COMP 2057 Chapter Notes - Chapter 5: Ossec, Routing Table, Turing Test
INTRODUCTION TO THE INTERNET
WEEK 5
INTERNET SECURITY
Dr. Stephanos Mavromoustakos
find more resources at oneclass.com
find more resources at oneclass.com
Learning Objectives
This week, students should be able to:
•Explain the challenges and scope of
information security
•Explain such basic security concepts as
confidentiality, integrity, and availability
•Identify tools and mechanisms for internet
security
•Apply HTML and CSS for designing
websites
2
find more resources at oneclass.com
find more resources at oneclass.com
Internet Security
Information Security
“Information security is the collection of technologies,
standards, policies and management practices that are
applied to information to keep it secure.”
https://learn.saylor.org/mod/page/view.php?id=16037
3
find more resources at oneclass.com
find more resources at oneclass.com
Document Summary
Information security is the collection of technologies, standards, policies and management practices that are applied to information to keep it secure. https://learn. saylor. org/mod/page/view. php?id=16037. Confidentiality: access and disclosure to authorized users, user ids and passwords, only sender and intended receiver should (cid:16894)understand(cid:16895) message contents. Data integrity: data not altered (in transit, or afterwards) without detection, source integrity. Internet security: bob, alice (lovers!) want to communicate (cid:16894)securely(cid:16895, trudy (intruder) may intercept, delete, add messages. Bob channel data, control messages data secure sender secure receiver data. Who might bob, alice be: web browser/server for electronic transactions (e. g. , on-line purchases, on-line banking client/server, dns servers, routers exchanging routing table updates, etc. B decryption algorithm plaintext m = kb(ka(m)) plaintext. Ka(m) ciphertext, encrypted with key ka m = kb(ka(m)) decrypted message using bob"s key kb. Internet security firewall isolates organization"s internal net from larger internet, allowing some packets to pass, blocking others administered network trusted good guys firewall public.