NetworkSec - Layer 3 - Router
[toc] NetworkSec - Layer 3 - Router **each port 1 collision domain, 1 broadcast/port ** Router makes decisions based on logical network address (like IP address) has the capab...
[toc] NetworkSec - Layer 3 - Router **each port 1 collision domain, 1 broadcast/port ** Router makes decisions based on logical network address (like IP address) has the capab...
[toc] NetworkSec - Layer 3 - Access control lists (ACLs) ACLs Access control lists (ACLs): rules implemented on a router / firewalls. Rules within an ACL provide rule-based ...
IP Internet Protocol (IP) Routing IP Packets The Structure of the Internet IP packet Header IPv4 Binary Numbering IPv4 Addressing ...
Network Protocol Network Protocol Protocol List Protocol List ICMP has no ports and is neither TCP nor UDP. number TCP/UDP protocol ...
NetworkProtocol SSL/TLS Handshake NetworkProtocol SSL/TLS Handshake Overview 4 SSL protocols: TLS Handshake Protocol: Phase I of Handshake Protocol: ...
HTTP Response Status Codes Overview of Status Codes 1xx Informational 100 Continue 101 Switching Protocols 2xx Successful ...
网络协议 The OSI Model Layers in OSI TCP & UDP, TCP/IP layers in TCP/IP 4. Application Layer: 3. Host-to-Host 2. Internet...
NetworkSec - Fast API NetworkSec - Fast API Overview Requirements Installation Example Create it Run it Check it ...
Cipher code playfair Cipher 普莱费尔密码 Hill Cipher 希尔密码 Vigenere cipher 维吉尼亚密码 Caesar Cipher 凱撒密碼 Cipher code Classical encryption technique substitution...
[toc] PKI Public Key Infrastructure public key encryption’s major strength: ability to facilitate communication between parties previously unknown to each other. facilitate the se...
[toc] Digital certificates Basic Digital certificates electronic credentials Most commonly they contain a public key and the identity of the owner. used to assert the onl...
[toc] Digital Certificate type of Digital Certificate Certificate Attributes Four main types of certificates are used: End-entity certificates CA certificates Cross...
[toc] Digital Certificates Verification Trust and Certificate Verification When a user chooses to trust a CA download that CA’s digital certificate and public key, stored on he...
[toc] ref: Authority Registration authorities (RAs): assist Certificate authorities (CAs) RA help offload work from the CA. verify users’ identities prior to iss...
Trusted Computing basic 发展 信任是安全的基础 关键技术 Trusted Platform Module (TPMs) 安全芯片 verificat...