• Chữ ký số tập thể - Mô hình và thuật toánChữ ký số tập thể - Mô hình và thuật toán

    Bài báo đề xuất một mô hình ứng dụng chữ ký số gọi là mô hình chữ ký tập thể và lược đồ chữ ký số theo mô hình ứng dụng này có thể áp dụng cho đối tượng là các cơ quan, đơn vị, doanh nghiệp,. nhằm đảm bảo cho việc chứng thực các thông điệp dữ liệu trong các thủ tục hành chính điện tử hoàn toàn phù hợp với các thủ tục hành chính trong thực tế xã ...

    pdf6 trang | Chia sẻ: vutrong32 | Ngày: 17/10/2018 | Lượt xem: 1088 | Lượt tải: 0

  • Bài giảng Security+ Guide to Network Security Fundamentals - Chapter 13: Advanced Security and BeyondBài giảng Security+ Guide to Network Security Fundamentals - Chapter 13: Advanced Security and Beyond

    Summary • Forensic science is application of science to questions of interest to the legal profession • Several unique opportunities give computer forensics the ability to uncover evidence that would be extremely difficult to find using a manual process • Computer forensics also has a unique set of challenges that are not found in standard e...

    pdf27 trang | Chia sẻ: vutrong32 | Ngày: 17/10/2018 | Lượt xem: 1062 | Lượt tải: 0

  • Bài giảng Security+ Guide to Network Security Fundamentals - Chapter 12: Security ManagementBài giảng Security+ Guide to Network Security Fundamentals - Chapter 12: Security Management

    Summary • Identity management provides a framework in which a single authenticated ID is shared across multiple networks or online businesses • Privilege management attempts to simplify assigning and revoking access control to users • Change management refers to a methodology for making and keeping track of changes

    pdf38 trang | Chia sẻ: vutrong32 | Ngày: 17/10/2018 | Lượt xem: 1066 | Lượt tải: 0

  • Bài giảng Security+ Guide to Network Security Fundamentals - Chapter 11: Policies and ProceduresBài giảng Security+ Guide to Network Security Fundamentals - Chapter 11: Policies and Procedures

    Summary • The security policy cycle defines the overall process for developing a security policy • There are four steps in risk identification: – Inventory the assets and their attributes – Determine what threats exist against the assets and by which threat agents – Determine whether vulnerabilities exist that can be exploited by surveying ...

    pdf43 trang | Chia sẻ: vutrong32 | Ngày: 17/10/2018 | Lượt xem: 1229 | Lượt tải: 0

  • Bài giảng Security+ Guide to Network Security Fundamentals - Chapter 10: Operational SecurityBài giảng Security+ Guide to Network Security Fundamentals - Chapter 10: Operational Security

    Summary • Adequate physical security is one of the first lines of defense against attacks • Physical security involves restricting with access controls, minimizing social engineering attacks, and securing the environment and infrastructure • Business continuity is the process of assessing risks and developing a management strategy to ensure th...

    pdf37 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 1044 | Lượt tải: 0

  • Bài giảng Security+ Guide to Network Security Fundamentals - Chapter 9: Using and Managing KeysBài giảng Security+ Guide to Network Security Fundamentals - Chapter 9: Using and Managing Keys

    Summary • One of the advantages of symmetric cryptography is that encryption and decryption using a private key is usually fast and easy to implement • A digital signature solves the problem of authenticating the sender when using asymmetric cryptography • With the number of different tools required for asymmetric cryptography, an organization ...

    pdf34 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 1042 | Lượt tải: 0

  • Bài giảng Security+ Guide to Network Security Fundamentals - Chapter 8: Scrambling Through CryptographyBài giảng Security+ Guide to Network Security Fundamentals - Chapter 8: Scrambling Through Cryptography

    Summary • Cryptography seeks to fulfill five key security functions: confidentiality, authentication, integrity, nonrepudiation, and access control • Hashing, also called a one-way hash, creates a ciphertext from plaintext • Symmetric encryption algorithms use a single key to encrypt and decrypt a message

    pdf46 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 1103 | Lượt tải: 0

  • Bài giảng Security+ Guide to Network Security Fundamentals - Chapter 7: Protecting Advanced CommunicationsBài giảng Security+ Guide to Network Security Fundamentals - Chapter 7: Protecting Advanced Communications

    Summary • The FTP protocol has several security vulnerabilities—it does not natively use encryption and is vulnerable to man-in-the-middle attacks • FTP can be hardened by using secure FTP (which encrypts using SSL) • Protecting remote access transmissions is particularly important in today’s environment as more users turn to the Internet as t...

    pdf54 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 1105 | Lượt tải: 0

  • Bài giảng Security+ Guide to Network Security Fundamentals - Chapter 6: Web SecurityBài giảng Security+ Guide to Network Security Fundamentals - Chapter 6: Web Security

    Summary • Protecting basic communication systems is a key to resisting attacks • E-mail attacks can be malware, spam, or hoaxes • Web vulnerabilities can open systems up to a variety of attacks • A Java applet is a separate program stored on the Web server and downloaded onto the user’s computer along with the HTML code

    pdf48 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 1074 | Lượt tải: 0

  • Bài giảng Security+ Guide to Network Security Fundamentals - Chapter 5: Securing the Network InfrastructureBài giảng Security+ Guide to Network Security Fundamentals - Chapter 5: Securing the Network Infrastructure

    Summary • Cable plant: physical infrastructure (wire, connectors, and cables that carry data communication signals between equipment) • Removable media used to store information include: – Magnetic storage (removable disks, hard drives) – Optical storage (CD and DVD) – Electronic storage (USB memory sticks, FlashCards)

    pdf56 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 1007 | Lượt tải: 0