COMP 2057 Chapter Notes - Chapter 5: Ossec, Routing Table, Turing Test

41 views14 pages
INTRODUCTION TO THE INTERNET
WEEK 5
INTERNET SECURITY
Dr. Stephanos Mavromoustakos
find more resources at oneclass.com
find more resources at oneclass.com
Unlock document

This preview shows pages 1-3 of the document.
Unlock all 14 pages and 3 million more documents.

Already have an account? Log in
Learning Objectives
This week, students should be able to:
Explain the challenges and scope of
information security
Explain such basic security concepts as
confidentiality, integrity, and availability
Identify tools and mechanisms for internet
security
Apply HTML and CSS for designing
websites
2
find more resources at oneclass.com
find more resources at oneclass.com
Unlock document

This preview shows pages 1-3 of the document.
Unlock all 14 pages and 3 million more documents.

Already have an account? Log in
Internet Security
Information Security
Information security is the collection of technologies,
standards, policies and management practices that are
applied to information to keep it secure.”
https://learn.saylor.org/mod/page/view.php?id=16037
3
find more resources at oneclass.com
find more resources at oneclass.com
Unlock document

This preview shows pages 1-3 of the document.
Unlock all 14 pages and 3 million more documents.

Already have an account? Log in

Document Summary

Information security is the collection of technologies, standards, policies and management practices that are applied to information to keep it secure. https://learn. saylor. org/mod/page/view. php?id=16037. Confidentiality: access and disclosure to authorized users, user ids and passwords, only sender and intended receiver should (cid:16894)understand(cid:16895) message contents. Data integrity: data not altered (in transit, or afterwards) without detection, source integrity. Internet security: bob, alice (lovers!) want to communicate (cid:16894)securely(cid:16895, trudy (intruder) may intercept, delete, add messages. Bob channel data, control messages data secure sender secure receiver data. Who might bob, alice be: web browser/server for electronic transactions (e. g. , on-line purchases, on-line banking client/server, dns servers, routers exchanging routing table updates, etc. B decryption algorithm plaintext m = kb(ka(m)) plaintext. Ka(m) ciphertext, encrypted with key ka m = kb(ka(m)) decrypted message using bob"s key kb. Internet security firewall isolates organization"s internal net from larger internet, allowing some packets to pass, blocking others administered network trusted good guys firewall public.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents

Related Questions