Security
Security
Security
Confidentiality
Integrity
Availability
Types of Threats in Network
Interruption
An asset of the system is destroyed
or becomes unavailable
Attack on availability
Destruction of hardware
Cutting of a communication line
Types of Threats in Network
Interception
An unauthorized party gains access
to an asset
Attack on confidentiality
Illegal copying of files or programs
Types of Threats in Network
Modification
An unauthorized party not only
gains access but tampers with an
asset
Attack on integrity
Changing values in a data file
Altering a program so that it
performs differently
Types of Threats in Network
Fabrication
An unauthorized party inserts
counterfeit objects into the system
Attack on authenticity
Insertion of spurious messages in a
network
Need for Security
Some people who cause security
problems and why.
Cryptography
Introduction to Cryptography
Substitution Ciphers
Transposition Ciphers
One-Time Pads
Important Definition
Plain Text - Message
Caesar cipher
Earliest, Simplest
Used by Julius Caesar
Stream ciphers
C = P + K mod 26
P = C - K mod 26
Transposition Ciphers
A transposition cipher.
One-Time Pads
Plaintext: M<n
Ciphertext: C = Me (mod n)
The RSA Algorithm - Decryption
Ciphertext: C
Plaintext: M = Cd (mod n)