1.1 Cybersecurity, Information Security, and Network Security1.2 Security Attacks1.3 Security Services1.4 Security Mechanisms1.5 Cryptographic Algorithms1.6 Symmetric Encryption1.7 Asymmetric Encryption1.8 Cryptographic Hash Functions1.9 Digital Signatures1.10 Practical Considerations1.11 Public-Key Infrastructure1.12 Network Security1.13 Key Terms and Review Questions1.14 References