دانلود پاورپوینت Cryptography and Network Security
Third Edition
by William Stallings
Lecture slides
Chapter 1 – Introduction
The art of war teaches us to rely not on the likelihood of the enemy’s not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable.
—The Art of War, Sun Tzu
Background
- Information Security requirements have changed in recent times
- traditionally provided by physical and administrative mechanisms
- computer use requires automated tools to protect files and other stored information
- use of networks and communications links requires measures to protect data during transmission
Traditionally information security provided by physical (eg. rugged filing cabinets with locks) and administrative mechanisms (eg. Personnel screening procedures during hiring process).
Growing computer use implies a need for automated tools for protecting files and other information stored on it.
This is especially the case for a shared system, such as a time-sharing system, and even more so for systems that can be
accessed over a public telephone network, data network, or the Internet.
- Computer Security – generic name for the collection of tools designed to protect data and to thwart hackers
- Network Security – measures to protect data during their transmission
- Internet Security – measures to protect data during their transmission over a collection of interconnected networks
Aim of Course
- our focus is on Internet Security
- consists of measures to deter, prevent, detect, and correct security violations that involve the transmission of information
important: there is transimission. There will be both a sender and a receiver. Keep that in mind. The information is not store in ONE location, but at least two. That makes the problem much harder.
فرمت فایل: Powerpoint (قابل ویرایش) |
تعداد صفحات: — |
حجم: 4 مگابایت |