Please enable JavaScript.
Coggle requires JavaScript to display documents.
cryptography and system security (security services (data confidentiality,…
cryptography and system security
goals of system security
integrity
availability
confidentality
types of vulnerabilities (which can be used a threat to perform an ATTACK
software
data
hardware
environment
security services
data confidentiality
connection oriented
connectionless
selective field
traffic flow
non-repudiation
origin
destination
authentication
data origin
peer entity
integrity
connection integrity with recovery
connectionless integrity
connection integrity without recovery
selective field
access control
ACL
C-LIST
ACM
security mechanisms
pervasive
security recovery
event detection
security audits
security label
trusted functionality
specific
traffic padding
authentication exchange
encipherment,digital signature
access control,data integrity
notarization,routing control
Encryption techniques
hill cipher
Affline cipher
substitution cipher
play fair cipher
encryption methods
asymmetric
symmetric
transposition techniques
keyless
keyed
network security and applications
spoofing
DNS
Source Address
IP
ARP
Flooding
TCP SYN
UDP
ICMP
internet security protocols
IPSEC
Honey pot
IDS
SSL
Firewalls
DOS attack
TCP/IP vulnerabilities
Owais Madhia CS3117032