College aantekeningen
COMPUTER SECURITY AND CRYPTOGRAPHY
6 keer bekeken
0 keer verkocht
This document includes various ways to mitigate cyberattacks and how to conduct system audits and cryptography
[Meer zien]
Voorbeeld 4 van de 37 pagina's
Geupload op
4 oktober 2023
Aantal pagina's
37
Geschreven in
2023/2024
Type
College aantekeningen
Docent(en)
Proffessor ron
Bevat
Alle colleges
intrusion detection
dns attacks
ciphers
Titel boek: Handbook of Applied Cryptography
Auteur(s): Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
Uitgave: 2018
ISBN: 9780429881329
Druk: Onbekend
Samenvatting
Volledig overzicht 'Cryptography' [Information Security]
Alles voor dit studieboek
(2)
Vak
Computer Security and Cryptography
Alle documenten voor dit vak (1)
€9,77
Ook beschikbaar in voordeelbundel v.a. €9,87
Toegevoegd
In winkelwagen
Op verlanglijstje
100% tevredenheidsgarantie
Direct beschikbaar na betaling
Zowel online als in PDF
Je zit nergens aan vast
Ook beschikbaar in voordeelbundel (1)
cryptography and auditing of information systems
1. College aantekeningen - Computer tech notes
2. College aantekeningen - Auditing of information systems
3. College aantekeningen - Computer security and cryptography
Meer zien
1
JOMO KENYATTA UNIVERSITY OF AGRICULTURE AND TECHNOLOGY
BBIT 4.1
COMPUTER SECURITY AND CRYPTOGRAPHY
ICS 2411
MR. RON MUHANDE
, 2
GROUP D MEMBERS
NAME REGISTRATION NO. CLASS NO.
1. Christine Atieno Omollo HDB212-0206/2020 99
2. Momanyi Prudence Bosibori HDB212-0310 /2020 61
3. Mahalia Gitau HDB212-0283/2020 89
4. Ngigi Caroline Njango HDB212-0254/2020 72
5. Purity Moraa Makori HDB212-0360/2020 98
6. Jeremy Mwangi HDB 212-0757/2020 115
7. Anthony Kabuthu HDB212-0229/2020 137
8. Fredrick Ng'ang'a HDB212-0752/2020 108
9. Simon Mwangi HDB212-0213/2020 80
10. Wilfred Nyakweba HDB212-0326/2020 39
11. Anne Nakhabi Wakhungu HDB212-0288/2020 149
12. Isanya Faith Itsutsa HDB212-0325/2020 60
13. Kabue Rita Nkatha HDB212-0285/2020 88
14. Ndung'u Joseph Kori HDB212-0338/2020 109
15. Emmanuel Muthomi HDB212-0731/2020 38
16. Keziah Gathigia HDB212-0650/2020 160
, 3
TABLE OF CONTENTS
Contents
GROUP D MEMBERS....................................................................................................................2
TABLE OF CONTENTS.................................................................................................................3
FIREWALL AND FIREWALL PROTECTION.............................................................................5
What does a firewall do................................................................................................................5
How does a firewall work............................................................................................................5
Types of firewalls.........................................................................................................................5
Risks of not having a firewall....................................................................................................10
DOMAIN NAME SYSTEM ATTACKS (DNS)..........................................................................11
Types of DNS attacks.................................................................................................................11
How to prevent DNS attacks......................................................................................................14
INTRUSION DETECTION...........................................................................................................18
Definition...................................................................................................................................18
Examples of intrusions in cryptography include:.......................................................................18
Detection Types/ Techniques.....................................................................................................19
Types of IDS’S...........................................................................................................................20
Functions of Intrusion Detection................................................................................................20
Benefits of intrusion detection systems......................................................................................21
False Positives and Negatives....................................................................................................22
Advantages of IDS.....................................................................................................................23
Disadvantages of IDS.................................................................................................................23
, 4
Capabilities of intrusion detection systems................................................................................24
................................................................................................................................................25
Intrusion Prevention System (IPS).............................................................................................25
Techniques to evade IDS systems..............................................................................................25
Challenges associated with intrusion detection systems (IDS)..................................................26
SECURITY ASSURANCE AND AUDITING.............................................................................27
Definition...................................................................................................................................27
Security assurance..................................................................................................................27
Auditing..................................................................................................................................27
Objectives of Conducting a System Audit:................................................................................28
Security Assurance Program.....................................................................................................28
SYMMETRIC VS ASYMMETRIC CIPHERS............................................................................31
Definition of terms.....................................................................................................................31
Symmetric ciphers......................................................................................................................31
Asymmetric ciphers....................................................................................................................32
Differences between Symmetric and Asymmetric Ciphers.......................................................32
CLASSICAL AND INTRUSION TECHNIQUES.......................................................................34
Definition...................................................................................................................................34
Common Classical Techniques:.................................................................................................34
Common Intrusion Techniques:.................................................................................................35
How to Defend Against These Attacks:.....................................................................................36
REFERENCES..............................................................................................................................37