Show
Almost every organization uses computer networks to share their information and to support their business operations. When we allow network access to data it is exposed to threats from inside and outside of the organization. This course examines the threats associated with using internal and external networks and how to manage the protection of information when it’s accessible via networks. In this course, a learner will be able to: ● Describe the threats to data from information communication technology (ICT) ● Identify the issues and practices associated with managing network security ● Identify the practices, tools, and methodologies associated with assessing network security ● Describe the components of an effective network security program View Syllabus Skills You'll LearnWireless Security, Intrusion Detection System, Firewall (Computing), Computer Network Reviews
ND Oct 13, 2020 the course was awesome , and clear to read and understand , thanks for the team who prepared the course of managing network secuirty PK Oct 21, 2020 The course that I attended is an exelent one. This sessions helped me to learn more about cyber security From the lesson Cybersecurity Technology Administration (Module 3.2) Learning objectives for the module on Cybersecurity Technology Administration Taught By
Presentation on theme: "Cryptography Principles of Information Security, 2nd edition"— Presentation transcript: 1 Cryptography Principles of Information Security, 2nd edition 2 Learning Objectives Upon completion of this material, you should be able to: 3 Introduction Cryptography: process of making
and using codes to secure transmission of information Encryption: converting original message into a form unreadable by unauthorized individuals Cryptography And Encryption-Based Solutions Although not a specific application or security tool, encryption represents a sophisticated approach to security that is implemented in many security systems. In fact, many security-related tools use embedded encryption technologies to protect sensitive
information handled by the application. Encryption is the process of converting an original message into a form that is unreadable by unauthorized individuals, that is anyone without the tools to convert the encrypted message back to its original format. The science of encryption, known as cryptology encompasses cryptography, from the Greek words kryptos, meaning hidden, and graphein, meaning to write, and cryptanalysis, the process of obtaining the original message (or
plaintext) from an encrypted message (or ciphertext), without the knowledge of the algorithms and keys used to perform the encryption. Principles of Information Security, 2nd edition 4
Cipher Methods Plaintext can be encrypted through bit stream or block cipher method Bit stream: each plaintext bit transformed into cipher bit one bit at a time Block cipher: message divided into blocks (e.g., sets of 8- or 16-bit blocks) and each is transformed into encrypted block of cipher bits using algorithm and key Cryptography And Encryption-Based Solutions The notation used to describe the encryption process differs
depending on the source. The first uses the letters M to represent the original message, C to represent the ending ciphertext, and E to represent the encryption process: E(M) = C. This formula represents the application of encryption to a message to create ciphertext. D represents the decryption or deciphering process, thus D[E(M)]=M. K is used to represent the key, thus E(M, K) = C, or encrypting the message with the key results in the ciphertext.
Now look at a simple form of encryption based on two concepts: the block cipher and the exclusive OR operation. With the block cipher method, the message is divided into blocks, i.e., 8 or 16 bit blocks, and then each block is transformed using the algorithm and key. The exclusive or operation (XOR) is a function of Boolean algebra whereby two bits are compared, and if the two bits are identical, the result is a binary 0. If the two bits are NOT the same, the
result is a binary 1. Principles of Information Security, 2nd edition 5 Cipher Methods: Substitution Cipher
6 Cipher Methods: Transposition Cipher 7 Cipher Methods: Transposition Cipher 8 Cipher Methods: Exclusive OR 9 Cipher Methods: Exclusive OR 10 Cipher Methods: Practice in Class 11 Cryptographic Algorithms 12 Cryptographic Algorithms:
Symmetric Encryption 13 Figure 8-3 Symmetric Encryption Example 14 Cryptographic Algorithms: Symmetric Encryption
15 Cryptographic Algorithms: Symmetric Encryption 16 Cryptographic Algorithms: Asymmetric Encryption
17 Figure 8-4 Using Public Keys 18
Cryptographic Algorithms: Asymmetric Encryption
19 Case Study: Onion Routing (1)
20 Case Study: Onion Routing (2) 21 Cryptography Tools Public Key Infrastructure (PKI): integrated system of software, encryption methodologies, protocols, legal agreements, and third-party services enabling users to communicate securely PKI systems based on
public key cryptosystems; include digital certificates and certificate authorities (CAs) Cryptography Tools Public Key Infrastructure (PKI) is an integrated system of software, encryption methodologies, protocols, legal agreements, and third-party services that enables users to communicate securely. PKI systems are based on public key cryptosystems and include digital certificates and certificate authorities (CAs). Principles of Information
Security, 2nd edition 22 Digital Signatures Encrypted messages that can be mathematically proven to be authentic Created in response to rising need to verify
information transferred using electronic systems Asymmetric encryption processes used to create digital signatures Digital Signatures An interesting thing happens when the asymmetric process is reversed, that is the private key is used to encrypt a short message. The public key can be used to decrypt it, and the fact that the message was sent by the organization that owns the private key cannot be refuted. This is known as
non-repudiation, which is the foundation of digital signatures. Digital Signatures are encrypted messages that are independently verified by a central facility (registry) as authentic. Principles of Information Security, 2nd edition 23 Digital Signatures
(continued)
24 Digital Certificates Electronic document containing key value and identifying information about entity that controls key
Digital signature attached to certificate’s container file to certify file is from entity it claims to be from Digital Certificates and Certificate Authorities As alluded to earlier, a digital certificate is an electronic document, similar to a digital signature, attacked to a file certifying that this file is from the organization it claims to be from and has not been modified from the originating format. A Certificate Authority is an agency that
manages the issuance of certificates and serves as the electronic notary public to verify their worth and integrity. Principles of Information Security, 2nd edition 25 Figure 8-5 Digital Signatures
26 Key Distribution Principles of Information Security, 2nd edition 27 Key Distribution (continued)
28 Key Distribution (continued)
29 Protocols for Secure Communications
30 Protocols for Secure Communications (continued) 31 Protocols for Secure Communications (continued)
32 Summary Cryptography and encryption provide sophisticated approach to
security Many security-related tools use embedded encryption technologies Encryption converts a message into a form that is unreadable by the unauthorized Many tools are available and can be classified as symmetric or asymmetric, each having advantages and special capabilities Principles of Information Security, 2nd edition Which cipher simply rearranges the values within a block to create the ciphertext?The transposition cipher, also known as a permutation cipher, simply rearranges the values within a block to create the ciphertext.
Which of the following is used in conjunction with an algorithm to create the ciphertext from the plaintext?Cryptographic key = Information used in conjunction with the algorithm to create the ciphertext from plaintext or derive the plaintext from ciphertext.
What is the process of hiding messages for example Hiding a message within the digital encoding of a picture or graphic so that it is almost impossible to detect?Steganography is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection; the secret data is then extracted at its destination. The use of steganography can be combined with encryption as an extra step for hiding or protecting data.
Is the process of converting an original message into a form that is unreadable to unauthorized individuals?Encryption is the process by which a readable message is converted to an unreadable form to prevent unauthorized parties from reading it. Decryption is the process of converting an encrypted message back to its original (readable) format. The original message is called the plaintext message.
|