Hub: engineering
Part of the series
The Security Problem
Program Threats
- Trojan horse
- Trap door
- Logic bomb
- Stack and buffer overflow
- Viruses
System and Network Threats
- Worms
- Port scanning
- Denial of service
Cryptography as a Security Tool
- Encryption
- Implementation of Cryptography
- An Example: SSL
User Authentication
- Passwords
- Password vulnerabilities
- Encrypted passwords
- One-time passwords
- Biometrics
Implementing Security Defenses
- Security policy
- Vulnerability assessment
- Intrusion detection
- Virus protection
- Auditing, accounting and logging