null
US
Anmelden
kostenlos registrieren
Registrieren
Wir haben festgestellt, dass Javascript in deinem Browser nicht aktiviert ist. Aufgrund des dynamischen Charakters unserer Website muss Javascript allerdings entsprechend aktiviert sein. Bitte lese dir unsere
Geschäftsbedingungen
durch, um mehr Informationen zu erhalten.
Nächster
Kopieren und bearbeiten
Sie müssen sich anmelden, um diese Aktion abzuschließen!
Kostenlos registrieren
1249947
Information Assurance
Beschreibung
Computer Security Overview and Basic Encryption
Mindmap von
vossashley56
, aktualisiert more than 1 year ago
Mehr
Weniger
Erstellt von
vossashley56
vor mehr als 11 Jahre
11
0
0
Zusammenfassung der Ressource
Information Assurance
Computer Security Overview
Security Problems in Computing
Computer System
Hardware
Software
Storage Media
Data
Networks
Principle of Easiest Penetration
any available means
not obvious
not where defended
not how we expected
Threat
Set of circumstances that can lead to loss or harm
block threats by controlling vunerabilities
Types
interception
interruption
modification
fabrication
Vulnerability
Weakness in the security system
Hardware Vulerablilites
Interruption
Interception
modification
fabrication
destruction
Software Vunerability
Factional Rounding
Deletion
modification
logic bombs
viruses
Trojan Horses
back door
keyloggers
theft
Data Vulerabilities
Interception
destruction
CIA
Attack
Exploiting a vulnerability
3 things needed
Method
Opportunity
Motive
Control
counters a vunerability
never use just one control
Encryption
Different Types of Controls
Anlagen:
Controls
Policy
Broad Statement
Procedures
Specific actions to be taken
Principle of Adequate Protection
protection = value
Security Goals-CIA
C-Confidentiality
Secrecy, Privacy
who should access what?
Under what Conditions?
I-Intergrity
precise, accurate, consistent
unmodified, or only modified by authorized users
meaningful and usable
A- Availability
data and services
can you get what we need, when we need it, in a timely fasion
Fault Tolerance, concurrency issues
Extra
Authenticity
Non-Repudiation
Essential for E-Commerce
Computer Criminals
any crime involving a computer
amateurs- disgruntled employees
Pros- Hackers
Defense
Risk
The possibility for harm to occur
Prevent
Deter
Deflect
Detect
Recover
Effectiveness
Awareness of the problem
Likelihood of use
Principle of Effectiveness
Controls that are not used are not controls
Principle of Weakest Link
Security is as strong as the weakest control
Basic Encryption
Terms
S-Sender
T- Transmission Medium
R-Rcipient
O-Outsider (interceptor)
Encryption
Encoding a message so its meaning is not obvious
Decryption
transforming an encrypted message to plaintext (deciphering)
Cryptosystem
encrypts and decrypts
Crytography
from Krytos, meaning hidden and Graphos, meaning written
Cryptanalyst
studies encryption and encrypted messages
Cryptographer
works for a legitimate sender
Cryptology
research into and study of encryption and decryption
includes cryptography and cryptanalysis
Threats by O
Block
Intercept
Modify
Fabricate
Symmetric Encryption
Keys are the same for encryption and decryption
Asymmetric Encryption
Encryption and Decryption keys are different
Keyless Cipher
security through obsecurity
Cryptanalysis
break a single message
find patterns to develop a decryption algorithm
infer meaning w/o breaking the encryption
Deduce the Key
find weakness in the implementation
find general weakness in the algorithm
Zusammenfassung anzeigen
Zusammenfassung ausblenden
Möchten Sie
kostenlos
Ihre eigenen
Mindmaps
mit GoConqr erstellen?
Mehr erfahren
.
ähnlicher Inhalt
Bibliothek durchsuchen