1 Lesson 21. 2 Internet Organization network Fire wall.
-
Upload
angel-cook -
Category
Documents
-
view
212 -
download
0
Transcript of 1 Lesson 21. 2 Internet Organization network Fire wall.
![Page 1: 1 Lesson 21. 2 Internet Organization network Fire wall.](https://reader036.fdocuments.us/reader036/viewer/2022083007/56649e4f5503460f94b4730a/html5/thumbnails/1.jpg)
11
Lesson 21Lesson 21
![Page 2: 1 Lesson 21. 2 Internet Organization network Fire wall.](https://reader036.fdocuments.us/reader036/viewer/2022083007/56649e4f5503460f94b4730a/html5/thumbnails/2.jpg)
22
InternetInternet
Organization network
Organization network
Fire wall
![Page 3: 1 Lesson 21. 2 Internet Organization network Fire wall.](https://reader036.fdocuments.us/reader036/viewer/2022083007/56649e4f5503460f94b4730a/html5/thumbnails/3.jpg)
33
Proxy ServerProxy Server
The Internet
The Internet
Proxy server
server
Client
Client
Client
Client
Hub
![Page 4: 1 Lesson 21. 2 Internet Organization network Fire wall.](https://reader036.fdocuments.us/reader036/viewer/2022083007/56649e4f5503460f94b4730a/html5/thumbnails/4.jpg)
44
Computer Emergency Response Computer Emergency Response Team (CERT)Team (CERT)
Systems Administrator, Audit, Systems Administrator, Audit, Network and Security Institute (SANS Network and Security Institute (SANS Institute)Institute)
![Page 5: 1 Lesson 21. 2 Internet Organization network Fire wall.](https://reader036.fdocuments.us/reader036/viewer/2022083007/56649e4f5503460f94b4730a/html5/thumbnails/5.jpg)
55
Transposition Transposition
I will not come today. Tell the boss.I will not come today. Tell the boss.
I W I L L
N O T C O
M E T O D
A Y . T E
L L T H E
B O S S
INMALBWOEYLOITT.TSLCOTHSLODEE
![Page 6: 1 Lesson 21. 2 Internet Organization network Fire wall.](https://reader036.fdocuments.us/reader036/viewer/2022083007/56649e4f5503460f94b4730a/html5/thumbnails/6.jpg)
66
CryptographyCryptography Cryptography is a collection of mathematical techniques Cryptography is a collection of mathematical techniques
to ensure confidentiality of informationto ensure confidentiality of information Encryption and DecryptionEncryption and Decryption
The process of scrambling a message with the help The process of scrambling a message with the help of a key is called Encryptionof a key is called Encryption
The process of unscrambling a message using an The process of unscrambling a message using an appropriate key is called decryptionappropriate key is called decryption
Keys are numbers or characters that are randomly Keys are numbers or characters that are randomly generatedgenerated
Symmetric and Asymmetric cryptographySymmetric and Asymmetric cryptography Symmetric - same keys are used for encryption and Symmetric - same keys are used for encryption and
decryptiondecryption Asymmetric or Public Key Cryptography – a pair of Asymmetric or Public Key Cryptography – a pair of
public key and private key is used for encryption and public key and private key is used for encryption and decryptiondecryption
Pretty Good Privacy (PGP) is a popular cryptographic Pretty Good Privacy (PGP) is a popular cryptographic systemsystem
![Page 7: 1 Lesson 21. 2 Internet Organization network Fire wall.](https://reader036.fdocuments.us/reader036/viewer/2022083007/56649e4f5503460f94b4730a/html5/thumbnails/7.jpg)
77
Digital/Electronic SignaturesDigital/Electronic Signatures An electronic signature means any An electronic signature means any
letters numbers, symbols, images, letters numbers, symbols, images, characters or any combination thereof characters or any combination thereof in electronic form applied to an in electronic form applied to an electronic documentelectronic document
An electronic signature ensures An electronic signature ensures AuthenticityAuthenticity IntegrityIntegrity Non- repudiation Non- repudiation