SlideShare ist ein Scribd-Unternehmen logo
1 von 40
Downloaden Sie, um offline zu lesen
Overview
Overview
Overview
Cryptography
Computer Security
OSI Security Architecture
Security Structure Scheme
Key Properties
Symmetric Encryption
Asymmetric Encryption
Book
Overview
Cryptography
Computer Security
OSI Security Architecture
Security Structure Scheme
Key Properties
Symmetric Encryption
Asymmetric Encryption
Book
Overview
 Cryptography: is the science of
secret writing and is an ancient
art; the first documented use of
cryptography in writing dates
back to 1900 B.C. when an
Egyptian scribe used non-
standard hieroglyphs in an
inscription (handwriting).
Overview
Cryptography
Computer Security
OSI Security Architecture
Security Structure Scheme
Key Properties
Symmetric Encryption
Asymmetric Encryption
Book
Overview
Computer Security - generic name for the collection of
tools designed to protect data
Network Security - measures to protect data during their
transmission
Internet Security - measures to protect data during their
transmission over a collection of interconnected networks
Overview
The protection afforded to an automated information
system in order to attain the applicable objectives of
preserving the integrity, availability, and
confidentiality of information system resources
(includes hardware, software, firmware,
information/data, and telecommunications)
Overview
CIA triad
Confidentiality
Integrity
Availability
Overview
Ensuring that no one can read the message except the
intended receiver.
Preserving authorized restrictions on information access
and disclosure (detection), including means for protecting
personal privacy and proprietary information. A loss of
confidentiality is the unauthorized disclosure of
information.
Overview
I O D Q N H D V W
D W W D F N D W G D Z Q
Overview
Assuring the receiver that the received message has not
been altered in any way from the original.
Guarding against improper information modification or
destruction, including ensuring information nonrepudiation
and authenticity. A loss of integrity is the unauthorized
modification or destruction of information.
Overview
An unbroken wax seal on an envelop ensures integrity.
The unique unbroken seal ensures no one has read the
contents
Overview
Ensuring timely and reliable access to and use of
information. A loss of availability is the disruption
(confusion) of access to or use of information or an
information system.
Overview
Cryptography
Computer Security
OSI Security Architecture
Security Structure Scheme
Key Properties
Symmetric Encryption
Asymmetric Encryption
Book
Overview
 The Open System Interconnect (OSI) security architecture was designated
by the ITU-T (International Telecommunication Union - Telecommunication).
The ITU-T decided that their standard "X.800" would be the ISO security
architecture.
 The OSI security architecture focuses on:
Security mechanism
Security service
Security attack
Overview
A process (or a device incorporating such a process) that
is designed to detect, prevent, or recover from a security
attack.
no single mechanism that will support all functions
required
Overview
A processing or communication service that enhances the
security of the data processing systems and the
information transfers of an organization. The services are
intended to counter security attacks, and they make use of
one or more security mechanisms to provide the service.
Make use of one or more security mechanisms to provide
the service
Overview
Any action that compromises the security of information
owned by an organization.
Information security is about how to prevent attacks, or
failing that, to detect attacks on information-based systems
Overview
A passive attack attempts to learn or make use of
information from the system but does not affect system
resources.
An active attack attempts to alter system resources or affect
their operation.
Overview
Overview
Overview
Cryptography
Computer Security
OSI Security Architecture
Security Structure Scheme
Key Properties
Symmetric Encryption
Asymmetric Encryption
Book
Overview
Plaintext
Key
Decryption
Ciphertext
Ciphertext
Key
Encryption
Plaintext
Overview
 Plaintext is the original message or data
 Secret Key is a value independent of the plaintext and of the
algorithm.
 Ciphertext This is the scrambled message produced as output.
Overview
Encryption Algorithm is a mathematical procedure for
performing encryption on data.
Decryption Algorithm is a mathematical procedure for
performing decryption on data.
Overview
Cryptography
Computer Security
OSI Security Architecture
Security Structure Scheme
Key Properties
Symmetric Encryption
Asymmetric Encryption
Book
Overview
Shorter keys = faster
processing, but less secure
Longer keys = slower
processing, but more
secure
Overview
Single use key: (one time key)
• Key is only used to encrypt one message
• encrypted email: new key generated for every email
Multi use key: (many time key)
• Key used to encrypt multiple messages
• encrypted files: same key used to encrypt many files
Overview
Cryptography
Computer Security
OSI Security Architecture
Security Structure Scheme
Key Properties
Symmetric Encryption
Asymmetric Encryption
Book
Overview
 Best known as shared-secret key algorithms
 The usual key length is 80 - 256 bits
 A sender and receiver must share a secret key
 Faster processing because they use simple mathematical operations.
 Examples include DES, 3DES, AES, IDEA, RC2/4/5/6, and Blowfish.
Key Key
Encrypt Decrypt
$1000 $1000$!@#IQ
Pre-shared
key
Overview
64 bits 64bits 64bits
01010010110010101010100101100101011100101blank blank
0101010010101010100001001001001 0101010010101010100001001001001
Block Cipher – encryption is completed
in 64 bit blocks
Stream Cipher – encryption is one bit
at a time
Overview
A stream cipher is a symmetric key cipher where plaintext
digits are combined with a pseudorandom
cipher digit stream (keystream).
A block cipher is a symmetric key cipher in which a
cryptographic key and algorithm are applied to a block of
data (for example, 64 contiguous bits) at once as a group
rather than to one bit at a time.
Overview
Cryptography
Computer Security
OSI Security Architecture
Security Structure Scheme
Key Properties
Symmetric Encryption
Asymmetric Encryption
Book
Overview
 Also known as public key algorithms
 The usual key length is 512–4096 bits
 A sender and receiver do not share a secret key
 Relatively slow because they are based on difficult computational
algorithms
 Examples include RSA, ElGamal, elliptic curves, and DH.
Encryption Key Decryption Key
Encrypt Decrypt
$1000 $1000%3f7&4
Two separate
keys which are
not shared
Overview
Cryptanalysis: is the science of analyzing and breaking
encryption schemes.
Cryptology: is the term referring to the wide study of secret
writing, and covered both cryptography and cryptanalysis.
Overview
Cryptography
Computer Security
OSI Security Architecture
Security Structure Scheme
Key Properties
Symmetric Encryption
Asymmetric Encryption
Book
Overview
Overview
Security
Lab
IBM Essentials of Web Application Security
CISCO CCNA Security
Penetration
Testing Kali Linux
Overview
facebook.com/mloey
mohamedloey@gmail.com
twitter.com/mloey
linkedin.com/in/mloey
mloey@fci.bu.edu.eg
mloey.github.io
Overview
www.YourCompany.com
© 2020 Companyname PowerPoint Business Theme. All Rights Reserved.
THANKS FOR
YOUR TIME

