Assignment
Assignment
Assignment
A1 Treat types:
A3 Information security:
Principles of confidentiality, integrity and availability of information
Unauthorised access or modification of information
Principle of minimal access to information or lowest required access permission to
be able to maximise protection
Deliberate or accidental loss of information
The need to protect intellectual property from theft or, malicious damage
o Personal information
o Bank account details
o Employment details
A4 Legal requirements:
Data Protection Act 1998
Computer Misuse Act 1990
Copyright, Designs and Patents Act 1988
Telecommunications (Lawful Business Practise) (Interception of Communications)
Regulations 2000
Fraud Act 2006
Legal liability and contractual obligations
B1 Cryptographic principles:
The principles and uses of encryption including
o Digital Rights Management
o Password storing and salts
o Obfuscation and steganography
o Secure transactions
o Two-factor authentication
o File, folder, disk encryption
o Encryption of communication data
Legal and ethical issues
Computing and ethical issues
B2 Cryptography methods:
Key cryptography methods:
o Shift ciphers
o One-time pads
o Hash functions MD4, MD5, SHA-2, SHA-3
o Stream ciphers
Cryptographic primitives:
o Pseudo random functions
o One-way functions
Cryptographic salts and their use in storing password
Encryption Algorithms
o RSA
o DES
o 3DES
Mathematical principles, integer factorisation, prediction of prime
Internal Threats
Internal threats – is