Class notes
COMPUTER SECURITY AND CRYPTOGRAPHY
This document includes various ways to mitigate cyberattacks and how to conduct system audits and cryptography
[Show more]
Preview 4 out of 37 pages
Uploaded on
October 4, 2023
Number of pages
37
Written in
2023/2024
Type
Class notes
Professor(s)
Proffessor ron
Contains
All classes
intrusion detection
dns attacks
ciphers
Book Title: Handbook of Applied Cryptography
Author(s): Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
Edition: 2018
ISBN: 9780429881329
Edition: Unknown
Summary
Volledig overzicht 'Cryptography' [Information Security]
All for this textbook (2)
Course
Computer Security and Cryptography
All documents for this subject (1)
$9.99
Also available in package deal from $10.09
Added
Add to cart
Add to wishlist
100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached
Also available in package deal (1)
cryptography and auditing of information systems
1. Class notes - Computer tech notes
2. Class notes - Auditing of information systems
3. Class notes - Computer security and cryptography
Show more
1
JOMO KENYATTA UNIVERSITY OF AGRICULTURE AND TECHNOLOGY
BBIT 4.1
COMPUTER SECURITY AND CRYPTOGRAPHY
ICS 2411
MR. RON MUHANDE
, 2
GROUP D MEMBERS
NAME REGISTRATION NO. CLASS NO.
1. Christine Atieno Omollo HDB212-0206/2020 99
2. Momanyi Prudence Bosibori HDB212-0310 /2020 61
3. Mahalia Gitau HDB212-0283/2020 89
4. Ngigi Caroline Njango HDB212-0254/2020 72
5. Purity Moraa Makori HDB212-0360/2020 98
6. Jeremy Mwangi HDB 212-0757/2020 115
7. Anthony Kabuthu HDB212-0229/2020 137
8. Fredrick Ng'ang'a HDB212-0752/2020 108
9. Simon Mwangi HDB212-0213/2020 80
10. Wilfred Nyakweba HDB212-0326/2020 39
11. Anne Nakhabi Wakhungu HDB212-0288/2020 149
12. Isanya Faith Itsutsa HDB212-0325/2020 60
13. Kabue Rita Nkatha HDB212-0285/2020 88
14. Ndung'u Joseph Kori HDB212-0338/2020 109
15. Emmanuel Muthomi HDB212-0731/2020 38
16. Keziah Gathigia HDB212-0650/2020 160
, 3
TABLE OF CONTENTS
Contents
GROUP D MEMBERS....................................................................................................................2
TABLE OF CONTENTS.................................................................................................................3
FIREWALL AND FIREWALL PROTECTION.............................................................................5
What does a firewall do................................................................................................................5
How does a firewall work............................................................................................................5
Types of firewalls.........................................................................................................................5
Risks of not having a firewall....................................................................................................10
DOMAIN NAME SYSTEM ATTACKS (DNS)..........................................................................11
Types of DNS attacks.................................................................................................................11
How to prevent DNS attacks......................................................................................................14
INTRUSION DETECTION...........................................................................................................18
Definition...................................................................................................................................18
Examples of intrusions in cryptography include:.......................................................................18
Detection Types/ Techniques.....................................................................................................19
Types of IDS’S...........................................................................................................................20
Functions of Intrusion Detection................................................................................................20
Benefits of intrusion detection systems......................................................................................21
False Positives and Negatives....................................................................................................22
Advantages of IDS.....................................................................................................................23
Disadvantages of IDS.................................................................................................................23
, 4
Capabilities of intrusion detection systems................................................................................24
................................................................................................................................................25
Intrusion Prevention System (IPS).............................................................................................25
Techniques to evade IDS systems..............................................................................................25
Challenges associated with intrusion detection systems (IDS)..................................................26
SECURITY ASSURANCE AND AUDITING.............................................................................27
Definition...................................................................................................................................27
Security assurance..................................................................................................................27
Auditing..................................................................................................................................27
Objectives of Conducting a System Audit:................................................................................28
Security Assurance Program.....................................................................................................28
SYMMETRIC VS ASYMMETRIC CIPHERS............................................................................31
Definition of terms.....................................................................................................................31
Symmetric ciphers......................................................................................................................31
Asymmetric ciphers....................................................................................................................32
Differences between Symmetric and Asymmetric Ciphers.......................................................32
CLASSICAL AND INTRUSION TECHNIQUES.......................................................................34
Definition...................................................................................................................................34
Common Classical Techniques:.................................................................................................34
Common Intrusion Techniques:.................................................................................................35
How to Defend Against These Attacks:.....................................................................................36
REFERENCES..............................................................................................................................37