SlideShare uma empresa Scribd logo
1 de 40
Baixar para ler offline
Overview
Overview
Overview
Cryptography
Computer Security
OSI Security Architecture
Security Structure Scheme
Key Properties
Symmetric Encryption
Asymmetric Encryption
Book
Overview
Cryptography
Computer Security
OSI Security Architecture
Security Structure Scheme
Key Properties
Symmetric Encryption
Asymmetric Encryption
Book
Overview
 Cryptography: is the science of
secret writing and is an ancient
art; the first documented use of
cryptography in writing dates
back to 1900 B.C. when an
Egyptian scribe used non-
standard hieroglyphs in an
inscription (handwriting).
Overview
Cryptography
Computer Security
OSI Security Architecture
Security Structure Scheme
Key Properties
Symmetric Encryption
Asymmetric Encryption
Book
Overview
Computer Security - generic name for the collection of
tools designed to protect data
Network Security - measures to protect data during their
transmission
Internet Security - measures to protect data during their
transmission over a collection of interconnected networks
Overview
The protection afforded to an automated information
system in order to attain the applicable objectives of
preserving the integrity, availability, and
confidentiality of information system resources
(includes hardware, software, firmware,
information/data, and telecommunications)
Overview
CIA triad
Confidentiality
Integrity
Availability
Overview
Ensuring that no one can read the message except the
intended receiver.
Preserving authorized restrictions on information access
and disclosure (detection), including means for protecting
personal privacy and proprietary information. A loss of
confidentiality is the unauthorized disclosure of
information.
Overview
I O D Q N H D V W
D W W D F N D W G D Z Q
Overview
Assuring the receiver that the received message has not
been altered in any way from the original.
Guarding against improper information modification or
destruction, including ensuring information nonrepudiation
and authenticity. A loss of integrity is the unauthorized
modification or destruction of information.
Overview
An unbroken wax seal on an envelop ensures integrity.
The unique unbroken seal ensures no one has read the
contents
Overview
Ensuring timely and reliable access to and use of
information. A loss of availability is the disruption
(confusion) of access to or use of information or an
information system.
Overview
Cryptography
Computer Security
OSI Security Architecture
Security Structure Scheme
Key Properties
Symmetric Encryption
Asymmetric Encryption
Book
Overview
 The Open System Interconnect (OSI) security architecture was designated
by the ITU-T (International Telecommunication Union - Telecommunication).
The ITU-T decided that their standard "X.800" would be the ISO security
architecture.
 The OSI security architecture focuses on:
Security mechanism
Security service
Security attack
Overview
A process (or a device incorporating such a process) that
is designed to detect, prevent, or recover from a security
attack.
no single mechanism that will support all functions
required
Overview
A processing or communication service that enhances the
security of the data processing systems and the
information transfers of an organization. The services are
intended to counter security attacks, and they make use of
one or more security mechanisms to provide the service.
Make use of one or more security mechanisms to provide
the service
Overview
Any action that compromises the security of information
owned by an organization.
Information security is about how to prevent attacks, or
failing that, to detect attacks on information-based systems
Overview
A passive attack attempts to learn or make use of
information from the system but does not affect system
resources.
An active attack attempts to alter system resources or affect
their operation.
Overview
Overview
Overview
Cryptography
Computer Security
OSI Security Architecture
Security Structure Scheme
Key Properties
Symmetric Encryption
Asymmetric Encryption
Book
Overview
Plaintext
Key
Decryption
Ciphertext
Ciphertext
Key
Encryption
Plaintext
Overview
 Plaintext is the original message or data
 Secret Key is a value independent of the plaintext and of the
algorithm.
 Ciphertext This is the scrambled message produced as output.
Overview
Encryption Algorithm is a mathematical procedure for
performing encryption on data.
Decryption Algorithm is a mathematical procedure for
performing decryption on data.
Overview
Cryptography
Computer Security
OSI Security Architecture
Security Structure Scheme
Key Properties
Symmetric Encryption
Asymmetric Encryption
Book
Overview
Shorter keys = faster
processing, but less secure
Longer keys = slower
processing, but more
secure
Overview
Single use key: (one time key)
• Key is only used to encrypt one message
• encrypted email: new key generated for every email
Multi use key: (many time key)
• Key used to encrypt multiple messages
• encrypted files: same key used to encrypt many files
Overview
Cryptography
Computer Security
OSI Security Architecture
Security Structure Scheme
Key Properties
Symmetric Encryption
Asymmetric Encryption
Book
Overview
 Best known as shared-secret key algorithms
 The usual key length is 80 - 256 bits
 A sender and receiver must share a secret key
 Faster processing because they use simple mathematical operations.
 Examples include DES, 3DES, AES, IDEA, RC2/4/5/6, and Blowfish.
Key Key
Encrypt Decrypt
$1000 $1000$!@#IQ
Pre-shared
key
Overview
64 bits 64bits 64bits
01010010110010101010100101100101011100101blank blank
0101010010101010100001001001001 0101010010101010100001001001001
Block Cipher – encryption is completed
in 64 bit blocks
Stream Cipher – encryption is one bit
at a time
Overview
A stream cipher is a symmetric key cipher where plaintext
digits are combined with a pseudorandom
cipher digit stream (keystream).
A block cipher is a symmetric key cipher in which a
cryptographic key and algorithm are applied to a block of
data (for example, 64 contiguous bits) at once as a group
rather than to one bit at a time.
Overview
Cryptography
Computer Security
OSI Security Architecture
Security Structure Scheme
Key Properties
Symmetric Encryption
Asymmetric Encryption
Book
Overview
 Also known as public key algorithms
 The usual key length is 512–4096 bits
 A sender and receiver do not share a secret key
 Relatively slow because they are based on difficult computational
algorithms
 Examples include RSA, ElGamal, elliptic curves, and DH.
Encryption Key Decryption Key
Encrypt Decrypt
$1000 $1000%3f7&4
Two separate
keys which are
not shared
Overview
Cryptanalysis: is the science of analyzing and breaking
encryption schemes.
Cryptology: is the term referring to the wide study of secret
writing, and covered both cryptography and cryptanalysis.
Overview
Cryptography
Computer Security
OSI Security Architecture
Security Structure Scheme
Key Properties
Symmetric Encryption
Asymmetric Encryption
Book
Overview
Overview
Security
Lab
IBM Essentials of Web Application Security
CISCO CCNA Security
Penetration
Testing Kali Linux
Overview
facebook.com/mloey
mohamedloey@gmail.com
twitter.com/mloey
linkedin.com/in/mloey
mloey@fci.bu.edu.eg
mloey.github.io
Overview
www.YourCompany.com
© 2020 Companyname PowerPoint Business Theme. All Rights Reserved.
THANKS FOR
YOUR TIME

