CSC 106 Lecture Notes - Lecture 1: Steganography, Information Security, Brute-Force Attack

71 views2 pages

Document Summary

Internet is a public domain in which anyone can see/get what is being sent to or from you, that is why cryptography from router to computer is used to hide what is being sent and received. Denial of service attack- floods system to point of not being able to process things past that point. Denial of service fix- ignores thing that floods system. Brute force attack- tries over and over until correct. Phishing/social engineering- people can be idiots, and they"ll easily let people in by saying yes or being coaxed into telling something. Visual verification: human denies unauthorized people(human component) Timing mechanism: set timer if wrong, brute force type time to figure out grows exponentially. Cia triad(need all three in balance to have proper security system): Confidentiality: secured info must not be able to be found/seen. Steganography is hiding message inside a picture, music, or other things. They"ll hidden messages that people couldn"t hear or see, but computers can decipher.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents