




版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、The art of war teaches us to rely not on the likelihood of the enemys not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable. The Art of War, Sun Tzu第1頁(yè)/共22頁(yè)The combination of space, time, and st
2、rength that must be considered as the basic elements of this theory of defense makes this a fairly complicated matter. Consequently, it is not easy to find a fixed point of departure. On War, Carl Von Clausewitz第2頁(yè)/共22頁(yè)Computer Security the protection afforded to an automated information system in o
3、rder to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications)第3頁(yè)/共22頁(yè)Key Security Concepts第4頁(yè)/共22頁(yè)Levels of Impact can define 3 levels of impact
4、from a security breach Low Moderate High第5頁(yè)/共22頁(yè)Examples of Security Requirements confidentiality student grades integrity patient information availability authentication service第6頁(yè)/共22頁(yè)Computer Security Challenges第7頁(yè)/共22頁(yè)OSI Security Architecture ITU-T X.800 “Security Architecture for OSI” defines
5、a systematic way of defining and providing security requirements for us it provides a useful, if abstract, overview of concepts we will studyM acintosh P IC Tim age form atis not supported第8頁(yè)/共22頁(yè)Aspects of Security consider 3 aspects of information security: security attack security mechanism secur
6、ity service note termsthreat a potential for violation of securityattack an assault on system security, a deliberate attempt to evade security services第9頁(yè)/共22頁(yè)P(yáng)assive Attacks第10頁(yè)/共22頁(yè)Active Attacks第11頁(yè)/共22頁(yè)Security Service enhance security of data processing systems and information transfers of an o
7、rganization intended to counter security attacks using one or more security mechanisms often replicates functions normally associated with physical documents which, for example, have signatures, dates; need protection from disclosure, tampering, or destruction; be notarized or witnessed; be recorded
8、 or licensed第12頁(yè)/共22頁(yè)Security Services X.800:“a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers” RFC 2828:“a processing or communication service provided by a system to give a specific kind of protection to syste
9、m resources”第13頁(yè)/共22頁(yè)Security Services (X.800) Authentication - assurance that communicating entity is the one claimed have both peer-entity & data origin authentication Access Control - prevention of the unauthorized use of a resource Data Confidentiality protection of data from unauthorized disclo
10、sure Data Integrity - assurance that data received is as sent by an authorized entity Non-Repudiation - protection against denial by one of the parties in a communication Availability resource accessible/usable第14頁(yè)/共22頁(yè)Security Mechanism feature designed to detect, prevent, or recover from a securit
11、y attack no single mechanism that will support all services required however one particular element underlies many of the security mechanisms in use: cryptographic techniques hence our focus on this topic第15頁(yè)/共22頁(yè)Security Mechanisms (X.800)specific security mechanisms: encipherment, digital signatur
12、es, access controls, data integrity, authentication exchange, traffic padding, routing control, notarizationpervasive security mechanisms: trusted functionality, security labels, event detection, security audit trails, security recovery第16頁(yè)/共22頁(yè)Model for Network Security第17頁(yè)/共22頁(yè)Model for Network Se
13、curityusing this model requires us to: ldesign a suitable algorithm for the security transformation lgenerate the secret information (keys) used by the algorithm ldevelop methods to distribute and share the secret information 1.specify a protocol enabling the principals to use the transformation and
14、 secret information for a security service 第18頁(yè)/共22頁(yè)Model for Network Access Security第19頁(yè)/共22頁(yè)Model for Network Access Securityusing this model requires us to: lselect appropriate gatekeeper functions to identify users 1.implement security controls to ensure only authorised users access designated information or resources 第20頁(yè)/共22頁(yè)Summary topic
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 2024-2025學(xué)年高中地理上學(xué)期第4周 晨昏線、地方時(shí)教學(xué)設(shè)計(jì) 湘教版必修1
- 23 祖先的搖籃 教學(xué)設(shè)計(jì)-2024-2025學(xué)年統(tǒng)編版語(yǔ)文二年級(jí)下冊(cè)
- Module 9 Unit 2 Happy birthday (教學(xué)設(shè)計(jì)) -2024-2025學(xué)年外研版(一起)英語(yǔ)一年級(jí)上冊(cè)
- 2023七年級(jí)數(shù)學(xué)上冊(cè) 第五章 一元一次方程2 求解一元一次方程第3課時(shí) 解含分母的一元一次方程教學(xué)設(shè)計(jì) (新版)北師大版
- Unit 4 My Favourite Subject Section A 1a~Pronunciation教學(xué)設(shè)計(jì) 2024-2025學(xué)年人教版英語(yǔ)七年級(jí)上冊(cè)
- 《9的乘法口訣》(教學(xué)設(shè)計(jì))-2024-2025學(xué)年二年級(jí)上冊(cè)數(shù)學(xué)蘇教版
- 2024秋八年級(jí)數(shù)學(xué)上冊(cè) 第十五章 分式15.3 分式方程 2解分式方程教學(xué)設(shè)計(jì)(新版)新人教版
- 《乒乓變奏曲》(教案)-2023-2024學(xué)年人教版(2012)音樂(lè)二年級(jí)下冊(cè)
- Unit2 English and Chinese Get started (教學(xué)設(shè)計(jì))-2024-2025學(xué)年教科版(2024)英語(yǔ)三年級(jí)上冊(cè)
- 茶道養(yǎng)生企業(yè)創(chuàng)業(yè)
- 疾病預(yù)防控制中心權(quán)力運(yùn)行流程圖
- 噴砂檢驗(yàn)報(bào)告
- DL∕T 617-2019 氣體絕緣金屬封閉開(kāi)關(guān)設(shè)備技術(shù)條件
- 垂直軸翼形葉片網(wǎng)狀結(jié)構(gòu)的
- 中國(guó)56個(gè)民族介紹
- 河南省省屬煤炭企業(yè)煤礦瓦斯治理調(diào)研報(bào)告
- 第04章 計(jì)算機(jī)輔助設(shè)計(jì)-1
- 2022年00642《傳播學(xué)概論》復(fù)習(xí)資料
- 雙室浮動(dòng)床除鹽水系統(tǒng)程序控制設(shè)計(jì)
- 鋁合金化學(xué)成分表
- 村級(jí)基本公共衛(wèi)生考核評(píng)分表
評(píng)論
0/150
提交評(píng)論