Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cryptography and System Security (Introduction & Number Theory.…
Cryptography and System Security
Introduction & Number Theory.
Access Control & Attacks
OSI Model
Security Threats & Vulnerabilities
Information Security Concept
Confidentiality
Integrity
Availability
Modular Arithmetic and Number Theory
Euclidean algorithm
Extended Euclidean algorithm
Security
Services
Goals
Classical Encryption Technique
Substitution Cipher
Hill Cipher
Playfair Cipher
Affine Cipher
Vignere Cipher
Transposition Cipher
Keyed Cipher
Keyless Cipher
Symmetric and Asymmetric key Cryptography and key Management
Public key cryptography
The
RSA algorithm
Key management techniques
Diffie Hellman Key exchange
algorithm
Advanced Encryption Standard (AES)
Data Encryption Standard (DES)
Symmetric Algorithm
Stream Cipher
Block Cipher
System Security
Format string
cross-site scripting
SQL injection
Buffer Overflow
Malware
Trojans
Logic Bomb
Worms
Bots
Viruses
Rootkits
Network Security and Applications
Internet Security Protocols
SSL
IPSEC
Firewalls
Intrusion Detection Systems (IDS)
Honey pots
Denial of Service
Classic DOS attacks
Source Address spoofing
ICMP flood, SYN flood, UDP flood
Distributed Denial of Service
Defenses against Denial of Service Attacks
Network security basics
TCP/IP vulnerabilities
Packet Sniffing
ARP spoofing
port scanning
IP spoofing
TCP syn flood
DNS Spoofing.