Seminar1_2010 - ncryption Techniques Encryption Techniques...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ncryption Techniques Encryption Techniques nd System Security and System Security Introduction to System Security 1 Recommended Reading Recommended Reading • Stallings, William. etwork Security Network Security Essentials – Applications and Standards, Prentice Hall, Third Edition, 007 2007 2 Other Recommended Readings Other Recommended Readings • Pfleeger, C. Security in Computing. Fourth edition, Prentice Hall, 2007. • Mel, H.X. Baker, D. Cryptography Decrypted. Addison Wesley, 2001. 3 Outline Outline • Attacks, services and mechanisms • Security attacks ecurity services • Security services • Methods of Defense • A model for Internetwork Security 4 ttacks Services and ttacks Services and Attacks, Services and Attacks, Services and Mechanisms Mechanisms • Security Attack: Any action that compromises the security of information. • Security Mechanism: A mechanism that is designed to detect, prevent, or recover from a security attack....
View Full Document

This note was uploaded on 09/06/2010 for the course IT ICt211 taught by Professor Tan during the Spring '10 term at Singapore Institute of Management.

Page1 / 16

Seminar1_2010 - ncryption Techniques Encryption Techniques...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online