Mais conteúdo relacionado

Mais procurados

Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Dr. Kapil Gupta
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal CryptosystemAdri Jovin
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIMERohit Soni
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationsarhadisoftengg
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyMd. Afif Al Mamun
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture NotesFellowBuddy.com
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptographychauhankapil
 
Computer security overview
Computer security overviewComputer security overview
Computer security overviewCAS
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanismsRajapriya82
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notesgangadhar9989166446
 
Cryptography (Affine Cipher) Ian Christine Mario.pptx
Cryptography (Affine Cipher) Ian Christine Mario.pptxCryptography (Affine Cipher) Ian Christine Mario.pptx
Cryptography (Affine Cipher) Ian Christine Mario.pptxIanChristineMario2
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9koolkampus
 
The need for security
The need for securityThe need for security
The need for securityDhani Ahmad
 

Mais procurados (20)

Email security
Email securityEmail security
Email security
 
Security attacks
Security attacksSecurity attacks
Security attacks
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal Cryptosystem
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIME
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notes
 
Cryptography (Affine Cipher) Ian Christine Mario.pptx
Cryptography (Affine Cipher) Ian Christine Mario.pptxCryptography (Affine Cipher) Ian Christine Mario.pptx
Cryptography (Affine Cipher) Ian Christine Mario.pptx
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 
The need for security
The need for securityThe need for security
The need for security
 

Destaque

Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1Mohamed Loey
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacySamudin Kassan
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityFizaril Amzari Omar
 
