Nov 12, 2014
Information System Security
*
*
*
(Confidentiality) (Integrity) (Availability) (Non-Repudiation)*
*
(Basic Security Measure)
*
7
(External Security)
(Operational Security)
(Surveillance)
(Passwords and ID Systems)
(Auditing)
(Access Rights)
(Guarding Against Viruses)
*
(External Security)
*
(Operational Security)
*
(Surveillance)
*
(Passwords and ID Systems)
*
(Auditing)
Transaction Transaction Log File Transaction*
*
(Access Rights)
2*
(Guarding Against Viruses)
*
Basic Encryption and Decryption Techniques
*
*
How are you feeling today
HXEOWYLP 34ACJLKLO GDEABCQ.
Encryption Algorithm
Plain text
Key
Ciphertext
(Public Key Cryptography)
2
(Symmetric Cryptosystems) (Asymmetric Cryptosystems)*
(Public Key Cryptography)
*
Symmetric Encryption
(Cipher text)
Internet
(Cipher text)
*
Symmetric Encryption
2
Authentication Non-repudiation*
(Public Key Cryptography)
*
Asymmetric Encryption
(Cipher text)
Internet
(Public Key)
(Cipher text)
( Private Key)
*
Asymmetric Encryption
Authenticate**
*