Weitere ähnliche Inhalte

Was ist angesagt?

Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
priya_trehan
 

Was ist angesagt? (20)

Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Cyber security
Cyber securityCyber security
Cyber security
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 
System Security-Chapter 1
System Security-Chapter 1System Security-Chapter 1
System Security-Chapter 1
 
Security
SecuritySecurity
Security
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
 
Introduction to foot printing
Introduction to foot printingIntroduction to foot printing
Introduction to foot printing
 
Ppt.1
Ppt.1Ppt.1
Ppt.1
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 

Andere mochten auch

Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
Samudin Kassan
 
Estrategia de búsqueda en scopus y cinahl
Estrategia de búsqueda en scopus y cinahlEstrategia de búsqueda en scopus y cinahl
Estrategia de búsqueda en scopus y cinahl
Vanessadc4
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
Miguel Rebollo
 

Andere mochten auch (20)

Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and Security
 
PMP Lecture 1: Introduction to Project Management
PMP Lecture 1: Introduction to Project ManagementPMP Lecture 1: Introduction to Project Management
PMP Lecture 1: Introduction to Project Management
 
Cryptography
CryptographyCryptography
Cryptography
 
Research Poster Design Ideas
Research Poster Design IdeasResearch Poster Design Ideas
Research Poster Design Ideas
 
Características y Obras de la Arq. Romana
Características y Obras de la Arq. RomanaCaracterísticas y Obras de la Arq. Romana
Características y Obras de la Arq. Romana
 
кольори веселки
кольори веселкикольори веселки
кольори веселки
 
Estrategia de búsqueda en scopus y cinahl
Estrategia de búsqueda en scopus y cinahlEstrategia de búsqueda en scopus y cinahl
Estrategia de búsqueda en scopus y cinahl
 
