![](images/graphics/blank.gif)
Information security
-
Securing digital data in the process of retrieving financial information can be seen as important requirement today. This paper focuses on developing a secure encryption (SE) scheme that supports efficient querying on encrypted data in financial databases.
8p
tuetuebinhan000
23-01-2025
2
2
Download
-
Security is about managing risk. Without an understanding of the security risks to an organization’s information assets, too many or not enough resources might be used or used in the wrong way. Risk management also provides a basis for valuing of information assets. By identifying risk, you learn the value of particular types of information and the value of the systems that contain that information.
50p
ptitd04_vt
09-05-2012
221
88
Download
-
Các máy chủ Web (Webserver) luôn là những vùng đất màu mỡ cho các hacker tìm kiếm các thông tin giá trị hay gây rối vì một mục đích nào đó. Hiểm hoạ có thể là bất cứ cái gì từ kiểu tấn công từ chối dịch vụ, quảng cáo các website có nội dung không lành mạnh, xoá, thay đổi nội dung các file hay phần mềm chứa mã nguy hiểm. Bài viết dưới đây được trình bày như những lời khuyên cho việc đảm bảo an toàn cho các máy chủ Web....
42p
muathu_102
28-01-2013
146
50
Download
-
Overview Access Control Matrix model Discretionary Access Control (DAC) Mandatory Access Control (MAC) and an example model Role Based Access Control (RBAC) Access Control in Unix Sep 2009 Information Security by Van K Nguyen Hanoi University of Technology 2 .What is AC Quote from Ross Anderson (text “Security Engineering”) Its function is to control which principals (persons, processes, machines, …) have access to which resources in the system -- which files they can read, which programs they can execute, and how they share data with other principals, and so on....
58p
trinhvietnambk
29-05-2013
76
9
Download
-
Malware: software designed to infiltrate or damage a computer system without the owner's informed consent Spyware: software designed to intercept or take partial control over the user's interaction with the computer, without the user's informed consent secretly monitors the user's behavior collect various types of personal information
33p
trinhvietnambk
29-05-2013
65
4
Download
-
This study provides an implementation of the extended Euclidean algorithm to find secret keys based on RSA cryptography and hopes that it can be of help to experts in the field of information security.
11p
viprimi
16-12-2024
5
1
Download
-
Chapter 3 - Attacks and malicious code (part 2). After studying this chapter you will be able to: Discuss man-in-the-middle attacks, replay attacks, and TCP session hijacking; detail three types of social-engineering attacks and explain why they can be incredibly damaging; list major types of attacks used against encrypted data; list major types of malicious software and identify a countermeasure for each one.
43p
nhanmotchut_3
20-10-2016
65
6
Download
-
Chapter 12 - Policies and disaster recovery. The main contents of this chapter include all of the following: Policies and procedures, privilege management, education and documentation, communication, disaster recovery, business continuity.
45p
nhanmotchut_3
20-10-2016
41
6
Download
-
Chapter 4 - Remote access. Objectives in this chapter: Understand implications of IEEE 802.1x and how it is used, understand VPN technology and its uses for securing remote access to networks, understand how RADIUS authentication works, understand how TACACS+ operates, understand how PPTP works and when it is used,...
54p
nhanmotchut_3
20-10-2016
80
5
Download
-
Chapter 7 - Quản trị bảo mật cho hệ thống (Security management system). After studying this chapter you will be able to: Understand the purpose of a network firewall and the kinds of firewall technology available on the market; understand the role of routers, switches, and other networking hardware in security; determine when VPN or RAS technology works to provide a secure network connection.
76p
nhanmotchut_3
20-10-2016
71
5
Download
-
Lecture Security+ Certification: Chapter 9 - System hardening. The main contents of this chapter include all of the following: Disable nonessential systems, harden operating systems, harden applications, harden networks.
39p
nhanmotchut_3
20-10-2016
75
5
Download
-
Chapter 11 - Incident response. The main contents of this chapter include all of the following: Incident response overview, computer forensics defined, contemporary issues in computer forensics, forensic process, forensic tools, forensic problems, the future of computer forensics.
90p
nhanmotchut_3
20-10-2016
44
5
Download
-
Chapter 2 - Authentication. After studying this chapter you will be able to: Understand AAA (3A),create strong passwords and store them securely, understand the Kerberos authentication process, understand how CHAP works, understand what mutual authentication is and why it is necessary, understand how digital certificates are created and why they are used,...
55p
nhanmotchut_3
20-10-2016
64
4
Download
-
Chapter 3 - Attacks and malicious code (part 1). After reading the material in this chapter, you should be able to: Explain denial-of-service (DoS) attacks, explain and discuss ping-of-death attacks, identify major components used in a DDoS attack and how they are installed, understand major types of spoofing attacks.
43p
nhanmotchut_3
20-10-2016
64
4
Download
-
Chapter 6 - Email and web security. The main contents of this chapter include all of the following: Protect e-mail systems, list World Wide Web vulnerabilities, secure web communications, secure instant messaging.
48p
nhanmotchut_3
20-10-2016
56
4
Download
-
Chapter 8 - Network security topologies. Objectives in this chapter: Explain network perimeter’s importance to an organization’s security policies, identify place and role of the demilitarized zone in the network, explain how network address translation is used to help secure networks, spell out the role of tunneling in network security, describe security features of virtual local area networks.
40p
nhanmotchut_3
20-10-2016
67
4
Download
-
Chapter 10 - Public key infrastructure. After completing this chapter, students will be able to: Explain cryptography strengths and vulnerabilities, define public key infrastructure (PKI), manage digital certificates, explore key management.
34p
nhanmotchut_3
20-10-2016
39
4
Download
-
Bài giảng "Mật mã học: Tổng quan về mật mã học" cung cấp cho người học các kiến thức: Introduction, information security and cryptography, cryptographic goals, one-way functions, basic terminology and concepts,... Mời các bạn cùng tham khảo.
41p
abcxyz123_10
07-06-2020
28
4
Download
-
Lecture Electronic commerce - Chapter 11: E-Commerce Security learning objectives: Explain EC-related crimes and why they cannot be stopped. Describe an EC security strategy and why a life cycle approach is needed. Describe the information assurance security principles. Describe EC security issues from the perspective of customers and e-businesses.
51p
caphesuadathemtac
09-11-2021
17
3
Download
-
Lecture "On safety and security of information systems: Malicious attacks" provide students with knowledge about: Malicious attack; The common types of malicious attacks; Attack tools; Malicious software;... Please refer to the detailed content of the lecture!
39p
hoabingan205
12-12-2022
24
6
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)