IS Chapter1
IS Chapter1
INTRODUCTION
Reference Book
• With the introduction of computers, the need for automated tools for
protecting information's and files has become evident.
• They are
Security Attack
Security Mechanism
Security Service
Service
- role management
- rule management
• Role management- focuses on user side
- Which user can do what
1. General view
2. Technical view
Attacks :General view
• Classified in to three
1. Criminal attacks
2. Publicity attacks
3. Legal attacks
Criminal attacks
• It is an attack on availability
• They are
Passive attacks
Active attacks
Passive Attacks
• It is easy to understand
Masquerade
Replay
Modification of messages
Denial of services
Masquerade
• It is a Electronic Signature
In that case
- A uses his own private key to encrypt the message.
- When B receives the message he can decrypt it with
A’s public key.
• A’s private key is kept secret
• So no one else can create a message that can be
decrypted by A’s public key
• Therefore the entire encrypted message serve as
digital signature
• It is impossible to alter the message without A’s
private key and thus the message is secure
• The signature depends on the contents of the
message and if the content is modified the signature
will not match
• Digital signature provide two functions
• The value will be encrypted with the key and is send back
to the source