Lecture1

  • June 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Lecture1 as PDF for free.

More details

  • Words: 543
  • Pages: 28
 Inam

Ul Haq  Ms Telecommunication ( Wireless Networks)  From Dept of Electronic Engineering  Queen Mary, University of London, 2006  London, United Kingdom  Voice: 0321-8837397  Email:[email protected]

 Lectures  

will be on

Monday 8:00 to 9:30 Monday 9:45 to 11:30

 Next

Lecture

4

Assignments  4 quizzes  Mid Term  Course Work  Final Exam

10% 10% 25% 20% 35%

 Need

to understand the topic I will give you as assignment  Assignment will not be more than 2 pages.  Full References of the martial are needed.  No number will be awarded without reference.  No number will be given on copy of assignment from any other student.  Any sort of Plagiarism is not allowed at all.

 Course  

Work

The course work is a 2000 word miniresearch/essay Paper. The coursework count 20% of the final work including viva or presentation.

 Conventional

Encryption  Public-Key Encryption  Authentication.  Kerberos  Email Security  Ipsec  Web Security

 The

course aims to give students an introduction to the principles and practice of cryptography and authentication used for network Security.  Out comes:    

Describe the principle of crptoghraphy and its uses in the Internet. Describe the Principle of Public-key cryptography and its use in Internet. Explain message authentication and digital signatures. Explain the security protocols and methods used in the internet.

 Introduction      

Attacks, Services and Mechanism Security Services Security Attacks Security Mechanism A Model of Internet Security. Summary

 The

Transmission of Information is digital from the wide spread.  It will come more common as the usage of Internet/Mobile-phone Increases  The information can be quite sensitive (Medical records, bank account, addresses)  How can the information be “protected” from landing In transit or to be disclose to irrelative person.

 The 

course focus Mainly on internet Security

Which consists of measurement to    

Deter Prevent Detect And correct

 To

asses Security

Security Services  Security attacks  Security Mechanism 



Passive Attack  Release

of message contents.  Traffic Analysis Active Attack.    

Masquerade Replay Modification of Message Contents Denial of Service Attack.

 There

is no signal mechanism to provide information security.  However the element that underlies most of security mechanisms is the use of cryptographic techniques.  Cryptography is the art of secret writing, is a process of converting information, such as this slide, that can be read by most, into a secret code, that can only be read by those who are party to this secret.

A

cheque has a mechanism to provide the following. Authentication.  Non-repudiation.  Signature  Integrity Protection 

One or more security mechanism are combined to provide a security services

The course focuses mainly in internet security.  Secuirty is assessed by the attack, services and mechanism.  Severl security mechanism can be combined to provide as security service.  The main security machanism used in the internet are based on cryptographic techniques.  The terminology in encryption is Plain Text, ciphertext, encryption, decryption and key.  Different security mechanism protect againest different attacks. 

Related Documents

Lecture1
June 2020 19
Lecture1
November 2019 38
Lecture1
June 2020 14
Mathematics Lecture1
June 2020 0
Lecture1 Plc
May 2020 8
Noun Lecture1
June 2020 6