Beruflich Dokumente
Kultur Dokumente
Chapter 1
Introduction
Trudy
Trudy
Chapter 1
Introduction
Introduction
CIA
CIA
Chapter 1
Introduction
CIA
Trudy
Chapter 1
Introduction
CIA
AOBs information must be available
whenever its needed
Alice must be able to make transaction
Chapter 1
Introduction
Chapter 1
Introduction
Chapter 1
Introduction
Chapter 1
Introduction
Chapter 1
Introduction
10
Your Textbook
The
o
o
o
o
Cryptography
Access control
Protocols
Software
Note:
Chapter 1
Introduction
11
For
Chapter 1
Introduction
12
o
o
o
o
Suppose
Chapter 1
Introduction
13
could go wrong?
Trudy tries man-in-the-middle attack
o SSL is secure, so attack doesnt work
o But, Web browser issues a warning
o What do you, the user, do?
If
Chapter 1
Introduction
14
Cryptography
Secret
codes
The book covers
o
o
o
o
o
Classic cryptography
Symmetric ciphers
Public key cryptography
Hash functions++
Advanced cryptanalysis
Chapter 1
Introduction
15
Access Control
Authentication
o Passwords
o Biometrics
o Other methods of authentication
Authorization
Chapter 1
Introduction
16
Protocols
Simple
authentication protocols
Real-world
security protocols
Chapter 1
Introduction
17
Software
Security-critical
flaws in software
o Buffer overflow
o Race conditions, etc.
Malware
Chapter 1
Introduction
18
Software
Software
Digital
Software
and testing
Chapter 1
Introduction
19
Software
Operating systems
Chapter 1
Introduction
20
Recently,
Chapter 1
Introduction
21
In
information security
Chapter 1
Introduction
22
Bruce
Schneier (referring to
Security Engineering, by Ross
Anderson):
o Its about time somebody wrote a book
Chapter 1
Introduction
23
Chapter 1
Introduction
24
In This Course
Think
Its
o What rules?
Think
like Trudy
But dont do anything illegal!
Chapter 1
Introduction
25