Session 17 Flashcards
Information Security Challenges
client user (unauthorized access, errors)- communication line (tapping, sniffing, message alteration, theft & fraud, radiation)- corporate servers (hacking viruses & worms, theft and fraud, vandalism, denial of service attacks) - corporate systems to database
the system triangle
security- functionality- ease of use
CIA Framework
Confidentiality- the improper disclosure of information
Integrity- the improper modification of data
Availability- the unauthorized denial of service to data
what is DOS attack
DOS define: denial of service & attacking the availability aspect of the system
Types of DOS Attacks: technical attacks, non-technical attacks
Identity Theft: Phishing
sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
Identity Theft: Spoofing
is an attack in which one person or program successfully masquerades as another by falsifying data, thereby gaining an illegitimate advantage.
Managing passwords
main use of password: authentication/identification
(security threats: all passwords are crackable)
securing passwords: hashing (no one expect the user can ever see the password)
Encryption & Decryption
scrambling & unscrambling
Advantage of digital vs. analog signals (more secure, more flexible)
Encryption key vs decryption Key
(public/private key structure: public key shared - encrypting info.
private key- kept secret- decrypting info
Public & Private Keys
Sender- encrypt with public key- scrambled message- decrypt with private key- recipient