AFM341 Chapter Notes - Chapter 11: Uninterruptible Power Supply, Session Key, Breakcore

53 views4 pages

Document Summary

Information security management goal: protect information from internal and external threats confidentiality: info not accessible to unauthorized people/processes integrity: accurate + complete. Information security risks virus: self-replication program that runs and spreads by modifying other programs/files. Worm: self-replication, self-contained, self-spreading program that uses networking mechanisms to spread. Trojan horse: program that seems to have a useful purpose but is malicious. Botnet: software bots that overruns computers to act automatically in response to spam: unsolicited bulk info controls received. Dos: prevent authorized access to resources or delaying time-critical operations. Encryption: preventive control that provides confidentiality and privacy when transmitting and storing data. Symmetric-key encryption fast and suitable for large data sets/messages sender a(cid:374)d re(cid:272)ei(cid:448)er use the sa(cid:373)e key to e(cid:374)(cid:272)rypt a(cid:374)d de(cid:272)rypt (cid:373)essages (cid:894)(cid:272)a(cid:374)"t use it to authenticate users) Receiver uses their private key to decrypt message. Process that establishes origin of information/determines identity of user, process, device. Digital signature: message digest (md) that is encrypted using senders private key.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents