Professional Documents
Culture Documents
HND - SEC - W1 - Introduction To IT Security
HND - SEC - W1 - Introduction To IT Security
HND - SEC - W1 - Introduction To IT Security
1
Definition of Information security .
2
Types of Attacks
Attacks
Active Passive
Attacks Attacks
3
Active Attacks
4
Passive Attacks
5
Key Security Concepts
6
Key Security Concepts
7
Key Security Concepts
8
Key Security Concepts
9
Achieving Security
10
Encryption
11
Types of Encryption
Encryption
Asymmetric-key encryption
Symmetric-key encryption In asymmetric, or public key,
encryption, there are two keys:
Symmetric-key encryption involves
one key is used for encryption, and
the sharing of a single key.
a different key is used for
decryption.
12
Digital Signature
13
Access Control
Access control is a way of limiting access to a system or
to physical or virtual resources.
In computing, access control is a process by which
users are granted access and certain privileges to
systems, resources or information.
The simplest access control method is to use a
username and a password, so that only authorised
people can gain entry to a system.
14
Lesson Summary
Definition of IT Security.
Types of Attacks.
Active attacks
Passive attacks
Key Security Concepts.
Achieving Security.
Encryption
Digital Signature
Access control
15