信息安全导论(密码学)复习试卷资料题

上传人:tian****1990 文档编号:82841097 上传时间:2019-02-25 格式:PPT 页数:88 大小:12.40MB
返回 下载 相关 举报
信息安全导论(密码学)复习试卷资料题_第1页
第1页 / 共88页
信息安全导论(密码学)复习试卷资料题_第2页
第2页 / 共88页
信息安全导论(密码学)复习试卷资料题_第3页
第3页 / 共88页
信息安全导论(密码学)复习试卷资料题_第4页
第4页 / 共88页
信息安全导论(密码学)复习试卷资料题_第5页
第5页 / 共88页
点击查看更多>>
资源描述

《信息安全导论(密码学)复习试卷资料题》由会员分享,可在线阅读,更多相关《信息安全导论(密码学)复习试卷资料题(88页珍藏版)》请在金锄头文库上搜索。

1、Lecture 12: Mid-term Review,School of Software Engineering, CQU Fall, 2014,An Introduction to Information Security,2,2019/2/25,An Introduction to Information Security,Lecture 1: Preface,The Categories of attacks: Generally, there are four general categories of security attacks Interruption 阻断 Interc

2、eption 窃听 Modification 修改 Fabrication 伪装,1. About IS,2. WWW IS?,3. S_ Attacks,4. S_ Services,Information source,Information destination,An asset of the system is destroyed or becomes unavailable or unusable. This is an attack on availability. Examples include: destruction of a piece of hardware the

3、cutting of a communication line the disabling of the file management system DOS/DDOS (Denial of Service),3,2019/2/25,An Introduction to Information Security,Lecture 1: Preface,1. About IS,2. WWW IS?,3. S_ Attacks,4. S_ Services,The Categories of attacks: Generally, there are four general categories

4、of security attacks Interruption 阻断 Interception 窃听 Modification 修改 Fabrication 伪装,Information source,Information destination,An unauthorized party gains access to an asset. This is an attack on confidentiality(保密性). egs: wiretapping (窃听) to capture data in a network the illicit (非法) copying of file

5、s or programs ,4,2019/2/25,An Introduction to Information Security,Lecture 1: Preface,The Categories of attacks: Generally, there are four general categories of security attacks Interruption 阻断 Interception 窃听 Modification 修改 Fabrication 伪装,1. About IS,2. WWW IS?,3. S_ Attacks,4. S_ Services,Informa

6、tion source,Information destination,An unauthorized party not only gains access to but tampers (篡改) with an asset. This is an attack on deniability / integrity (完整性). Examples are: changing values in a data file altering a program modifying the content of messages ,5,2019/2/25,An Introduction to Inf

7、ormation Security,Lecture 1: Preface,The Categories of attacks: Generally, there are four general categories of security attacks Interruption 阻断 Interception 窃听 Modification 修改 Fabrication 伪装,1. About IS,2. WWW IS?,3. S_ Attacks,4. S_ Services,Information source,Information destination,An unauthoriz

8、ed party inserts counterfeit (假冒的) objects into the system. This is an attack on authenticity (真实性). Examples are: insertion of spurious messages in a network addition of records to a file ,6,2019/2/25,An Introduction to Information Security,Lecture 1: Preface,1. About IS,2. WWW IS?,3. S_ Attacks,4.

9、 S_ Services,These attacks involves some modification of the data stream or the creation of a false stream, which can be subdivided into four categories: masquerade (伪装) replay (重放) modification of messages (篡改) denial of service (拒绝服务) Active attacks present the opposite characteristics of passive

10、attacks:,Easy to detect but hard to prevent!,Active Attack,Passive attack,and,7,2019/2/25,An Introduction to Information Security,Lecture 1: Preface,1. About IS,2. WWW IS?,3. S_ Attacks,4. S_ Services,Passive attacks are in the nature of eavesdropping(偷听) on, or monitoring of, transmissions. The goa

11、l of the opponent is to obtain information that is being transmitted. Two types of passive attacks are: release of message contents (泄密) traffic analysis (流量分析) passive attacks present the opposite characteristics of active attacks:,Easy to prevent but hard to detect!,Active Attack,Passive attack,an

12、d,8,2019/2/25,An Introduction to Information Security,Lecture 1: Preface,Security Services Confidentiality (保密性) Availability (可用性) Nonrepudiation (防抵赖) Authentication (真实性) Integrity (完整性) Access Control (可控性),1. About IS,2. WWW IS?,3. S_ Attacks,4. S_ Services,Ensures that the information in a net

13、work and transmitted information are accessible only for reading by authorized parties.,9,2019/2/25,An Introduction to Information Security,Lecture 1: Preface,Security Services Confidentiality (保密性) Availability (可用性) Nonrepudiation (防抵赖) Authentication (真实性) Integrity (完整性) Access Control (可控性),1.

14、About IS,2. WWW IS?,3. S_ Attacks,4. S_ Services,Requires that computer assets be available to authorized parties as needed.,10,2019/2/25,An Introduction to Information Security,Lecture 1: Preface,Security Services Confidentiality (保密性) Availability (可用性) Nonrepudiation (防抵赖) Authentication (真实性) In

15、tegrity (完整性) Access Control (可控性),1. About IS,2. WWW IS?,3. S_ Attacks,4. S_ Services,Requires that neither the sender nor the receiver of a message be able to deny the transmission.,I didnt send R the message !,I didnt receive the message from S !,11,2019/2/25,An Introduction to Information Securi

16、ty,Lecture 1: Preface,Security Services Confidentiality (保密性) Availability (可用性) Nonrepudiation (防抵赖) Authentication (真实性) Integrity (完整性) Access Control (可控性),1. About IS,2. WWW IS?,3. S_ Attacks,4. S_ Services,Ensures that the origin of a message or electronic document is correctly identified, with an assurance that the identity is not false.,Ich bin Xiaofeng + Credential,Verify User and Credential,Authorized,

展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 高等教育 > 大学课件

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号