Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cryptography and System Security (Malware (Viruses, Worms, Trojans, Bots,…
Cryptography and System Security
Goals
Confidentiality
Integrity
Availability
Secure System
Software Vulnerabilities
Buffer Overflow
Format string
Cross-site
scripting
SQL injection
Malware
Viruses
Worms
Trojans
Bots
Logic Bomb
Rootkits
Encryption
Symmetric key
Data Encryption Standard (DES)
Advanced Encryption Standard
Assymetric key
RSA (Rivest–Shamir–Adleman) Algorithm
Diffie–Hellman
Security Services
Authentication
Peer Entity Authentication
Data-Origin Authentication
Data Confidentiality
Data Integrity
Access Control
ACM
ACL
C-List
Non-repudiation
Proof of Origin
Proof of Delivery
Ciphers
Substitution
Caesar cipher
Shift cipher
Vernam cipher
Monoalphabetic cipher
Polyalphabetic cipher
Play cipher
Hill Cipher
Transposition
Single Columnar transposition
Double Columnar transposition
Digital Certificate
X.509
Public key infrastructure (PKI)
Digital Signature
RSA (Rivest–Shamir–Adleman)
EIGamal and Schnorr signature
Denial of Service attack (DOS)
ICMP flood
SYN flood
UDP flood
Ping of death
HTTP flood
Internet Security Protocols
Secure Sockets Layer(SSL)
Internet Protocol Security (IPsec)