100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
COMPUTER SECURITY AND CRYPTOGRAPHY $9.99   Add to cart

Class notes

COMPUTER SECURITY AND CRYPTOGRAPHY

 6 views  0 purchase
  • Course
  • Institution
  • Book

This document includes various ways to mitigate cyberattacks and how to conduct system audits and cryptography

Preview 4 out of 37  pages

  • October 4, 2023
  • 37
  • 2023/2024
  • Class notes
  • Proffessor ron
  • All classes
avatar-seller
1




JOMO KENYATTA UNIVERSITY OF AGRICULTURE AND TECHNOLOGY

BBIT 4.1

COMPUTER SECURITY AND CRYPTOGRAPHY


ICS 2411


MR. RON MUHANDE

, 2




GROUP D MEMBERS



NAME REGISTRATION NO. CLASS NO.


1. Christine Atieno Omollo HDB212-0206/2020 99

2. Momanyi Prudence Bosibori HDB212-0310 /2020 61

3. Mahalia Gitau HDB212-0283/2020 89

4. Ngigi Caroline Njango HDB212-0254/2020 72

5. Purity Moraa Makori HDB212-0360/2020 98

6. Jeremy Mwangi HDB 212-0757/2020 115

7. Anthony Kabuthu HDB212-0229/2020 137

8. Fredrick Ng'ang'a HDB212-0752/2020 108

9. Simon Mwangi HDB212-0213/2020 80

10. Wilfred Nyakweba HDB212-0326/2020 39

11. Anne Nakhabi Wakhungu HDB212-0288/2020 149

12. Isanya Faith Itsutsa HDB212-0325/2020 60

13. Kabue Rita Nkatha HDB212-0285/2020 88

14. Ndung'u Joseph Kori HDB212-0338/2020 109

15. Emmanuel Muthomi HDB212-0731/2020 38

16. Keziah Gathigia HDB212-0650/2020 160

, 3


TABLE OF CONTENTS

Contents
GROUP D MEMBERS....................................................................................................................2

TABLE OF CONTENTS.................................................................................................................3

FIREWALL AND FIREWALL PROTECTION.............................................................................5

What does a firewall do................................................................................................................5

How does a firewall work............................................................................................................5

Types of firewalls.........................................................................................................................5

Risks of not having a firewall....................................................................................................10

DOMAIN NAME SYSTEM ATTACKS (DNS)..........................................................................11

Types of DNS attacks.................................................................................................................11

How to prevent DNS attacks......................................................................................................14

INTRUSION DETECTION...........................................................................................................18

Definition...................................................................................................................................18

Examples of intrusions in cryptography include:.......................................................................18

Detection Types/ Techniques.....................................................................................................19

Types of IDS’S...........................................................................................................................20

Functions of Intrusion Detection................................................................................................20

Benefits of intrusion detection systems......................................................................................21

False Positives and Negatives....................................................................................................22

Advantages of IDS.....................................................................................................................23

Disadvantages of IDS.................................................................................................................23

, 4


Capabilities of intrusion detection systems................................................................................24

................................................................................................................................................25

Intrusion Prevention System (IPS).............................................................................................25

Techniques to evade IDS systems..............................................................................................25

Challenges associated with intrusion detection systems (IDS)..................................................26

SECURITY ASSURANCE AND AUDITING.............................................................................27

Definition...................................................................................................................................27

Security assurance..................................................................................................................27

Auditing..................................................................................................................................27

Objectives of Conducting a System Audit:................................................................................28

Security Assurance Program.....................................................................................................28

SYMMETRIC VS ASYMMETRIC CIPHERS............................................................................31

Definition of terms.....................................................................................................................31

Symmetric ciphers......................................................................................................................31

Asymmetric ciphers....................................................................................................................32

Differences between Symmetric and Asymmetric Ciphers.......................................................32

CLASSICAL AND INTRUSION TECHNIQUES.......................................................................34

Definition...................................................................................................................................34

Common Classical Techniques:.................................................................................................34

Common Intrusion Techniques:.................................................................................................35

How to Defend Against These Attacks:.....................................................................................36

REFERENCES..............................................................................................................................37

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller yobrawhite. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $9.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

61001 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$9.99
  • (0)
  Add to cart