PMP Lecture 1: Introduction to Project Management
PMP Lecture 1: Introduction to Project ManagementPMP Lecture 1: Introduction to Project Management
PMP Lecture 1: Introduction to Project ManagementMohamed Loey
 
Research Poster Design Ideas
Research Poster Design IdeasResearch Poster Design Ideas
Research Poster Design Ideasaldenlibrary
 
Características y Obras de la Arq. Romana
Características y Obras de la Arq. RomanaCaracterísticas y Obras de la Arq. Romana
Características y Obras de la Arq. Romanapatricia silva
 
Estrategia de búsqueda en scopus y cinahl
Estrategia de búsqueda en scopus y cinahlEstrategia de búsqueda en scopus y cinahl
Estrategia de búsqueda en scopus y cinahlVanessadc4
 
Innovación de marca en Snapchat
Innovación de marca en SnapchatInnovación de marca en Snapchat
Innovación de marca en SnapchatIntelienz
 
PMP Lecture 3: Project Management Processes
PMP Lecture 3: Project Management ProcessesPMP Lecture 3: Project Management Processes
PMP Lecture 3: Project Management ProcessesMohamed Loey
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and RisksMiguel Rebollo
 
PMP Lecture 2: Project Management Framework
PMP Lecture 2: Project Management FrameworkPMP Lecture 2: Project Management Framework
PMP Lecture 2: Project Management FrameworkMohamed Loey
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 
Chap 05 ip addresses classfless
Chap 05 ip addresses classflessChap 05 ip addresses classfless
Chap 05 ip addresses classflessNoctorous Jamal
 
Semantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the EnterpriseSemantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the EnterpriseStephen Lahanas
 
Catalog LEROY MERLIN iunie 2014
Catalog LEROY MERLIN iunie 2014Catalog LEROY MERLIN iunie 2014
Catalog LEROY MERLIN iunie 2014Andrei Stefanescu
 
Basic Introduction to an Operation - OR Design and Aseptic Techniques
Basic Introduction to an Operation - OR Design and Aseptic TechniquesBasic Introduction to an Operation - OR Design and Aseptic Techniques
Basic Introduction to an Operation - OR Design and Aseptic TechniquesReynaldo Joson
 

Destaque (20)

Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and Security
 
PMP Lecture 1: Introduction to Project Management
PMP Lecture 1: Introduction to Project ManagementPMP Lecture 1: Introduction to Project Management
PMP Lecture 1: Introduction to Project Management
 
Cryptography
CryptographyCryptography
Cryptography
 
Research Poster Design Ideas
Research Poster Design IdeasResearch Poster Design Ideas
Research Poster Design Ideas
 
Características y Obras de la Arq. Romana
Características y Obras de la Arq. RomanaCaracterísticas y Obras de la Arq. Romana
Características y Obras de la Arq. Romana
 
кольори веселки
кольори веселкикольори веселки
кольори веселки
 
Estrategia de búsqueda en scopus y cinahl
Estrategia de búsqueda en scopus y cinahlEstrategia de búsqueda en scopus y cinahl
Estrategia de búsqueda en scopus y cinahl
 
Innovación de marca en Snapchat
Innovación de marca en SnapchatInnovación de marca en Snapchat
Innovación de marca en Snapchat
 
PMP Lecture 3: Project Management Processes
PMP Lecture 3: Project Management ProcessesPMP Lecture 3: Project Management Processes
PMP Lecture 3: Project Management Processes
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
 
PMP Lecture 2: Project Management Framework
PMP Lecture 2: Project Management FrameworkPMP Lecture 2: Project Management Framework
PMP Lecture 2: Project Management Framework
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Chap 05 ip addresses classfless
Chap 05 ip addresses classflessChap 05 ip addresses classfless
Chap 05 ip addresses classfless
 
Semantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the EnterpriseSemantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the Enterprise
 
Chap 01 intro
Chap 01 introChap 01 intro
Chap 01 intro
 
Catalog LEROY MERLIN iunie 2014
Catalog LEROY MERLIN iunie 2014Catalog LEROY MERLIN iunie 2014
Catalog LEROY MERLIN iunie 2014
 
Basic Introduction to an Operation - OR Design and Aseptic Techniques
Basic Introduction to an Operation - OR Design and Aseptic TechniquesBasic Introduction to an Operation - OR Design and Aseptic Techniques
Basic Introduction to an Operation - OR Design and Aseptic Techniques
 

Semelhante a Computer Security Lecture 1: Overview

osi-security-architectureppt.pptx
osi-security-architectureppt.pptxosi-security-architectureppt.pptx
osi-security-architectureppt.pptxkumarkaushal17
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)Gaurav Dalvi
 
computer architecture.ppt
computer architecture.pptcomputer architecture.ppt
computer architecture.pptPandiya Rajan
 
Intro-2013.pptIntro-2013.pptIntro-2013.ppt
Intro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.ppt
Intro-2013.pptIntro-2013.pptIntro-2013.ppttahirnaquash2
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1osama elfar
 
Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Mukesh Chinta
 
NS-Lec-01&02.ppt
NS-Lec-01&02.pptNS-Lec-01&02.ppt
NS-Lec-01&02.pptahmed127489
 
Network security in computer network for BS
Network security in computer network for BSNetwork security in computer network for BS
Network security in computer network for BS23017156038
 
Web security
Web securityWeb security
Web securityLayla Tk
 
Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)Alexander Decker
 
Nw sec
Nw secNw sec
Nw secshivz3
 
Multilayer security mechanism in computer networks
Multilayer security mechanism in computer networksMultilayer security mechanism in computer networks
Multilayer security mechanism in computer networksAlexander Decker
 
11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networksAlexander Decker
 

Semelhante a Computer Security Lecture 1: Overview (20)

osi-security-architectureppt.pptx
osi-security-architectureppt.pptxosi-security-architectureppt.pptx
osi-security-architectureppt.pptx
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
computer architecture.ppt
computer architecture.pptcomputer architecture.ppt
computer architecture.ppt
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
 
CH01.ppt
CH01.pptCH01.ppt
CH01.ppt
 
Intro-2013.pptIntro-2013.pptIntro-2013.ppt
Intro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.ppt
Intro-2013.pptIntro-2013.pptIntro-2013.ppt
 
cns unit 1.pptx
cns unit 1.pptxcns unit 1.pptx
cns unit 1.pptx
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
 
Unit 1.ppt
Unit 1.pptUnit 1.ppt
Unit 1.ppt
 
Network security
Network security Network security
Network security
 
Lecture 07 networking
Lecture 07 networkingLecture 07 networking
Lecture 07 networking
 
Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4
 
NS-Lec-01&02.ppt
NS-Lec-01&02.pptNS-Lec-01&02.ppt
NS-Lec-01&02.ppt
 
Network security in computer network for BS
Network security in computer network for BSNetwork security in computer network for BS
Network security in computer network for BS
 
Web security
Web securityWeb security
Web security
 
Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)
 
ch01-4.ppt
ch01-4.pptch01-4.ppt
ch01-4.ppt
 
Nw sec
Nw secNw sec
Nw sec
 
Multilayer security mechanism in computer networks
Multilayer security mechanism in computer networksMultilayer security mechanism in computer networks
Multilayer security mechanism in computer networks
 
11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks
 

Mais de Mohamed Loey

Lecture 6: Deep Learning Applications
Lecture 6: Deep Learning ApplicationsLecture 6: Deep Learning Applications
Lecture 6: Deep Learning ApplicationsMohamed Loey
 
Lecture 5: Convolutional Neural Network Models
Lecture 5: Convolutional Neural Network ModelsLecture 5: Convolutional Neural Network Models
Lecture 5: Convolutional Neural Network ModelsMohamed Loey
 
Lecture 4: Deep Learning Frameworks
Lecture 4: Deep Learning FrameworksLecture 4: Deep Learning Frameworks
Lecture 4: Deep Learning FrameworksMohamed Loey
 
Lecture 4: How it Works: Convolutional Neural Networks
Lecture 4: How it Works: Convolutional Neural NetworksLecture 4: How it Works: Convolutional Neural Networks
Lecture 4: How it Works: Convolutional Neural NetworksMohamed Loey
 
