Professional Documents
Culture Documents
Tugas Kelompok Teknologi Artificial Intelligence Presentasi
Tugas Kelompok Teknologi Artificial Intelligence Presentasi
Cyber Security
Fundamentals
COURSE
Pengantar Teknologi Informasi dan Komunikasi
Information Assurance
Fundamentals Symmetric Encryption
Basic Cryptography
Radio-Frequency
Virtualization Identification
Information Assurance
Fundamentals
AUTHENTICATION
If the sender were to encrypt the message of 88 (which is between 0 and 186)
7
using the RSA method, the sender would calculate 88 mod 187, which equals 11.
Therefore, the sender would transmit the number 11 as the ciphertext to the
recipient. To recover the original message, the recipient would then need to
transform 11 into the original value by calculating 1123 mod 187, which equals
88. Exhibit 1-9 depicts this process
The Domain Name
System
Firewalls
History Lesson
1980s
At the time, network administrators used network routers to prevent traffic from
one network from interfering with the traffic of a neighboring network.
1990s
Enhanced routers introduced in the 1990s included filtering rules. The designers of
these routers designated the devices as security firewalls.
early 1990s
The next generation of security firewalls improved on these filter- enabled routers.
During the early 1990s, companies such as DEC, Check Point, and Bell Labs
developed new features for firewalls.
Firewalls
What’s in a Name?
In this example, the firewall administrator has placed an ALLOW rule after the
DENY ALL rule. This situation would prevent the processing of the last ALLOW
rule.
Firewalls
Stateful Firewalls
A stateful firewall is a kind of firewall that keeps track and monitors the
state of active network connections while analyzing incoming traffic and
looking for potential traffic and data risks.
Stateful firewalls facilitate secure and efficient communication by allowing
valid sessions, blocking invalid attempts, managing memory effectively,
and reevaluating connections that have become inactive. Their ability to
quickly determine the state of communication contributes to the overall
security and performance of network traffic.
insights into how stateful firewalls handle session establishment, invalid
session attempts, and the efficient management of connection states to
ensure effective and secure network communication.
From this point we can provides insights into how stateful firewalls handle
session establishment, invalid session attempts, and the efficient
management of connection states to ensure effective and secure network
communication.
Firewalls
Application gateway firewalls
This section discusses the challenges and expenses associated with managing
infrastructure resources such as servers and introduces the concept of
virtualization as a solution to alleviate some of these costs.
• Introduction of Virtualization: To address the high operational costs and
administrative burdens, organizations are turning to virtualization.
Virtualization, at its core, involves the simulation or emulation of a real
product (in this case, servers) within a virtual environment.
• Historical Context of Virtualization: In paragraph 2 mentioning the M44/44X
Project in the 1960s at the IBM Thomas J. Watson Research Center. This
project involved the simulation of multiple IBM 7044 mainframes (44X)
within a single 7044 (M44) mainframe. The term "virtual machine (VM)"
was coined to describe this concept of simulating or emulating a computer
inside another computer using both hardware and software.
• Mainframe Virtualization: The use of virtual machines inside mainframes has
been a common practice for decades. Mainframes with virtualization
capabilities can operate not as a single machine but as multiple machines
simultaneously. Each virtual machine can run its operating system
independently on the same physical machine, effectively turning one
machine into multiple machines.
Virtualization
The Virtualization Menu
This section discusses emulators and how they operate on similar principles
as virtualization systems but with distinct differences. Unlike virtualization
systems, emulators are not restricted by the requirement that the host
machine must match the same basic architecture as the virtual machine.
Emulators emulate all aspects of the virtual machine's hardware, allowing
them to run on host machines with different architectures. Emulators
translate virtual machine instructions into instructions that can run on the
host machine, and they are capable of running virtual machines with
radically different architectures than the host machine. However, this
flexibility comes with a performance cost, as each CPU instruction
executed by the virtual machine must be translated into a series of
instructions for the host machine's CPU, resulting in overhead and
performance penalties. Emulators are not limited to dissimilar architectures;
they can also run virtual machines with the same architecture as the host
machine, providing a more realistic virtual environment without relying on
the translation of certain ring-0 instructions.
Virtualization
Biting the Hand That Feeds