Cryptography and Network Security Behrouz ch01 Slides
Cryptography and Network Security Behrouz ch01 Slides
Introduction
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1.1
Chapter 1
Objectives
❑ To define three security goals
❑ To define security attacks that threaten security
goals
❑ To define security services and how they are
related to the three security goals
❑ To define security mechanisms to provide security
services
❑ To introduce two techniques, cryptography and
steganography, to implement security mechanisms.
1.2
1-1 SECURITY GOALS
1.3
1.1 Continued
Figure 1.1 Taxonomy of security goals
1.4
1.1.1 Confidentiality
1.5
1.1.2 Integrity
1.6
1.1.3 Availability
1.7
1-2 ATTACKS
1.9
1.2.1 Attacks Threatening Confidentiality
1.10
1.2.2 Attacks Threatening Integrity
1.11
1.2.3 Attacks Threatening Availability
1.12
1.2.4 Passive Versus Active Attacks
1.13
1-3 SERVICES AND MECHANISMS
1.14
1.3.1 Security Services
Figure 1.3 Security services
1.15
1.3.2 Security Mechanism
Figure 1.4 Security mechanisms
1.16
1.3.3 Relation between Services and Mechanisms
1.17
1-4 TECHNIQUES
1.18
1.4.1 Cryptography
1.19
1.4.2 Steganography
1.20
1.4.2 Continued
1.21
1-5 THE REST OF THE BOOK
1.22