CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Cryptography and Network Security
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
Chapter 9: Privacy, Crime, and Security
Shouting from the Rooftops: Improving Security Dr. Maury Pinsk FRCPC University of Alberta Division of Pediatric Nephrology.
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
Principles of Information Security, 2nd edition1 Cryptography.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Cryptography and Network Security Chapter 17
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.
Chapter 10: Electronic Commerce Security. Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Electronic mail security -- Pretty Good Privacy.
Chapter 8 Web Security.
Electronic Mail Security. Authentication and confidentiality problems Two systems: - PGP (Pretty Good Privacy) - S/MIME (Science Multipurpose Internet.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Public-key Cryptography Strengths and Weaknesses Matt Blumenthal.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Types of Electronic Infection
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Network Security7-1 CIS3360: Chapter 8: Cryptography Application of Public Cryptography Cliff Zou Spring 2012 TexPoint fonts used in EMF. Read the TexPoint.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Pretty Good Privacy (PGP) Security for Electronic .
Security & Privacy. Learning Objectives Explain the importance of varying the access allowed to database elements at different times and for different.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
CSCI-235 Micro-Computers in Science Privacy & Security.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
1 Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel.
Security, Social and Legal Issues Regarding Software and Internet
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
K E Y Plain text Cipher text Encryption Decryption
CSCI-235 Micro-Computer Applications
Computer Security.
Electronic Payment Security Technologies
Fluency with Information Technology Lawrence Snyder
Presentation transcript:

CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11

CIS 105 Concepts and Terminology Unit 11 Identity Theft. Fraudulent use of another person's identifying information, commonly to establish a credit card account.

CIS 105 Concepts and Terminology Unit 11 Privacy. In the electronic media context, the ability to restrict or eliminate the collection, use, and sale of personal and confidential information. In the jurisprudence context, the right to be left alone.

CIS 105 Concepts and Terminology Unit 11 Encryption. The process of coding information so that it can only be understood by the intended recipient.

CIS 105 Concepts and Terminology Unit 11 Defamation. Injury to another person's reputation by means of false and malicious statements.

CIS 105 Concepts and Terminology Unit 11 Libel. A false or malicious written or printed statement, or any symbolic representation exposing a person to public defamation.

CIS 105 Concepts and Terminology Unit 11 Cookie. A file written from a Web server to a client computer's hard disk, usually to record and provide information about the user for future browsing interactions.

CIS 105 Concepts and Terminology Unit 11 Encryption Algorithm. The step-by-step method for encrypting and decrypting a message.

CIS 105 Concepts and Terminology Unit 11 Symmetric Encryption. Use of the same cipher key for both encryption and decryption.

CIS 105 Concepts and Terminology Unit 11 Data Encryption Standard (DES). A commonly-used, symmetric key encryption system developed by United States security agencies.

CIS 105 Concepts and Terminology Unit 11 Strong Encryption. Encryption methods that are very difficult or impossible to break.

CIS 105 Concepts and Terminology Unit 11 Key Interception. The theft of a decryption key, the major vulnerability of encryption.

CIS 105 Concepts and Terminology Unit 11 Public Key Encryption (PKE). An encryption method using two keys, a public key to encrypt messages, and a private key to decrypt known only to the recipient.

CIS 105 Concepts and Terminology Unit 11 Computationally Intensive. Processing that placed a heavy burden on the processing unit.

CIS 105 Concepts and Terminology Unit 11 Cryptoanalysis. Techniques used to break codes.

CIS 105 Concepts and Terminology Unit 11 Key Length. The length, in bits, of an encryption code. Key lengths of 128 bits are considered invulnerable to decryption.

CIS 105 Concepts and Terminology Unit 11 Digital Certificate. A security method that validates an individual's identity.

CIS 105 Concepts and Terminology Unit 11 Digital Signature. A technique used to determine if a message has been altered.

CIS 105 Concepts and Terminology Unit 11 Certificate Authority (CA). A company that verifies the identity of individuals and issues digital certificates attesting to the veracity of identity.

CIS 105 Concepts and Terminology Unit 11 Pretty Good Privacy (PGP). The most widely used digital signature and certificate system.

CIS 105 Concepts and Terminology Unit 11 End of Study Unit 11. Return to first slide Move to Study Unit 12 CIS 105 Home Page