Tổng hợp tài liệu, ebook An Ninh - Bảo Mật tham khảo.
Our discussion on more cryptographic schemes will continue. We will explore One Time Pad and OTP An example of Vigenere Cipher will also be discussed with its limitations. Transposition Cipher with an example of Rail Fence Cipher will form part of our next lecture.
25 trang | Chia sẻ: dntpro1256 | Ngày: 20/11/2020 | Lượt xem: 617 | Lượt tải: 0
We discussed some examples of applying cryptography We also practiced how cryptanalysis can break the secret The classical ciphers such as substitution was discussed with example
28 trang | Chia sẻ: dntpro1256 | Ngày: 20/11/2020 | Lượt xem: 635 | Lượt tải: 0
We discussed the basic concept of cryptography Some terminologies such as plain text, ciphertext and key were also discussed. We have seen how keys can be used to encrypt and decrypt the message
28 trang | Chia sẻ: dntpro1256 | Ngày: 20/11/2020 | Lượt xem: 668 | Lượt tải: 0
Security aspects come into play when it is necessary or desirable to protect the information transmission from an opponent who may present a threat to confidentiality, authenticity, and so on. All the techniques for providing security have two components: A security-related transformation on the information to be sent. Examples include the encrypt...
25 trang | Chia sẻ: dntpro1256 | Ngày: 20/11/2020 | Lượt xem: 675 | Lượt tải: 0
Lack of Physical security control User can use in different location other than organization premises Even if within organization, the user may move the device within secure and non-secured locations This can lead towards theft and tempering A malicious party attempt to recover sensitive data from the device itself May use the device to gain a...
31 trang | Chia sẻ: dntpro1256 | Ngày: 20/11/2020 | Lượt xem: 620 | Lượt tải: 0
In today’s lecture, we discussed how DDoS can be harmful to a network and what countermeasures such as IDS can be used to stop DDoS attacks We have seen that the nature of wireless network makes it vulnerable to security attacks We also discusses different ways that can be used to make a WLAN secure
31 trang | Chia sẻ: dntpro1256 | Ngày: 20/11/2020 | Lượt xem: 591 | Lượt tải: 0
Filter network traffic: Static packet filtering – stateless IP filtering Static packet filtering is a firewall and routing capability that provides network packet filtering based only on packet information in the current packet and administrator rules. Stateless IP filters are very inexpensive A static IP filter does little more than simply rou...
32 trang | Chia sẻ: dntpro1256 | Ngày: 20/11/2020 | Lượt xem: 671 | Lượt tải: 0
DDoS attack terminology Attacking machines are called daemons, slaves, zombies or agents. “Zombies” are usually poorly secured machines that are exploited (Also called agents) Machines that control and command the zombies are called masters or handlers. Attacker would like to hide trace: He hides himself behind machines that are called stepping...
29 trang | Chia sẻ: dntpro1256 | Ngày: 20/11/2020 | Lượt xem: 651 | Lượt tải: 0
In today’s lecture, we talked about security through obscurity We also learnt about different types of attacks such as Active and Passive attacks. We have developed an understanding about access rights and how to use access metrix
25 trang | Chia sẻ: dntpro1256 | Ngày: 20/11/2020 | Lượt xem: 612 | Lượt tải: 0
Thủ tục sử dụng công nghệ cao để sản xuất tiền giả: Ngay sau khi phát hành những đồng tiền, thẻ tín dụng được in ấn và bảo vệ bởi các kỹ thuật mới, thì lập tức xuất hiện những tờ tiền giả, giấy tờ giả, thẻ tín dụng . được làm giả với chất lượng rất khó phát hiện. Thủ tục sử dụng công nghệ cao để làm giả hộ chiếu điện tử e-passport: Chặn bắt thô...
51 trang | Chia sẻ: dntpro1256 | Ngày: 20/11/2020 | Lượt xem: 1134 | Lượt tải: 2