ITdudu M1 Introduction
ITdudu M1 Introduction
Module I
IT425: Information and Cyber Security
Contents
• Availability.
• Denial of service
4. Specify a protocol to be used by the two principals that makes use of the
security algorithm and the secret information to achieve a particular
security service
• An internal control, monitoring the internal system activities analyzes the stored information and
detects the presence of unauthorized users or intruders.
1.
Internet Standards
• INTERNET ARICHITECTURE BOARD (IAB): Responsible for
defining the overall architecture of the internet, providing guidance
and broad direction to IETF
• INETRNET ENGINEERING TASK FORCE (IETF): The protocol
engineering and development arm of the internet
• IETF carry out actual development of new standards and
protocols for the internet
• responsible for publishing the RFC’S with approval of
IESG.
• INTERNET ENGINEERING STEERING GROUP (IESG):
Responsible for technical management of IETF activities and the
internet standards process
• IESG may approve the draft as an RFC or else it is
withdrawn from directory,
• IESG decides which RFC’s become internet standard based on
IETF recommendations. To become a standard, a specification
must meet the following criteria.
• BE stable and easily understandable
• Be technically competent
• Have multiple, independent and interoperable implementations
with substantial operations experience.
• Enjoy significant public support.
• Be recognizably useful in some or all parts of internet