Chapter11 - Security Guide to Network Security Fundamentals...

Info iconThis preview shows pages 1–13. Sign up to view the full content.

View Full Document Right Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2
Background image of page 2
Security+ Guide to Network Security Fundamentals, Third Edition Objectives (continued) Describe how asymmetric cryptography works List types of file and file system cryptography Explain how whole disk encryption works 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition Defining Cryptography Defining cryptography involves understanding what it is and what it can do It also involves understanding how cryptography can be used as a security tool to protect data 4
Background image of page 4
Security+ Guide to Network Security Fundamentals, Third Edition What Is Cryptography? Cryptography The science of transforming information into an unintelligible form while it is being transmitted or stored so that unauthorized users cannot access it Steganography Hides the existence of the data What appears to be a harmless image can contain hidden data embedded within the image Can use image files, audio files, or even video files to contain hidden information 5
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition 6 What Is Cryptography? (continued)
Background image of page 6
Security+ Guide to Network Security Fundamentals, Third Edition What Is Cryptography? (continued) One of the most famous ancient cryptographers was Julius Caesar Caesar shifted each letter of his messages to his generals three places down in the alphabet Encryption Changing the original text to a secret message using cryptography Decryption Change the secret message back to its original form 7
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition 8
Background image of page 8
Security+ Guide to Network Security Fundamentals, Third Edition Cryptography and Security Cryptography can provide basic security protection for information: Cryptography can protect the confidentiality of information Cryptography can protect the integrity of the information Cryptography can help ensure the availability of the data Cryptography can verify the authenticity of the sender Cryptography can enforce non-repudiation 9
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition Cryptography and Security (continued) 10
Background image of page 10
Security+ Guide to Network Security Fundamentals, Third Edition Cryptographic Algorithms There are three categories of cryptographic algorithms: Hashing algorithms Symmetric encryption algorithms Asymmetric encryption algorithms 11
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition Hashing Algorithms Hashing Also called a one-way hash A process for creating a unique “signature” for a set of data This signature, called a hash or digest , represents the contents Hashing is used only for integrity to ensure that: Information is in its original form
Background image of page 12
Image of page 13
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 06/13/2010 for the course CITX CITX 1150 taught by Professor P.whalen during the Fall '09 term at British Columbia Institute of Technology.

Page1 / 52

Chapter11 - Security Guide to Network Security Fundamentals...

This preview shows document pages 1 - 13. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online