Please enable JavaScript.
Coggle requires JavaScript to display documents.
3. Security Engineering - Coggle Diagram
3. Security Engineering
System Architecture
Computer Architecture
Operating System
System Security Architecture
Security Models
Bell LaPadula Model
Biba Model
Clark Wilson Model
Noninterference Model
Brewer and Nash Model
Graham Denning Model
Harrison Ruzzo Ullman Model
System Evaluations
Certifications vs Accreditation
Open vs Closed System
Distributed System Security
Cloud Computer
Parallel Computing
Databases
Web Applications
Mobile Devices
Cyber Physical Systems
A few threats
Maintenance Hooks
Time of check/Time of use attacks
Cryptography in Context, Definitions & Concepts
The strength of cryptosystem
Kerckhoffs Principles
Services of Cryptosystems
One time Pad
Running and Concealment ciphers
Stegnography
Types of Ciphers
Substitution Ciphers
Transposition Ciphers
Methods of Encryption
Symmetric vs Asymmetric Algorithms
Symmetric Cryptography
Block & Stream Ciphers
Hybrid Encryption Methods
Types of Symmetric systems
Data Encryption Standard
Triple DES
Advance Encryption Standard
International Data Encryption Algo
Blowfish
RC4
RC5
RC6