Beruflich Dokumente
Kultur Dokumente
Internet
denial of services.
Masqueraders
Threat
organization.
People
computer network.
CYBER ATTACKS
Executable based or Network based attacks.
Trojan
Virus
Worm
Spam
Confidentiality
Integrity
Authenticity
Non-Repudiability
CRYPTOGRAPHY-BASED SOLUTIONS
CRYPTOSYSTEMS
Symmetric Cryptosystems
Began in 1977.
Work in single key or secret key shared between two
communicating parties.
DOCUME
NT
SENDE
R
ENCODE
D
DOCUME
DES
NT
ENCRYPTION
ENCODE
D
DOCUME
NT
SYMMETRIC KEYS
DOCUME
NT
DES
DECRYPTION
RECEIVE
R
ASYMMETRIC CRYPTOSYSTEMS
1.
2.
Message
ENCRYPTION
SENDER
A
(PKA,SKA
)
PKB
Ciphertex
t
DECRYPTION
Message
RECEIV
ER
(PKB,SK
B)
SKB
Message
SIGNING
SKA
Message
Signatur
e
VERIFICATIO
N
Signature
valid
PKA
Digital Signatures
2.