Lecture 3: Convolutional Neural Networks
Lecture 3: Convolutional Neural NetworksLecture 3: Convolutional Neural Networks
Lecture 3: Convolutional Neural NetworksMohamed Loey
 
Lecture 2: Artificial Neural Network
Lecture 2: Artificial Neural NetworkLecture 2: Artificial Neural Network
Lecture 2: Artificial Neural NetworkMohamed Loey
 
Lecture 1: Deep Learning for Computer Vision
Lecture 1: Deep Learning for Computer VisionLecture 1: Deep Learning for Computer Vision
Lecture 1: Deep Learning for Computer VisionMohamed Loey
 
Design of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer DiseasesDesign of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer DiseasesMohamed Loey
 
Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2Mohamed Loey
 
Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Mohamed Loey
 
Algorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern AlgorithmsAlgorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern AlgorithmsMohamed Loey
 
Algorithms Lecture 7: Graph Algorithms
Algorithms Lecture 7: Graph AlgorithmsAlgorithms Lecture 7: Graph Algorithms
Algorithms Lecture 7: Graph AlgorithmsMohamed Loey
 
Algorithms Lecture 6: Searching Algorithms
Algorithms Lecture 6: Searching AlgorithmsAlgorithms Lecture 6: Searching Algorithms
Algorithms Lecture 6: Searching AlgorithmsMohamed Loey
 
Algorithms Lecture 5: Sorting Algorithms II
Algorithms Lecture 5: Sorting Algorithms IIAlgorithms Lecture 5: Sorting Algorithms II
Algorithms Lecture 5: Sorting Algorithms IIMohamed Loey
 
Algorithms Lecture 4: Sorting Algorithms I
Algorithms Lecture 4: Sorting Algorithms IAlgorithms Lecture 4: Sorting Algorithms I
Algorithms Lecture 4: Sorting Algorithms IMohamed Loey
 
Algorithms Lecture 3: Analysis of Algorithms II
Algorithms Lecture 3: Analysis of Algorithms IIAlgorithms Lecture 3: Analysis of Algorithms II
Algorithms Lecture 3: Analysis of Algorithms IIMohamed Loey
 
Algorithms Lecture 2: Analysis of Algorithms I
Algorithms Lecture 2: Analysis of Algorithms IAlgorithms Lecture 2: Analysis of Algorithms I
Algorithms Lecture 2: Analysis of Algorithms IMohamed Loey
 
Algorithms Lecture 1: Introduction to Algorithms
Algorithms Lecture 1: Introduction to AlgorithmsAlgorithms Lecture 1: Introduction to Algorithms
Algorithms Lecture 1: Introduction to AlgorithmsMohamed Loey
 
Convolutional Neural Network Models - Deep Learning
Convolutional Neural Network Models - Deep LearningConvolutional Neural Network Models - Deep Learning
Convolutional Neural Network Models - Deep LearningMohamed Loey
 
Deep Learning - Overview of my work II
Deep Learning - Overview of my work IIDeep Learning - Overview of my work II
Deep Learning - Overview of my work IIMohamed Loey
 

Mais de Mohamed Loey (20)

Lecture 6: Deep Learning Applications
Lecture 6: Deep Learning ApplicationsLecture 6: Deep Learning Applications
Lecture 6: Deep Learning Applications
 
Lecture 5: Convolutional Neural Network Models
Lecture 5: Convolutional Neural Network ModelsLecture 5: Convolutional Neural Network Models
Lecture 5: Convolutional Neural Network Models
 
Lecture 4: Deep Learning Frameworks
Lecture 4: Deep Learning FrameworksLecture 4: Deep Learning Frameworks
Lecture 4: Deep Learning Frameworks
 
Lecture 4: How it Works: Convolutional Neural Networks
Lecture 4: How it Works: Convolutional Neural NetworksLecture 4: How it Works: Convolutional Neural Networks
Lecture 4: How it Works: Convolutional Neural Networks
 
Lecture 3: Convolutional Neural Networks
Lecture 3: Convolutional Neural NetworksLecture 3: Convolutional Neural Networks
Lecture 3: Convolutional Neural Networks
 
