Information systems security
-
Lecture Cryptography: Cryptology Overviews introduces the fundamental concepts of cryptography and its applications. The lecture explores core terminologies, classical cipher systems, and the evolution of algorithms in cryptographic science. It sets the stage for understanding the practical use of cryptography in securing information. Please refer to the lecture for more details!
60p
hoatrongguong03
15-05-2025
1
1
Download
-
This study was conducted. Moreover, it is shown that choosing the best Tx/Rx parameters is necessary to meet service quality requirements such as BER and transmission confidentiality. The provided findings provide insightful information about the practical considerations of deploying UWOC/ CDMA systems.
11p
viengfa
28-10-2024
3
1
Download
-
This paper systematically presents a specific application of linear algebra in information security and cryptography, highlighting the crucial role of matrix operations and linear techniques in the design and analysis of encryption algorithms.
8p
viaburame
14-03-2025
3
1
Download
-
Security is about managing risk. Without an understanding of the security risks to an organization’s information assets, too many or not enough resources might be used or used in the wrong way. Risk management also provides a basis for valuing of information assets. By identifying risk, you learn the value of particular types of information and the value of the systems that contain that information.
50p
ptitd04_vt
09-05-2012
221
88
Download
-
Các máy chủ Web (Webserver) luôn là những vùng đất màu mỡ cho các hacker tìm kiếm các thông tin giá trị hay gây rối vì một mục đích nào đó. Hiểm hoạ có thể là bất cứ cái gì từ kiểu tấn công từ chối dịch vụ, quảng cáo các website có nội dung không lành mạnh, xoá, thay đổi nội dung các file hay phần mềm chứa mã nguy hiểm. Bài viết dưới đây được trình bày như những lời khuyên cho việc đảm bảo an toàn cho các máy chủ Web....
42p
muathu_102
28-01-2013
148
50
Download
-
Overview Access Control Matrix model Discretionary Access Control (DAC) Mandatory Access Control (MAC) and an example model Role Based Access Control (RBAC) Access Control in Unix Sep 2009 Information Security by Van K Nguyen Hanoi University of Technology 2 .What is AC Quote from Ross Anderson (text “Security Engineering”) Its function is to control which principals (persons, processes, machines, …) have access to which resources in the system -- which files they can read, which programs they can execute, and how they share data with other principals, and so on....
58p
trinhvietnambk
29-05-2013
79
9
Download
-
Malware: software designed to infiltrate or damage a computer system without the owner's informed consent Spyware: software designed to intercept or take partial control over the user's interaction with the computer, without the user's informed consent secretly monitors the user's behavior collect various types of personal information
33p
trinhvietnambk
29-05-2013
65
4
Download
-
Chapter 7 - Quản trị bảo mật cho hệ thống (Security management system). After studying this chapter you will be able to: Understand the purpose of a network firewall and the kinds of firewall technology available on the market; understand the role of routers, switches, and other networking hardware in security; determine when VPN or RAS technology works to provide a secure network connection.
76p
nhanmotchut_3
20-10-2016
73
5
Download
-
Lecture Security+ Certification: Chapter 9 - System hardening. The main contents of this chapter include all of the following: Disable nonessential systems, harden operating systems, harden applications, harden networks.
39p
nhanmotchut_3
20-10-2016
75
5
Download
-
Chapter 2 - Authentication. After studying this chapter you will be able to: Understand AAA (3A),create strong passwords and store them securely, understand the Kerberos authentication process, understand how CHAP works, understand what mutual authentication is and why it is necessary, understand how digital certificates are created and why they are used,...
55p
nhanmotchut_3
20-10-2016
66
4
Download
-
Chapter 6 - Email and web security. The main contents of this chapter include all of the following: Protect e-mail systems, list World Wide Web vulnerabilities, secure web communications, secure instant messaging.
48p
nhanmotchut_3
20-10-2016
57
4
Download
-
Lecture "On safety and security of information systems: Malicious attacks" provide students with knowledge about: Malicious attack; The common types of malicious attacks; Attack tools; Malicious software;... Please refer to the detailed content of the lecture!
39p
hoabingan205
12-12-2022
29
6
Download
-
Lecture "On safety and security of information systems: Symmetric ciphers advanced encryption standard" provide students with knowledge about: AES Origins; AES Structure; AES Key Expansion; An AES Example;... Please refer to the detailed content of the lecture!
38p
hoabingan205
12-12-2022
20
6
Download
-
Lecture "On safety and security of information systems: Introduction to information systems security" provide students with knowledge about: History of information security; Information systems security; Risks, threats, and vulnerabilities;... Please refer to the detailed content of the lecture!
59p
hoabingan205
12-12-2022
19
5
Download
-
Lecture "On safety and security of information systems: Cryptography" provide students with knowledge about: Basic terminology of cryptography; History of cryptography; Symmetric cipher;... Please refer to the detailed content of the lecture!
56p
hoabingan205
12-12-2022
13
5
Download
-
Lecture "On safety and security of information systems: Symmetric ciphers" provide students with knowledge about: Block cipher principles; Data encryption standard; Feistel cipher;... Please refer to the detailed content of the lecture!
41p
hoabingan205
12-12-2022
20
5
Download
-
Lecture "On safety and security of information systems: Asymmetric ciphers" provide students with knowledge about: principles of public-Key cryptosystems; RSA algorithm;... Please refer to the detailed content of the lecture!
23p
hoabingan205
12-12-2022
17
5
Download
-
Lecture "On safety and security of information systems: Cryptographic hash funtionns" provide students with knowledge about: Hash function; Applications of cryptographic hash functions; Simple hash functions; Requirements and security;... Please refer to the detailed content of the lecture!
22p
hoabingan205
12-12-2022
15
5
Download
-
Lecture "On safety and security of information systems: Firewall" provide students with knowledge about: Firewall concept; Commercial firewalls; Selecting a firewall system;... Please refer to the detailed content of the lecture!
26p
hoabingan205
12-12-2022
24
5
Download
-
Lecture "On safety and security of information systems: Access control" provide students with knowledge about: Four parts of access control; Types of access control; Formal models of access control;... Please refer to the detailed content of the lecture!
18p
hoabingan205
12-12-2022
12
5
Download
CHỦ ĐỀ BẠN MUỐN TÌM
