Information Assurance

Description

Computer Security Overview and Basic Encryption
vossashley56
Mind Map by vossashley56, updated more than 1 year ago
vossashley56
Created by vossashley56 over 10 years ago
11
0

Resource summary

Information Assurance
  1. Computer Security Overview
    1. Security Problems in Computing
      1. Computer System
        1. Hardware
          1. Software
            1. Storage Media
              1. Data
                1. Networks
                2. Principle of Easiest Penetration
                  1. any available means
                    1. not obvious
                      1. not where defended
                        1. not how we expected
                        2. Threat
                          1. Set of circumstances that can lead to loss or harm
                            1. block threats by controlling vunerabilities
                              1. Types
                                1. interception
                                  1. interruption
                                    1. modification
                                      1. fabrication
                                    2. Vulnerability
                                      1. Weakness in the security system
                                        1. Hardware Vulerablilites
                                          1. Interruption
                                            1. Interception
                                              1. modification
                                                1. fabrication
                                                  1. destruction
                                                  2. Software Vunerability
                                                    1. Factional Rounding
                                                      1. Deletion
                                                        1. modification
                                                          1. logic bombs
                                                            1. viruses
                                                              1. Trojan Horses
                                                                1. back door
                                                                  1. keyloggers
                                                                  2. theft
                                                                  3. Data Vulerabilities
                                                                    1. Interception
                                                                      1. destruction
                                                                        1. CIA
                                                                      2. Attack
                                                                        1. Exploiting a vulnerability
                                                                          1. 3 things needed
                                                                            1. Method
                                                                              1. Opportunity
                                                                                1. Motive
                                                                              2. Control
                                                                                1. counters a vunerability
                                                                                  1. never use just one control
                                                                                    1. Encryption
                                                                                      1. Different Types of Controls

                                                                                        Attachments:

                                                                                        1. Policy
                                                                                          1. Broad Statement
                                                                                          2. Procedures
                                                                                            1. Specific actions to be taken
                                                                                        2. Principle of Adequate Protection
                                                                                          1. protection = value
                                                                                        3. Security Goals-CIA
                                                                                          1. C-Confidentiality
                                                                                            1. Secrecy, Privacy
                                                                                              1. who should access what?
                                                                                                1. Under what Conditions?
                                                                                                2. I-Intergrity
                                                                                                  1. precise, accurate, consistent
                                                                                                    1. unmodified, or only modified by authorized users
                                                                                                      1. meaningful and usable
                                                                                                      2. A- Availability
                                                                                                        1. data and services
                                                                                                          1. can you get what we need, when we need it, in a timely fasion
                                                                                                            1. Fault Tolerance, concurrency issues
                                                                                                            2. Extra
                                                                                                              1. Authenticity
                                                                                                                1. Non-Repudiation
                                                                                                                  1. Essential for E-Commerce
                                                                                                                2. Computer Criminals
                                                                                                                  1. any crime involving a computer
                                                                                                                    1. amateurs- disgruntled employees
                                                                                                                      1. Pros- Hackers
                                                                                                                      2. Defense
                                                                                                                        1. Risk
                                                                                                                          1. The possibility for harm to occur
                                                                                                                            1. Prevent
                                                                                                                              1. Deter
                                                                                                                                1. Deflect
                                                                                                                                  1. Detect
                                                                                                                                    1. Recover
                                                                                                                                2. Effectiveness
                                                                                                                                  1. Awareness of the problem
                                                                                                                                    1. Likelihood of use
                                                                                                                                      1. Principle of Effectiveness
                                                                                                                                        1. Controls that are not used are not controls
                                                                                                                                        2. Principle of Weakest Link
                                                                                                                                          1. Security is as strong as the weakest control
                                                                                                                                      2. Basic Encryption
                                                                                                                                        1. Terms
                                                                                                                                          1. S-Sender
                                                                                                                                            1. T- Transmission Medium
                                                                                                                                              1. R-Rcipient
                                                                                                                                                1. O-Outsider (interceptor)
                                                                                                                                                  1. Encryption
                                                                                                                                                    1. Encoding a message so its meaning is not obvious
                                                                                                                                                    2. Decryption
                                                                                                                                                      1. transforming an encrypted message to plaintext (deciphering)
                                                                                                                                                      2. Cryptosystem
                                                                                                                                                        1. encrypts and decrypts
                                                                                                                                                        2. Crytography
                                                                                                                                                          1. from Krytos, meaning hidden and Graphos, meaning written
                                                                                                                                                          2. Cryptanalyst
                                                                                                                                                            1. studies encryption and encrypted messages
                                                                                                                                                            2. Cryptographer
                                                                                                                                                              1. works for a legitimate sender
                                                                                                                                                              2. Cryptology
                                                                                                                                                                1. research into and study of encryption and decryption
                                                                                                                                                                  1. includes cryptography and cryptanalysis
                                                                                                                                                                2. Threats by O
                                                                                                                                                                  1. Block
                                                                                                                                                                    1. Intercept
                                                                                                                                                                      1. Modify
                                                                                                                                                                        1. Fabricate
                                                                                                                                                                        2. Symmetric Encryption
                                                                                                                                                                          1. Keys are the same for encryption and decryption
                                                                                                                                                                          2. Asymmetric Encryption
                                                                                                                                                                            1. Encryption and Decryption keys are different
                                                                                                                                                                            2. Keyless Cipher
                                                                                                                                                                              1. security through obsecurity
                                                                                                                                                                              2. Cryptanalysis
                                                                                                                                                                                1. break a single message
                                                                                                                                                                                  1. find patterns to develop a decryption algorithm
                                                                                                                                                                                    1. infer meaning w/o breaking the encryption
                                                                                                                                                                                      1. Deduce the Key
                                                                                                                                                                                        1. find weakness in the implementation
                                                                                                                                                                                          1. find general weakness in the algorithm
                                                                                                                                                                                        Show full summary Hide full summary

                                                                                                                                                                                        Similar

                                                                                                                                                                                        Blood brothers-Context
                                                                                                                                                                                        umber_k
                                                                                                                                                                                        AP Chemistry
                                                                                                                                                                                        Cathal Darby
                                                                                                                                                                                        George- Of mice and men
                                                                                                                                                                                        Elinor Jones
                                                                                                                                                                                        Variation and evolution Quiz
                                                                                                                                                                                        James Edwards22201
                                                                                                                                                                                        AQA GCSE Biology B1- Quiz
                                                                                                                                                                                        Ethan Beadling
                                                                                                                                                                                        AQA GCSE Physics Unit 2
                                                                                                                                                                                        Gabi Germain
                                                                                                                                                                                        Edexcel Additional Science Chemistry Topics 1+2
                                                                                                                                                                                        El Smith
                                                                                                                                                                                        English Basic Grammar
                                                                                                                                                                                        tvazacconcia
                                                                                                                                                                                        Psychology Key Words Research Methods
                                                                                                                                                                                        Alfie Moorhead
                                                                                                                                                                                        Les Aliments
                                                                                                                                                                                        dAnn dAnn
                                                                                                                                                                                        Métodos y reglas de interpretación jurídica Constitucional y Ordinaria
                                                                                                                                                                                        jose calle