Network Security Defined, 2nd Edition


This document was created to serve as a resource for professionals around the world who need to provide for computer security within their organization and for the security of corporate information passing over world-wide networks.

This one booklet does not replace a textbook on network security, but it can help you better understand general network security terms and concepts.

The Introduction is a brief overview of the need for good network security and about planning and managing your network security needs.

Chapter 1 describes network security, some things that can threaten security, and some ways to protect against those threats.

Chapter 2 describes two encryption techniques and two methods to deliver encrypted data.

Chapter 3 explains some authentication methods and describes some specific ways to deliver authentication services.

Chapter 4 contains the process for establishing a secure communication session using Kerberos, an authentication technique that uses encryption.

Chapter 5 describes two major access control techniques to provide security and some specific examples of ways to deliver access control services.

You’ll also find a list of sources for additional information about network security and a handy glossary at the end of this booklet.


Table of Contents


1. Network Security

2. Encryption
3. Authentication Exchange
4. Kerberos Sessions
5. Access Control
6. Additional Reading