Innovación de marca en Snapchat
Innovación de marca en SnapchatInnovación de marca en Snapchat
Innovación de marca en Snapchat
 
PMP Lecture 3: Project Management Processes
PMP Lecture 3: Project Management ProcessesPMP Lecture 3: Project Management Processes
PMP Lecture 3: Project Management Processes
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
 
PMP Lecture 2: Project Management Framework
PMP Lecture 2: Project Management FrameworkPMP Lecture 2: Project Management Framework
PMP Lecture 2: Project Management Framework
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Chap 05 ip addresses classfless
Chap 05 ip addresses classflessChap 05 ip addresses classfless
Chap 05 ip addresses classfless
 
Semantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the EnterpriseSemantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the Enterprise
 
Chap 01 intro
Chap 01 introChap 01 intro
Chap 01 intro
 
Catalog LEROY MERLIN iunie 2014
Catalog LEROY MERLIN iunie 2014Catalog LEROY MERLIN iunie 2014
Catalog LEROY MERLIN iunie 2014
 
Basic Introduction to an Operation - OR Design and Aseptic Techniques
Basic Introduction to an Operation - OR Design and Aseptic TechniquesBasic Introduction to an Operation - OR Design and Aseptic Techniques
Basic Introduction to an Operation - OR Design and Aseptic Techniques
 

Ähnlich wie Computer Security Lecture 1: Overview

osi-security-architectureppt.pptx
osi-security-architectureppt.pptxosi-security-architectureppt.pptx
osi-security-architectureppt.pptx
kumarkaushal17
 
Intro-2013.pptIntro-2013.pptIntro-2013.ppt
Intro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.ppt
Intro-2013.pptIntro-2013.pptIntro-2013.ppt
tahirnaquash2
 
Web security
Web securityWeb security
Web security
Layla Tk
 
Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)
Alexander Decker
 

Ähnlich wie Computer Security Lecture 1: Overview (20)

osi-security-architectureppt.pptx
osi-security-architectureppt.pptxosi-security-architectureppt.pptx
osi-security-architectureppt.pptx
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
 
computer architecture.ppt
computer architecture.pptcomputer architecture.ppt
computer architecture.ppt
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
 
CH01.ppt
CH01.pptCH01.ppt
CH01.ppt
 
Intro-2013.pptIntro-2013.pptIntro-2013.ppt
Intro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.ppt
Intro-2013.pptIntro-2013.pptIntro-2013.ppt
 
cns unit 1.pptx
cns unit 1.pptxcns unit 1.pptx
cns unit 1.pptx
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
 
Unit 1.ppt
Unit 1.pptUnit 1.ppt
Unit 1.ppt
 
Network security
Network security Network security
Network security
 
Lecture 07 networking
Lecture 07 networkingLecture 07 networking
Lecture 07 networking
 
Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4
 
NS-Lec-01&02.ppt
NS-Lec-01&02.pptNS-Lec-01&02.ppt
NS-Lec-01&02.ppt
 
Network security in computer network for BS
Network security in computer network for BSNetwork security in computer network for BS
Network security in computer network for BS
 
Web security
Web securityWeb security
Web security
 
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network SecurityCS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Security
 
Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
 
ch01-4.ppt
ch01-4.pptch01-4.ppt
ch01-4.ppt
 

Mehr von Mohamed Loey

Design of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer DiseasesDesign of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer Diseases
Mohamed Loey
 

Mehr von Mohamed Loey (20)

Lecture 6: Deep Learning Applications
Lecture 6: Deep Learning ApplicationsLecture 6: Deep Learning Applications
Lecture 6: Deep Learning Applications
 
Lecture 5: Convolutional Neural Network Models
Lecture 5: Convolutional Neural Network ModelsLecture 5: Convolutional Neural Network Models
Lecture 5: Convolutional Neural Network Models
 
Lecture 4: Deep Learning Frameworks
Lecture 4: Deep Learning FrameworksLecture 4: Deep Learning Frameworks
Lecture 4: Deep Learning Frameworks
 
Lecture 4: How it Works: Convolutional Neural Networks
Lecture 4: How it Works: Convolutional Neural NetworksLecture 4: How it Works: Convolutional Neural Networks
Lecture 4: How it Works: Convolutional Neural Networks
 
