Top Banner

Click here to load reader

of 22

Inftroduction to Information system security

Nov 12, 2014

ReportDownload

Documents

 


  • Information System Security

    *

  • *

  • *

    (Confidentiality) (Integrity) (Availability) (Non-Repudiation)

    *

    *

  • (Basic Security Measure)

    *

  • 7

    (External Security)

    (Operational Security)

    (Surveillance)

    (Passwords and ID Systems)

    (Auditing)

    (Access Rights)

    (Guarding Against Viruses)

    *

  • (External Security)

    *


  • (Operational Security)

    (, , )

    *

  • (Surveillance)

    *


  • (Passwords and ID Systems)

    - -

    *

  • (Auditing)

    Transaction Transaction Log File Transaction

    *

  • *

  • (Access Rights)

    2

    *

  • (Guarding Against Viruses)

    *

  • Basic Encryption and Decryption Techniques

    *

  • (Cryptography) Plain text Encryption Algorithm Ciphertext Key

    *

    How are you feeling today

    HXEOWYLP 34ACJLKLO GDEABCQ.

    Encryption Algorithm

    Plain text

    Key

    Ciphertext


  • (Public Key Cryptography)

    2

    (Symmetric Cryptosystems) (Asymmetric Cryptosystems)

    *


  • (Public Key Cryptography)

    (Symmetric Cryptosystems)

    *

  • Symmetric Encryption

    (Cipher text)

    Internet

    (Cipher text)

    *

  • Symmetric Encryption

    2

    Authentication Non-repudiation

    *


  • (Public Key Cryptography)

    (Asymmetric Cryptosystems) 2 (Public key) (Private key ) Public key Private Key

    *

  • Asymmetric Encryption

    (Cipher text)

    Internet

    (Public Key)

    (Cipher text)

    ( Private Key)

    *

  • Asymmetric Encryption

    Authenticate

    **

    *