en-de
en-es
en-fr
en-pt
en-sl
en
en-zh
0.25
0.5
0.75
1.25
1.5
1.75
2
Security infrastructures for CNs
Published on Feb 25, 20073461 Views
Related categories
Chapter list
Security infrastructures for CNs Dr. István MEZGÁR Hungarian Academy of Sciences [email protected] 00:02
Structure of the lecture00:29
Goal of the lecture00:57
Definitions and relations02:26
What is security?02:30
Security in practice08:10
Security Infrastructure12:51
Connection between trust and security13:07
Definition of trust14:14
Types of trust14:22
Trust building 14:39
Role of interfaces15:08
Security and Collaborative Networks18:21
CN and security18:23
Specialties of CN19:13
CN security requirements22:30
Life cycle phases of CN and the needed trust-types and the realization mechanisms 25:53
Fields, elements and technologies of security27:40
Fields of computer security27:47
Computer & environment security32:39
Network security33:31
Security hierarchy34:16
Security policy34:34
Types of computer security policy35:04
Security services35:24
Confidentiality35:37
Integrity35:57
Authentication36:27
Access control36:41
Non-repudiation36:56
Security mechanisms37:20
Security mechanisms and services37:42
Basic steps of a security system design process37:55
Most frequent types of attacks in US 38:47
Security technologies used in the US 39:52
Tools, methods and techniques for security 41:08
Security architectures41:40
Security solutions for VE41:54
Client security in NIIIP42:29
The Architecture of PRODNET Communication Infrastructure 42:44
Firewall42:55
Why HW firewall43:09
Virus defence43:42
Encryption43:43
Encryption Algorithms 44:20
Public key infrastructure44:48
Biometry45:56
Biometry approaches46:29
Smart Card (ISO 7816)46:52
Wireless technologies and their security 47:01
TITLE47:14
Wireless security47:23
VoIP application47:28
RFID applications48:02
Standards48:12
Technical vision48:14
Trends in security48:26
Conclusions 48:41
Useful URLs49:13
Thanks for your attention49:50