null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
1249947
Information Assurance
Description
Computer Security Overview and Basic Encryption
Mind Map by
vossashley56
, updated more than 1 year ago
More
Less
Created by
vossashley56
over 10 years ago
11
0
0
Resource summary
Information Assurance
Computer Security Overview
Security Problems in Computing
Computer System
Hardware
Software
Storage Media
Data
Networks
Principle of Easiest Penetration
any available means
not obvious
not where defended
not how we expected
Threat
Set of circumstances that can lead to loss or harm
block threats by controlling vunerabilities
Types
interception
interruption
modification
fabrication
Vulnerability
Weakness in the security system
Hardware Vulerablilites
Interruption
Interception
modification
fabrication
destruction
Software Vunerability
Factional Rounding
Deletion
modification
logic bombs
viruses
Trojan Horses
back door
keyloggers
theft
Data Vulerabilities
Interception
destruction
CIA
Attack
Exploiting a vulnerability
3 things needed
Method
Opportunity
Motive
Control
counters a vunerability
never use just one control
Encryption
Different Types of Controls
Attachments:
Controls
Policy
Broad Statement
Procedures
Specific actions to be taken
Principle of Adequate Protection
protection = value
Security Goals-CIA
C-Confidentiality
Secrecy, Privacy
who should access what?
Under what Conditions?
I-Intergrity
precise, accurate, consistent
unmodified, or only modified by authorized users
meaningful and usable
A- Availability
data and services
can you get what we need, when we need it, in a timely fasion
Fault Tolerance, concurrency issues
Extra
Authenticity
Non-Repudiation
Essential for E-Commerce
Computer Criminals
any crime involving a computer
amateurs- disgruntled employees
Pros- Hackers
Defense
Risk
The possibility for harm to occur
Prevent
Deter
Deflect
Detect
Recover
Effectiveness
Awareness of the problem
Likelihood of use
Principle of Effectiveness
Controls that are not used are not controls
Principle of Weakest Link
Security is as strong as the weakest control
Basic Encryption
Terms
S-Sender
T- Transmission Medium
R-Rcipient
O-Outsider (interceptor)
Encryption
Encoding a message so its meaning is not obvious
Decryption
transforming an encrypted message to plaintext (deciphering)
Cryptosystem
encrypts and decrypts
Crytography
from Krytos, meaning hidden and Graphos, meaning written
Cryptanalyst
studies encryption and encrypted messages
Cryptographer
works for a legitimate sender
Cryptology
research into and study of encryption and decryption
includes cryptography and cryptanalysis
Threats by O
Block
Intercept
Modify
Fabricate
Symmetric Encryption
Keys are the same for encryption and decryption
Asymmetric Encryption
Encryption and Decryption keys are different
Keyless Cipher
security through obsecurity
Cryptanalysis
break a single message
find patterns to develop a decryption algorithm
infer meaning w/o breaking the encryption
Deduce the Key
find weakness in the implementation
find general weakness in the algorithm
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
Blood brothers-Context
umber_k
AP Chemistry
Cathal Darby
George- Of mice and men
Elinor Jones
Variation and evolution Quiz
James Edwards22201
AQA GCSE Biology B1- Quiz
Ethan Beadling
AQA GCSE Physics Unit 2
Gabi Germain
Edexcel Additional Science Chemistry Topics 1+2
El Smith
English Basic Grammar
tvazacconcia
Psychology Key Words Research Methods
Alfie Moorhead
Les Aliments
dAnn dAnn
Métodos y reglas de interpretación jurídica Constitucional y Ordinaria
jose calle
Browse Library