• Network Security - Lecture 12Network Security - Lecture 12

    Our discussion on more cryptographic schemes will continue. We will explore One Time Pad and OTP An example of Vigenere Cipher will also be discussed with its limitations. Transposition Cipher with an example of Rail Fence Cipher will form part of our next lecture.

    pptx25 trang | Chia sẻ: dntpro1256 | Ngày: 20/11/2020 | Lượt xem: 617 | Lượt tải: 0

  • Network Security - Lecture 11Network Security - Lecture 11

    We discussed some examples of applying cryptography We also practiced how cryptanalysis can break the secret The classical ciphers such as substitution was discussed with example

    pptx28 trang | Chia sẻ: dntpro1256 | Ngày: 20/11/2020 | Lượt xem: 635 | Lượt tải: 0

  • Network Security - Lecture 10Network Security - Lecture 10

    We discussed the basic concept of cryptography Some terminologies such as plain text, ciphertext and key were also discussed. We have seen how keys can be used to encrypt and decrypt the message

    pptx28 trang | Chia sẻ: dntpro1256 | Ngày: 20/11/2020 | Lượt xem: 668 | Lượt tải: 0

  • Network Security - Lecture 9Network Security - Lecture 9

    Security aspects come into play when it is necessary or desirable to protect the information transmission from an opponent who may present a threat to confidentiality, authenticity, and so on. All the techniques for providing security have two components: A security-related transformation on the information to be sent. Examples include the encrypt...

    pptx25 trang | Chia sẻ: dntpro1256 | Ngày: 20/11/2020 | Lượt xem: 675 | Lượt tải: 0

  • Network Security - Lecture 8Network Security - Lecture 8

    Lack of Physical security control User can use in different location other than organization premises Even if within organization, the user may move the device within secure and non-secured locations This can lead towards theft and tempering A malicious party attempt to recover sensitive data from the device itself May use the device to gain a...

    pptx31 trang | Chia sẻ: dntpro1256 | Ngày: 20/11/2020 | Lượt xem: 620 | Lượt tải: 0

  • Network Security - Lecture 7Network Security - Lecture 7

    In today’s lecture, we discussed how DDoS can be harmful to a network and what countermeasures such as IDS can be used to stop DDoS attacks We have seen that the nature of wireless network makes it vulnerable to security attacks We also discusses different ways that can be used to make a WLAN secure

    pptx31 trang | Chia sẻ: dntpro1256 | Ngày: 20/11/2020 | Lượt xem: 591 | Lượt tải: 0

  • Network Security - Lecture 6Network Security - Lecture 6

    Filter network traffic: Static packet filtering – stateless IP filtering Static packet filtering is a firewall and routing capability that provides network packet filtering based only on packet information in the current packet and administrator rules. Stateless IP filters are very inexpensive A static IP filter does little more than simply rou...

    pptx32 trang | Chia sẻ: dntpro1256 | Ngày: 20/11/2020 | Lượt xem: 671 | Lượt tải: 0

  • Network Security - Lecture 5Network Security - Lecture 5

    DDoS attack terminology Attacking machines are called daemons, slaves, zombies or agents. “Zombies” are usually poorly secured machines that are exploited (Also called agents) Machines that control and command the zombies are called masters or handlers. Attacker would like to hide trace: He hides himself behind machines that are called stepping...

    pptx29 trang | Chia sẻ: dntpro1256 | Ngày: 20/11/2020 | Lượt xem: 651 | Lượt tải: 0

  • Network Security - Lecture 4Network Security - Lecture 4

    In today’s lecture, we talked about security through obscurity We also learnt about different types of attacks such as Active and Passive attacks. We have developed an understanding about access rights and how to use access metrix

    pptx25 trang | Chia sẻ: dntpro1256 | Ngày: 20/11/2020 | Lượt xem: 612 | Lượt tải: 0

  • Bài giảng Tội phạm máy tínhBài giảng Tội phạm máy tính

    Thủ tục sử dụng công nghệ cao để sản xuất tiền giả: Ngay sau khi phát hành những đồng tiền, thẻ tín dụng được in ấn và bảo vệ bởi các kỹ thuật mới, thì lập tức xuất hiện những tờ tiền giả, giấy tờ giả, thẻ tín dụng . được làm giả với chất lượng rất khó phát hiện. Thủ tục sử dụng công nghệ cao để làm giả hộ chiếu điện tử e-passport: Chặn bắt thô...

    pptx51 trang | Chia sẻ: dntpro1256 | Ngày: 20/11/2020 | Lượt xem: 1134 | Lượt tải: 2