INFORMATION SECURITY —–

1o Goals of information security

role of cyber security

why need security

 

Elements of information security—–

confidentiallty —

how to check confidentiallty?

Integrity—

how to check Integrity?

Availlability–

w

 

Authenticity–

Ensure the quality of being genuine?

checksum

 

Non repudiation–

when send msg put security code,insure message cannot deny,receive orginal msg send by sender

http–https

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………..

the security,functionality,and usability triangle

functionality one level

suppose you send msg to your friend,when you enter with msg one functionality(program) add with feature

usabitity second  level

given function how to used in gui interface or cli interface

security third  level

restrictions you send msg intend your friends only receive,don.t intercept other add security

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………..security challenges

#

Information security threat—-

 

 

 

 

 

 

 

types of attacks on a system —

Trends in security—–

Information security laws