Tìm kiếm tài liệu miễn phí

An ninh - Bảo mật (5.214)

Bài giảng Tội phạm máy tính

"Bài giảng Tội phạm máy tính" có nội dung trình bày về khái niệm về tội phạm trong lĩnh vực CNTT, thực trạng tội phạm trong lĩnh vực CNTT, cơ sở pháp lý về tội phạm trong lĩnh vực CNTT, các hình thức phạm tội trong lĩnh vực CNTT, những vấn đề đặt ra của tội phạm trong lĩnh vực CNTT.


Lecture Data security and encryption - Lecture 6: Block ciphers and the data encryption standard

The objective of this chapter is to illustrate the principles of modern symmetric ciphers. For this purpose, we focus on the most widely used symmetric cipher: the Data Encryption Standard (DES). Although numerous symmetric ciphers have been developed since the introduction of DES, and although it is destined to be replaced by the Advanced Encryption Standard (AES), DES remains the most important such algorithm.


Lecture Data security and encryption - Lecture 5: Data security and encryption

This chapter presents the following content: Classical cipher techniques and terminology, monoalphabetic substitution ciphers, cryptanalysis using letter frequencies, playfair cipher, polyalphabetic ciphers, transposition ciphers, product ciphers and rotor machines, stenography.


Lecture Data security and encryption - Lecture 13: Block Cipher Operation

The contents of this chapter include all of the following: multiple encryption & DES, why not double-DES? triple-DES with two-keys, modes of operation, electronic codebook book (ECB), advantages and limitations of ECB, cipher block chaining (CBC).


Lecture Data security and encryption - Lecture 32: Review 16-30

The contents of this chapter include all of the following: RSA, RSA En/decryption, Diffie-Hellman key exchange, man-in-the-middle attack, ElGamal cryptography, ElGamal message exchange, hash function, secure hash algorithm, SHA-3 requirements,...


Lecture Data security and encryption - Lecture 8: Data encryption standard (DES)

This chapter presents the following content: Data encryption standard (DES) strengths of DES, differential & linear cryptanalysis, block cipher design principles, differential & linear cryptanalysis, block cipher design principles.


Lecture Data security and encryption - Lecture 22: User Authentication

The contents of this chapter include all of the following: Remote user authentication issues, authentication using symmetric encryption, the Kerberos trusted key server system, authentication using asymmetric encryption, federated identity management.


Lecture Data security and encryption - Lecture 31: Review 1-15

The contents of this chapter include all of the following: Symmetric ciphers, asymmetric ciphers, cryptographic data integrity algorithms, mutual trust, network security and internet security, system security, legal and ethical issues.


Lecture Data security and encryption - Lecture 19: Message Authentication

The contents of this chapter include all of the following: Message authentication requirements, message authentication using encryption, MACs, HMAC authentication using a hash function, CMAC authentication using a block cipher, pseudorandom number generation (PRNG) using Hash Functions and MACs.


Lecture Data security and encryption - Lecture 10: AES

This chapter presents the following content: The AES selection process; The details of Rijndael – the AES cipher; looked at the steps in each round; out of four AES stages, two are discussed; substitute bytes; shift rows.


Lecture Data security and encryption - Lecture 17: Other Public Key Cryptosystems

The contents of this chapter include all of the following: Diffie-Hellman key exchange, ElGamal cryptography, Elliptic curve cryptography, Pseudorandom Number Generation (PRNG) based on Asymmetric Ciphers.


Lecture Data security and encryption - Lecture 28: Firewalls

The contents of this chapter include all of the following: Firewalls; types of firewalls; packet-filter, stateful inspection, application proxy, circuit-level; Basing; bastion, host, personal; location and configurations; DMZ, VPN, distributed, topologies.


Lecture Data security and encryption - Lecture 11: Number Theory and Finite Fields

This chapter presents the following content: Number theory, divisibility & GCD, modular arithmetic with integers, Euclid’s algorithm for GCD & inverse, the AES selection process, the details of Rijndael – the AES cipher, looked at the steps in each round out of four AES stages, last two are discussed: MixColumns, AddRoundKey.


Lecture Data security and encryption - Lecture 29: Cybercrime and Computer Crime

This chapter review a range of topics: Cybercrime and computer crime, intellectual property issues, cybercrime/computer crime, law enforcement challenges, intellectual property, copyright, copyright rights, patents, trademarks, intellectual property issues and computer security,...


Lecture Data security and encryption - Lecture 26: Intruders

The contents of this chapter include all of the following: IPSec security framework, IPSec security policy, ESP, combining security associations, internet key exchange, cryptographic suites used, problem of intrusion, behavior and techniques, intrusion detection (statistical & rule-based), password management.


Lecture Data security and encryption - Lecture 24: Electronic Mail Security

The contents of this chapter include all of the following: secure email, PGP, S/MIME, domain-keys identified email, electronic mail security, email security, email security enhancements, pretty good privacy (PGP), PGP operation – authentication, PGP operation – confidentiality & authentication,...