Lecture 3: Convolutional Neural Networks
Lecture 3: Convolutional Neural NetworksLecture 3: Convolutional Neural Networks
Lecture 3: Convolutional Neural Networks
 
Lecture 2: Artificial Neural Network
Lecture 2: Artificial Neural NetworkLecture 2: Artificial Neural Network
Lecture 2: Artificial Neural Network
 
Lecture 1: Deep Learning for Computer Vision
Lecture 1: Deep Learning for Computer VisionLecture 1: Deep Learning for Computer Vision
Lecture 1: Deep Learning for Computer Vision
 
Design of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer DiseasesDesign of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer Diseases
 
Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2
 
Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1
 
Algorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern AlgorithmsAlgorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern Algorithms
 
Algorithms Lecture 7: Graph Algorithms
Algorithms Lecture 7: Graph AlgorithmsAlgorithms Lecture 7: Graph Algorithms
Algorithms Lecture 7: Graph Algorithms
 
Algorithms Lecture 6: Searching Algorithms
Algorithms Lecture 6: Searching AlgorithmsAlgorithms Lecture 6: Searching Algorithms
Algorithms Lecture 6: Searching Algorithms
 
Algorithms Lecture 5: Sorting Algorithms II
Algorithms Lecture 5: Sorting Algorithms IIAlgorithms Lecture 5: Sorting Algorithms II
Algorithms Lecture 5: Sorting Algorithms II
 
Algorithms Lecture 4: Sorting Algorithms I
Algorithms Lecture 4: Sorting Algorithms IAlgorithms Lecture 4: Sorting Algorithms I
Algorithms Lecture 4: Sorting Algorithms I
 
Algorithms Lecture 3: Analysis of Algorithms II
Algorithms Lecture 3: Analysis of Algorithms IIAlgorithms Lecture 3: Analysis of Algorithms II
Algorithms Lecture 3: Analysis of Algorithms II
 
Algorithms Lecture 2: Analysis of Algorithms I
Algorithms Lecture 2: Analysis of Algorithms IAlgorithms Lecture 2: Analysis of Algorithms I
Algorithms Lecture 2: Analysis of Algorithms I
 
Algorithms Lecture 1: Introduction to Algorithms
Algorithms Lecture 1: Introduction to AlgorithmsAlgorithms Lecture 1: Introduction to Algorithms
Algorithms Lecture 1: Introduction to Algorithms
 
Convolutional Neural Network Models - Deep Learning
Convolutional Neural Network Models - Deep LearningConvolutional Neural Network Models - Deep Learning
Convolutional Neural Network Models - Deep Learning
 
Deep Learning - Overview of my work II
Deep Learning - Overview of my work IIDeep Learning - Overview of my work II
Deep Learning - Overview of my work II
 

Kürzlich hochgeladen

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Kürzlich hochgeladen (20)

