Free Essay

Nt2580 Class Notes

In:

Submitted By bgragasin
Words 365
Pages 2
10/29/13

Data encryption is the only thing that will secure data transmission.

Powerpoint:

Confidentiality: Keeps information secret from all but authorized people
Integrity: Can enforce integrity with hashes
Authentication: Provides a way to authenticate entities
Non-repudiation: Prevents a party from denying a previous statement or action

Cryptology in Business
• Increasing concern about the security of data.
• More sophisticated attacks
• Tremendous growth of computer-related fraud and data theft
• Data protection as a business priority
Intrabusiness Security: Privacy, integrity, authorization, and access control.
Interbusienss Security: Message authentication, signature, receipt and conformation, and non-repudiation
Extrabusiness Security: Anonymity, time stamping, revocation, and ownership

Applications and Uses
• Cryptography uses can be found in categories, such as: o Anti-malware o Compliance or auditing o Forensics o Transaction security o Wireless security

Symmetric Key Crypto Standards
Triple DES (Data Encryption Standard): Consists of three passes of DES using multiple keys
IDEA (International Data Encryption Algorithm): Uses a 128-but key and runs faster than DES
Blowfish: Faster than DES or IDEA
AES (Advanced Encryption Standard): Strong and fast. Defacto standard today.
RC2: Designed by Ronald Rivest
RC4: Used in Internet browsers

Symmetric Key Principles
• The same key encrypts and decrypts
• Symmetric Algorithms can be fast and are well suited to encrypting lots of data
• They are often used once and then discarded

Asymmetric Key Principle
Any data encrypted by a Public Key can be decrypted only by the corresponding Private Key.

Asymmetric Key Crypto Standards
Standard Description
Rivest, Shamir, and Adleman
(RSA) encryption algorithm Considered by many as the standard for encryption.
Diffie-Hellman Key Exchange An early key exchange design
El Gamal encryption algorithm An extension of Diffie-Hellman

Elliptic Curve Cryptography (ECC) Used for compact design

Public Key Infrastructure (PKI) Terms
• Authentication
• Access Control
• Non-repudiation
PKI Components
• Certification authority (CA)
• Registration authority (RA)
• Certificates and policies

Secure Sockets Layer (SSL)
• Ad-hoc secure communications are basis of Internet e-commerce.
• One of the most frequently used forms of cryptography today.
• With an asymmetric key, ad-hoc communications are straight forward.
• SSL is one of the most commonly used cryptographic protocols for managing secure communication between a client and server over the Web.

Similar Documents

Premium Essay

Nt2580 Unit 1

...NT2580-M1 Introduction to Information Security Unit 1: Information Systems Security Fundamentals 2015-Summer, 6/20/2015, Saturday (9:00am – 1:30pm) Student Name ___________________________________ Lesson Plan Theory (in class, Lab #2)……………………………..…………………..……...2 Reading  Kim and Solomon, Chapter 1: Information Systems Security. Objectives……………..………………….……………………………….2 Student Assignments for this Unit Unit 1 Lab Perform Reconnaissance & Probing Using ZenMap GUI (Nmap) Lab #1: Performing Network Reconnaissance using Common Tools Overview and access vLab..............................................................................................3 Part 1: Exploring the Tools used in the Virtual Lab Environment……………16 Unit 1 Assignment Match Risks/Threats to Solutions Part 2: Connecting to a Linux Machine …………………. .........................44 Unit 1 Assignment Impact of a Data Classification Standard Part 3: Using Zenmap to Perform Basic Reconnaissance ……………………59 Appendix A. SYLLABUS………………………………………………..……..………….69 B. Forgot your password?………………………………………………..……..73 Instructor: Yingsang “Louis” HO Tel: 425-241-8080 (cell), (206) 244-3300 (school) Email: yho@itt-tech.edu NT2580_2015_Summer_M1_UNIT1.doc Page 1 of 76 Unit 1: Information Systems Security Fundamentals Learning Objective  Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. Key Concepts  Confidentiality, integrity, and availability...

Words: 3379 - Pages: 14

Premium Essay

Nothing

...week Students are required to complete each assignment and lab in this course package on time whether or not they are in class. Late penalties will be assessed for any assignments or labs handed in past the due date. The student is responsible for replacement of the package if lost. Table of Contents Syllabus 2 Student Professional Experience 19 Graded Assignments and Exercises 23 Labs 47 Documenting your Student Professional Experience 57 ITT Technical Institute NT1310 Physical Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course examines industry standards and practices involving the physical components of networking technologies (such as wiring standards and practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installation, testing and troubleshooting techniques for a computer network. Where Does This Course Belong? | | | NT2799 | | | | | | | | NSA Capstone | | | | | | | Project | | | | | NT2580 | | | NT2670 | NT2640 | | PT2520 | | Introduction to | | | | | | | | | | | Email and Web | | | | | ...

Words: 10839 - Pages: 44