Professional Documents
Culture Documents
Security
Week 13
Goals
• After studying this chapter, you should be able to:
• Explain the three concerstones of information security
• Describe the three types of authentication credentials
• Create secure passwords and assess the security levels of others.
• Define the categories of malware.
• List the types of security attacks
• Define cryptography
• Encode and decode messages using various ciphers.
• Discuss the challenges of keeping online data secure
• Discuss the security issues related to social media and mobile
devices
• Integrity
• Ensuring that data can be modified only by appropriate
mechanism
• Exp: You don’t like hacker modify your bank balance.
• User Authentication
• It is the process of verifying the credentials of a particular
user of a computer or software system.
• Smart Card
• It is based on something that the user has, such as
identification card with a magnetic strip / embedded
memory chip.
• This requires special hardware. (more secure than
username password)
• Worm
• It is a malicious standalone program that often targets
network resources.
• Cause problems on networks it uses to send copies of itself to
other system.
21 03/04/2024 Add a footer
Malicious Code
• Trojan Horse
• It is a standalone program and cause problems on computer
on which it is executing.
• It is a program that appears to be helpful in some way, but
actually causes some kind of problem when executed.
• Logic Bomb
• It is a program that executes when a specific system
oriented event occurs.
• Encryption
• It is the process of converting ordinary text, referred to as
“plaintext” in cryptography terminology, into a form that is
unreadable called “ciphertext”.
• Cipher
• It is an algorithm used to encrypt and decrypt text.
• Caesar Cipher
• It is a substitution cipher that shifts characters a certain
number of positions in the alphabet.
ARNBOTEEEMTAHLDETM