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 

Computer Security Lecture 1: Overview

  • 2. Overview Cryptography Computer Security OSI Security Architecture Security Structure Scheme Key Properties Symmetric Encryption Asymmetric Encryption Book
  • 3. Overview Cryptography Computer Security OSI Security Architecture Security Structure Scheme Key Properties Symmetric Encryption Asymmetric Encryption Book
  • 4. Overview  Cryptography: is the science of secret writing and is an ancient art; the first documented use of cryptography in writing dates back to 1900 B.C. when an Egyptian scribe used non- standard hieroglyphs in an inscription (handwriting).
  • 5. Overview Cryptography Computer Security OSI Security Architecture Security Structure Scheme Key Properties Symmetric Encryption Asymmetric Encryption Book
  • 6. Overview Computer Security - generic name for the collection of tools designed to protect data Network Security - measures to protect data during their transmission Internet Security - measures to protect data during their transmission over a collection of interconnected networks
  • 7. Overview The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications)
  • 9. Overview Ensuring that no one can read the message except the intended receiver. Preserving authorized restrictions on information access and disclosure (detection), including means for protecting personal privacy and proprietary information. A loss of confidentiality is the unauthorized disclosure of information.
  • 10. Overview I O D Q N H D V W D W W D F N D W G D Z Q
  • 11. Overview Assuring the receiver that the received message has not been altered in any way from the original. Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity. A loss of integrity is the unauthorized modification or destruction of information.
  • 12. Overview An unbroken wax seal on an envelop ensures integrity. The unique unbroken seal ensures no one has read the contents
  • 13. Overview Ensuring timely and reliable access to and use of information. A loss of availability is the disruption (confusion) of access to or use of information or an information system.
  • 14. Overview Cryptography Computer Security OSI Security Architecture Security Structure Scheme Key Properties Symmetric Encryption Asymmetric Encryption Book
  • 15. Overview  The Open System Interconnect (OSI) security architecture was designated by the ITU-T (International Telecommunication Union - Telecommunication). The ITU-T decided that their standard "X.800" would be the ISO security architecture.  The OSI security architecture focuses on: Security mechanism Security service Security attack
  • 16. Overview A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack. no single mechanism that will support all functions required
  • 17. Overview A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the service. Make use of one or more security mechanisms to provide the service
  • 18. Overview Any action that compromises the security of information owned by an organization. Information security is about how to prevent attacks, or failing that, to detect attacks on information-based systems
  • 19. Overview A passive attack attempts to learn or make use of information from the system but does not affect system resources. An active attack attempts to alter system resources or affect their operation.
  • 22. Overview Cryptography Computer Security OSI Security Architecture Security Structure Scheme Key Properties Symmetric Encryption Asymmetric Encryption Book
  • 24. Overview  Plaintext is the original message or data  Secret Key is a value independent of the plaintext and of the algorithm.  Ciphertext This is the scrambled message produced as output.
  • 25. Overview Encryption Algorithm is a mathematical procedure for performing encryption on data. Decryption Algorithm is a mathematical procedure for performing decryption on data.
  • 26. Overview Cryptography Computer Security OSI Security Architecture Security Structure Scheme Key Properties Symmetric Encryption Asymmetric Encryption Book
  • 27. Overview Shorter keys = faster processing, but less secure Longer keys = slower processing, but more secure
  • 28. Overview Single use key: (one time key) • Key is only used to encrypt one message • encrypted email: new key generated for every email Multi use key: (many time key) • Key used to encrypt multiple messages • encrypted files: same key used to encrypt many files
  • 29. Overview Cryptography Computer Security OSI Security Architecture Security Structure Scheme Key Properties Symmetric Encryption Asymmetric Encryption Book
  • 30. Overview  Best known as shared-secret key algorithms  The usual key length is 80 - 256 bits  A sender and receiver must share a secret key  Faster processing because they use simple mathematical operations.  Examples include DES, 3DES, AES, IDEA, RC2/4/5/6, and Blowfish. Key Key Encrypt Decrypt $1000 $1000$!@#IQ Pre-shared key
  • 31. Overview 64 bits 64bits 64bits 01010010110010101010100101100101011100101blank blank 0101010010101010100001001001001 0101010010101010100001001001001 Block Cipher – encryption is completed in 64 bit blocks Stream Cipher – encryption is one bit at a time
  • 32. Overview A stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream). A block cipher is a symmetric key cipher in which a cryptographic key and algorithm are applied to a block of data (for example, 64 contiguous bits) at once as a group rather than to one bit at a time.
  • 33. Overview Cryptography Computer Security OSI Security Architecture Security Structure Scheme Key Properties Symmetric Encryption Asymmetric Encryption Book
  • 34. Overview  Also known as public key algorithms  The usual key length is 512–4096 bits  A sender and receiver do not share a secret key  Relatively slow because they are based on difficult computational algorithms  Examples include RSA, ElGamal, elliptic curves, and DH. Encryption Key Decryption Key Encrypt Decrypt $1000 $1000%3f7&4 Two separate keys which are not shared
  • 35. Overview Cryptanalysis: is the science of analyzing and breaking encryption schemes. Cryptology: is the term referring to the wide study of secret writing, and covered both cryptography and cryptanalysis.
  • 36. Overview Cryptography Computer Security OSI Security Architecture Security Structure Scheme Key Properties Symmetric Encryption Asymmetric Encryption Book
  • 38. Overview Security Lab IBM Essentials of Web Application Security CISCO CCNA Security Penetration Testing Kali Linux
  • 40. Overview www.YourCompany.com © 2020 Companyname PowerPoint Business Theme. All Rights Reserved. THANKS FOR YOUR TIME