Lecture 2: Artificial Neural Network
Lecture 2: Artificial Neural NetworkLecture 2: Artificial Neural Network
Lecture 2: Artificial Neural Network
 
Lecture 1: Deep Learning for Computer Vision
Lecture 1: Deep Learning for Computer VisionLecture 1: Deep Learning for Computer Vision
Lecture 1: Deep Learning for Computer Vision
 
Design of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer DiseasesDesign of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer Diseases
 
Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2
 
Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1
 
Algorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern AlgorithmsAlgorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern Algorithms
 
Algorithms Lecture 7: Graph Algorithms
Algorithms Lecture 7: Graph AlgorithmsAlgorithms Lecture 7: Graph Algorithms
Algorithms Lecture 7: Graph Algorithms
 
Algorithms Lecture 6: Searching Algorithms
Algorithms Lecture 6: Searching AlgorithmsAlgorithms Lecture 6: Searching Algorithms
Algorithms Lecture 6: Searching Algorithms
 
Algorithms Lecture 5: Sorting Algorithms II
Algorithms Lecture 5: Sorting Algorithms IIAlgorithms Lecture 5: Sorting Algorithms II
Algorithms Lecture 5: Sorting Algorithms II
 
Algorithms Lecture 4: Sorting Algorithms I
Algorithms Lecture 4: Sorting Algorithms IAlgorithms Lecture 4: Sorting Algorithms I
Algorithms Lecture 4: Sorting Algorithms I
 
Algorithms Lecture 3: Analysis of Algorithms II
Algorithms Lecture 3: Analysis of Algorithms IIAlgorithms Lecture 3: Analysis of Algorithms II
Algorithms Lecture 3: Analysis of Algorithms II
 
Algorithms Lecture 2: Analysis of Algorithms I
Algorithms Lecture 2: Analysis of Algorithms IAlgorithms Lecture 2: Analysis of Algorithms I
Algorithms Lecture 2: Analysis of Algorithms I
 
Algorithms Lecture 1: Introduction to Algorithms
Algorithms Lecture 1: Introduction to AlgorithmsAlgorithms Lecture 1: Introduction to Algorithms
Algorithms Lecture 1: Introduction to Algorithms
 
Convolutional Neural Network Models - Deep Learning
Convolutional Neural Network Models - Deep LearningConvolutional Neural Network Models - Deep Learning
Convolutional Neural Network Models - Deep Learning
 
Deep Learning - Overview of my work II
Deep Learning - Overview of my work IIDeep Learning - Overview of my work II
Deep Learning - Overview of my work II
 

Último

Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 

Último (20)

Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

Computer Security Lecture 1: Overview

  • 2. Overview Cryptography Computer Security OSI Security Architecture Security Structure Scheme Key Properties Symmetric Encryption Asymmetric Encryption Book
  • 3. Overview Cryptography Computer Security OSI Security Architecture Security Structure Scheme Key Properties Symmetric Encryption Asymmetric Encryption Book
  • 4. Overview  Cryptography: is the science of secret writing and is an ancient art; the first documented use of cryptography in writing dates back to 1900 B.C. when an Egyptian scribe used non- standard hieroglyphs in an inscription (handwriting).
  • 5. Overview Cryptography Computer Security OSI Security Architecture Security Structure Scheme Key Properties Symmetric Encryption Asymmetric Encryption Book
  • 6. Overview Computer Security - generic name for the collection of tools designed to protect data Network Security - measures to protect data during their transmission Internet Security - measures to protect data during their transmission over a collection of interconnected networks
  • 7. Overview The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications)
  • 9. Overview Ensuring that no one can read the message except the intended receiver. Preserving authorized restrictions on information access and disclosure (detection), including means for protecting personal privacy and proprietary information. A loss of confidentiality is the unauthorized disclosure of information.
  • 10. Overview I O D Q N H D V W D W W D F N D W G D Z Q
  • 11. Overview Assuring the receiver that the received message has not been altered in any way from the original. Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity. A loss of integrity is the unauthorized modification or destruction of information.
  • 12. Overview An unbroken wax seal on an envelop ensures integrity. The unique unbroken seal ensures no one has read the contents
  • 13. Overview Ensuring timely and reliable access to and use of information. A loss of availability is the disruption (confusion) of access to or use of information or an information system.
  • 14. Overview Cryptography Computer Security OSI Security Architecture Security Structure Scheme Key Properties Symmetric Encryption Asymmetric Encryption Book
  • 15. Overview  The Open System Interconnect (OSI) security architecture was designated by the ITU-T (International Telecommunication Union - Telecommunication). The ITU-T decided that their standard "X.800" would be the ISO security architecture.  The OSI security architecture focuses on: Security mechanism Security service Security attack
  • 16. Overview A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack. no single mechanism that will support all functions required
  • 17. Overview A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the service. Make use of one or more security mechanisms to provide the service
  • 18. Overview Any action that compromises the security of information owned by an organization. Information security is about how to prevent attacks, or failing that, to detect attacks on information-based systems
  • 19. Overview A passive attack attempts to learn or make use of information from the system but does not affect system resources. An active attack attempts to alter system resources or affect their operation.
  • 22. Overview Cryptography Computer Security OSI Security Architecture Security Structure Scheme Key Properties Symmetric Encryption Asymmetric Encryption Book
  • 24. Overview  Plaintext is the original message or data  Secret Key is a value independent of the plaintext and of the algorithm.  Ciphertext This is the scrambled message produced as output.
  • 25. Overview Encryption Algorithm is a mathematical procedure for performing encryption on data. Decryption Algorithm is a mathematical procedure for performing decryption on data.
  • 26. Overview Cryptography Computer Security OSI Security Architecture Security Structure Scheme Key Properties Symmetric Encryption Asymmetric Encryption Book
  • 27. Overview Shorter keys = faster processing, but less secure Longer keys = slower processing, but more secure
  • 28. Overview Single use key: (one time key) • Key is only used to encrypt one message • encrypted email: new key generated for every email Multi use key: (many time key) • Key used to encrypt multiple messages • encrypted files: same key used to encrypt many files
  • 29. Overview Cryptography Computer Security OSI Security Architecture Security Structure Scheme Key Properties Symmetric Encryption Asymmetric Encryption Book
  • 30. Overview  Best known as shared-secret key algorithms  The usual key length is 80 - 256 bits  A sender and receiver must share a secret key  Faster processing because they use simple mathematical operations.  Examples include DES, 3DES, AES, IDEA, RC2/4/5/6, and Blowfish. Key Key Encrypt Decrypt $1000 $1000$!@#IQ Pre-shared key
  • 31. Overview 64 bits 64bits 64bits 01010010110010101010100101100101011100101blank blank 0101010010101010100001001001001 0101010010101010100001001001001 Block Cipher – encryption is completed in 64 bit blocks Stream Cipher – encryption is one bit at a time
  • 32. Overview A stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream). A block cipher is a symmetric key cipher in which a cryptographic key and algorithm are applied to a block of data (for example, 64 contiguous bits) at once as a group rather than to one bit at a time.
  • 33. Overview Cryptography Computer Security OSI Security Architecture Security Structure Scheme Key Properties Symmetric Encryption Asymmetric Encryption Book
  • 34. Overview  Also known as public key algorithms  The usual key length is 512–4096 bits  A sender and receiver do not share a secret key  Relatively slow because they are based on difficult computational algorithms  Examples include RSA, ElGamal, elliptic curves, and DH. Encryption Key Decryption Key Encrypt Decrypt $1000 $1000%3f7&4 Two separate keys which are not shared
  • 35. Overview Cryptanalysis: is the science of analyzing and breaking encryption schemes. Cryptology: is the term referring to the wide study of secret writing, and covered both cryptography and cryptanalysis.
  • 36. Overview Cryptography Computer Security OSI Security Architecture Security Structure Scheme Key Properties Symmetric Encryption Asymmetric Encryption Book
  • 38. Overview Security Lab IBM Essentials of Web Application Security CISCO CCNA Security Penetration Testing Kali Linux
  • 40. Overview www.YourCompany.com © 2020 Companyname PowerPoint Business Theme. All Rights Reserved. THANKS FOR YOUR TIME