Lecture 26 - Privacy 2

Lecture 26 - Privacy 2 - Computer Applications for Business...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
CS170 Computer Applications for Business Fall 2008 Instructor: Kristian Stout Lecture 26 Introduction to Privacy 2 Readings: Chapters 12,13
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Exam 2 Stats MIN 14% MAX 100% AVERAG E 68% MEDIAN 69%
Background image of page 2
Topics List: Privacy and Digital Security Spyware Types of attacks Encryption decryption systems Public Key cryptography RSA algorithm Redundancy and recovery Threats to security
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Spyware Software that monitors and records details of computer usage For example: - Keyloggers - Ad Trackers - Packet Sniffers Commercial Spyware removal is available
Background image of page 4
Types of attacks (In communication) Interruption - Eg cutting a cable. Interception - Eg Wiretapping, packet sniffing Modification - Eg file tampering Fabrication - Eg spoofing
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Encryption And Decryption Encryption Terminology - Encryption : Transforming plaintext to cipher text using a key/cipher and an encryption algorithm, so that the information becomes unreadable to unauthorized parties. - Cryptosystem : A combination of encryption and decryption methods - Cleartext or Plaintext : Information before encryption - Cipher text : Information in encrypted form - Decryption : Reversing encryption process. Converting cipher text to plain text. Encryption algorithm and encryption key are different.
Background image of page 6
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Symmetric Cryptography: Caesar Encryption Simple substitution system. Replaces every letter with another letter after
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 20

Lecture 26 - Privacy 2 - Computer Applications for Business...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online