Chapter 8

Chapter 8 - 1 Learning Objectives: Upon completion of this...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
1
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Learning Objectives: Upon completion of this chapter you should be able to: •Define and identify the various types of firewalls. •Discuss the approaches to firewall implementation. •Discuss the approaches to dial-up access and protection. •Identify and describe the two categories of intrusion detection systems. •Discuss the two strategies behind intrusion detection systems. •Discuss the process of encryption and define key terms. •Identify and discuss common approaches to cryptography. •Compare and contrast symmetric and asymmetric encryption. •Discuss various approaches to biometric access control. 2
Background image of page 2
Cryptography And Encryption-Based Solutions Although not a specific application or security tool, encryption represents a sophisticated approach to security that is implemented in many security systems. In fact, many security-related tools use embedded encryption technologies to protect sensitive information handled by the application. Encryption is the process of converting an original message into a form that is unreadable by unauthorized individuals that is anyone without the tools to convert unreadable by unauthorized individuals, that is anyone without the tools to convert the encrypted message back to its original format. The science of encryption, known as cryptology encompasses cryptography, from the Greek words kryptos, meaning hidden, and graphein, meaning to write, and cryptanalysis, the process of obtaining the original message (or plaintext) from an encrypted message (or ciphertext), without the knowledge of the algorithms and keys used to perform the encryption. 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Encryption Definitions Algorithm: the mathematical formula used to convert an unencrypted message into an encrypted message. Cipher: the transformation of the individual components (characters, bytes or bits) of an unencrypted message into encrypted components. Ciphertext or cryptogram: the unintelligible encrypted or encoded message resulting from an encryption. Code: the transformation of the larger components (words or phrases) of an unencrypted message into encrypted components. Cryptosystem: the set of transformations necessary to convert an unencrypted message into an encrypted message. Decipher: to decrypt or convert ciphertext to plaintext. Encipher: to encrypt or convert plaintext to ciphertext. Key or cryptovariable: the information used in conjunction with the algorithm to create ciphertext from plaintext. Keyspace: the entire range of values that can possibly be used to construct an individual key. Link encryption: a series of encryptions and decryptions between a number of systems, whereby each node decrypts the message sent to it and then re-encrypts it using different keys and sends it to the next neighbor, until it reaches the final destination. Plaintext: the original unencrypted message that is encrypted and results from successful decryption.
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 01/13/2012 for the course IS 3020 taught by Professor Staff during the Spring '08 term at Kennesaw.

Page1 / 44

Chapter 8 - 1 Learning Objectives: Upon completion of this...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online