9781111640125_IM_ch11

Security+ Guide to Network Security Fundamentals

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Security+ Guide to Network Security Fundamentals, Fourth Edition 11-1 Chapter 11 Basic Cryptography At a Glance Instructor’s Manual Table of Contents Overview Objectives Teaching Tips Quick Quizzes Class Discussion Topics Additional Projects Additional Resources Key Terms
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Fourth Edition 11-2 Lecture Notes Overview Cryptography is the technology that we most closely associate with the concept of confidentiality. Cryptography is the art of hiding information for the purpose of protecting that information from discovery from unauthorized users. The chapter covers various schemes and methods of encryption as well as ways of exchanging keys. Chapter Objectives Define cryptography Describe hash, symmetric, and asymmetric cryptographic algorithms List the various ways in which cryptography is used Teaching Tips Defining Cryptography 1. Mention defining cryptography involves understanding what it is and what it can do. It also involves understanding how cryptography can be used as a security tool to protect data. What Is Cryptography? 1. Define cryptography as the science of transforming information into an unintelligible form while it is being transmitted or stored so that unauthorized users cannot access it. 2. Explain that steganography hides the existence of the data. What appears to be a harmless image can contain hidden data embedded within the image. Steganography can use image files, audio files, or even video files to contain hidden information. Use Figure 11-1 to illustrate your explanation. 3. Mention that one of the most famous ancient cryptographers was Julius Caesar. Caesar shifted each letter of his messages to his generals three places down in the alphabet. 4. Use Figure 11-2 to describe the cryptography process. Cryptography and Security 1. Explain that cryptography can provide basic security protection for information: a. Cryptography can protect the confidentiality of information. b. Cryptography can protect the integrity of the information. c. Cryptography can help ensure the availability of the data. d. Cryptography can verify the authenticity of the sender.
Background image of page 2
Security+ Guide to Network Security Fundamentals, Fourth Edition 11-3 e. Cryptography can enforce non-repudiation. 2. Use Table 11-1 to describe the information protections provided by cryptography. Cryptographic Algorithms 1. This section describes the following three categories of cryptographic algorithms: a. Hashing algorithms b. Symmetric encryption algorithms c. Asymmetric encryption algorithms Hashing Algorithms 1. Define hashing, also called a one-way hash, as a process for creating a unique digital fingerprint for a set of data. This fingerprint, called a hash, represents the contents.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This document was uploaded on 03/01/2012.

Page1 / 12

9781111640125_IM_ch11 - Security+ Guide to Network Security...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online