Lecture Data security and encryption - Lecture 20: Digital Signatures

The contents of this chapter include all of the following: Digital signatures, ElGamal & Schnorr signature schemes, digital signature algorithm and standard, digital signature model, attacks and forgeries, digital signature requirements, direct digital signatures, ElGamal digital signature.


Lecture Data security and encryption - Lecture 1: Introduction to Data Security and Encryption

This chapter presents the following content: Outline of the course is discussed; topic roadmap & standards organizations; security concepts; X.800 security architecture; security attacks, services, mechanisms; models for network (access) security.


Lecture Data security and encryption - Lecture 2: Introduction to Encryption

This chapter presents the following content: Security concepts: confidentiality, integrity, availability; security attacks, services, mechanisms; models for network (access) security; classical encryption techniques; symmetric cipher model.


Lecture Data security and encryption - Lecture 21: Key Management and Distribution

The contents of this chapter include all of the following: symmetric key distribution using symmetric encryption, symmetric key distribution using public-key encryption, distribution of public keys, digital signatures, ElGamal & Schnorr signature schemes, digital signature algorithm and standard, X.509 authentication and certificates.


Lecture Data security and encryption - Lecture 23: Wireless Network Security

The contents of this chapter include all of the following: IEEE 802.11 Wireless LANs, protocol overview and security, Wireless Application Protocol (WAP), protocol overview, Wireless Transport Layer Security (WTLS).


Lecture Data security and encryption - Lecture 27: Malicious Software

The contents of this chapter include all of the following: problem of intrusion, behavior and techniques; intrusion detection (statistical & rule-based); password management; various malicious programs; trapdoor, logic bomb, trojan horse, zombie; viruses; worms; distributed denial of service attacks.


Lecture Data security and encryption - Lecture 14: Stream Ciphers and Random Number Generation

The comparatively late rise of the theory of probability shows how hard it is to grasp, and the many paradoxes show clearly that we, as humans, lack a well grounded intuition in this matter. In probability theory there is a great deal of art in setting up the model, in solving the problem, and in applying the results back to the real world actions that will follow.


Lecture Data security and encryption - Lecture 15: Public Key Cryptography

The development of public-key cryptography is the greatest and perhaps the only true revolution in the entire history of cryptography. From its earliest beginnings to modern times, virtually all cryptographic systems have been based on the elementary tools of substitution and permutation, and can be classed as private/secret/single key (symmetric) systems. All classical, and modern block and stream ciphers are of this form.


Lecture Data security and encryption - Lecture 7: Data encryption standard (DES)

This chapter presents the following content: Data encryption standard (DES), DES history, DES design controversy, DES encryption overview, initial permutation IP, DES round structure, substitution boxes S, DES key schedule, DES decryption, avalanche in DES, avalanche effect, strength of DES – Timing attacks.


Lecture Data security and encryption - Lecture 4: Classical Encryption Techniques

This chapter presents the following content: Classical cipher techniques and terminology, brute force, cryptanalysis of brute force, caesar cipher, cryptanalysis of caesar cipher, monoalphabetic substitution ciphers, playfair cipher, polyalphabetic ciphers, vigenère cipher.


Lecture Data security and encryption - Lecture 3: Classical Encryption Techniques

This chapter presents the following content: Models for network (access) security, classical encryption techniques, symmetric cipher model, have considered, classical cipher techniques and terminology, brute force, cryptanalysis of brute force, caesar cipher, cryptanalysis of caesar cipher.


Lecture Data security and encryption - Lecture 30: Privacy and Ethical Aspects

The contents of this chapter include all of the following: Cybercrime and computer crime, EU privacy law, US privacy law, intellectual property issues, cybercrime and computer crime, intellectual property issues, privacy, ethical issues.


Lecture Data security and encryption - Lecture 25: IP security

The contents of this chapter include all of the following: IPSec security framework, IPSec security policy, ESP, combining security associations, internet key exchange, cryptographic suites used, secure email, PGP, S/MIME, domain-keys identified email.


Lecture Data security and encryption - Lecture 16: RSA

The contents of this chapter include all of the following: principles of public-key cryptography, RSA en/decryption, RSA key setup, why RSA works, exponentiation, efficient encryption, efficient decryption, RSA key generation, RSA security, factoring problem, progress in factoring.


Tài liệu mới download

Tiêu chuẩn ngành 22 TCN 272:2005
  • 21/08/2016
  • 32.046
  • 818

Từ khóa được quan tâm

Có thể bạn quan tâm

CEH Lab book tiếng Việt phần 1
  • 01/08/2010
  • 13.935
  • 109
Security-Testing Tools
  • 23/07/2010
  • 11.421
  • 832
Bài giảng Công nghệ FTTH mới
  • 31/01/2018
  • 42.627
  • 405

Bộ sưu tập

Danh mục tài liệu