Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 7

Ministry of Higher Education and Scientific Research

Northern Technical University


Engineering Technical College –Mosul
Department of Computer Technology

Computer security
Fourth Class (Electronics and
Communications Departments)
2020-2021
Zaid A.A. / Lecturer
Introduction

Security of computers against intruders (e.g., hackers) and


malicious software (e.g.,viruses). Typically, the computer to be
secured is attached to a network, and the bulk of the threats arise
from the network.
• The first two parts of the book deal with two distinct
cryptographic approaches: symmetric cryptographic algorithms
and public-key, or asymmetric, cryptographic algorithms.
Symmetric algorithms make use of a single key shared by two
parties. Public-key algorithms make use of two keys: a private key
known only to one party and a public key available to other
parties.
COMPUTER SECURITY

The protection afforded to an automated information


system in order to attain the applicable objectives of
preserving the integrity, availability, and confidentiality of
information system resources (includes hardware,
software, firmware, information/ data, and
telecommunications).
COMPUTER SECURITY
• • Confidentiality: This term covers two related concepts:
• Data confidentiality: Assures that private or confidential information is not
• made available or disclosed to unauthorized individuals.
• Privacy: Assures that individuals control or influence what information
• related to them may be collected and stored and by whom and to whom that
• information may be disclosed.
• • Integrity: This term covers two related concepts:
• Data integrity: Assures that information and programs are changed only in
• a specified and authorized manner.
• System integrity: Assures that a system performs its intended function in an
• unimpaired manner, free from deliberate or inadvertent unauthorized
• manipulation of the system.
• • Availability: Assures that systems work promptly and service is not denied to
• authorized users.
COMPUTER SECURITY
Definitions
• Plaintext: This is the original message or data that is fed into the algorithm as
input.
• • Encryption algorithm: The encryption algorithm performs various
substitutions and transformations on the plaintext.
• • Secret key: The secret key is also input to the algorithm. The exact
substitutions and transformations performed by the algorithm depend on the
key.
• Ciphertext: This is the scrambled message produced as output. It depends on
the plaintext and the secret key. For a given message, two different keys will
produce two different ciphertexts.
• • Decryption algorithm: This is essentially the encryption algorithm run in
reverse. It takes the ciphertext and the same secret key and produces the
original plaintext.
• cryptanalysis.: The process of attempting to discover the plaintext or
key .The strategy used by the cryptanalyst depends on the nature of the
encryption scheme and the information available to the cryptanalyst.
Model of conventional cryptograph

You might also like