
|
| 12. | ![]() |
Wireless Network Security 1 | Wireless Security, Wireless Network Threat | ![]() |
![]() |
Wireless Network Security 2 | Mobile Device Security, IEEE 802.11 Wireless LAN Overview | ![]() |
|
![]() |
Wireless Network Security 3 | IEEE 802.11 Wireless LAN Overview | ![]() |
|
| 13. | ![]() |
Wireless Network Security 4 | IEEE 802.11i Wireless LAN Security | ![]() |
![]() |
Wireless Network Security 5 | IEEE 802.11i Wireless LAN Security | ![]() |
|
| 14. | ![]() |
Electronic Mail Security 1 | Pretty good privacy, PGP Operation(Authentication, Confidentiality) | ![]() |
![]() |
Electronic Mail Security 2 | PGP Operation(Compression, E-mail Compatibility), S/MIME | ![]() |
|
![]() |
Electronic Mail Security 3 | S/MIME, DomainKeys Identified Mail | ![]() |
|
| 15. | ![]() |
IP Security 1 | IP Security Overview | ![]() |
![]() |
IP Security 2 | IP Security Policy, Encapsulating Security Payload | ![]() |
|
![]() |
IP Security 3 | Combining Security Associations, Internet Key Exchange, Cryptographic Suites | ![]() |
연관 자료








