Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cryptography and System Security (Flooding and Spoofing Techniques (TCP…
Cryptography and System Security
Goals of System Security
Integrity
Availability
Confidentiality
Type of Vulnerability
Software vulnerability
Data vulnerability
Hardware vulnerability
Environment vulnerability
Types of threats
Interception
Modification
Interruption
Fabrication
Security Services
Integrity
Non-Repudiation
Data Confidentiality
Access Control
Authentication
Security Mechanism
Specific mechanism
Data integrity
Access Control
Traffic padding
Digital signature
Authentication exchange
Encipherment
Routing control
Notarizarion
Pervasive mechanism
Trusted functionality
Security label
Event detection
Security audit
Security recovery
Encryption Techniques
Playfair cipher
Substitution cipher
Hill cipher
Affine cipher
Transposition Techniques
Keyed
Keyless
Internet Security Protocols
FIREWALLS
Honey Pot
IPSEC
IDS
SSL
Flooding and Spoofing Techniques
TCP SYN Flood
ARP Spoofing
UDP Flood
IP Spoofing
ICMP Flood
DNS Spoofing
Source Address Spoofing