Nội dung text Module-3-Lecture.pdf
Introduction to Cryptography Ismail Hassan Ismail Hassan Lecture slides are Licensed under (CC BY-NC-ND 4.0)
Learning Outcomes After completing the module, the student is expected to have achieved the following learning outcomes: I Describe the purpose of cryptography. I Have knowledge of the following terms: I Plain-text cipher-text, cryptanalysis, cryptographic algorithm, Encryption Key, Kerckhoffs’s principle, substitution, transposition, One-Time Pad and Random Number Generators. I Understand how some Classical Cryptography have been used. I Explain the difference between Symmetric and Asymmetric algorithms I Understand and explain the application of hash functions I Understand and explain the application of Stenography: Ismail Hassan Lecture slides are Licensed under (CC BY-NC-ND 4.0)
How can we safeguard our assets? We need a systematic way I Identify I Assets - (Inventory system, Asset Management). I Potential threats - (Threat modeling, Risk Assessment) I Prevent I Block attacks - (Authentication, Access Control, Encryption, Firewall). I ”Reduce” vulnerabilities - (Static/Dynamic Code Analysis, software updates, Vulnerability scans, Penetration testing) I Detect I When an incident happens or shortly after - (Monitoring systems, logs, Malware scan, Intrusion Detection systems, Integrity checksums/hashes, digital signatures) I Respond I Be able to respond to stop attacks and prevent further damage - (Intrusion Prevention systems, shutting down and rebuilding the system). I Recover I Correct copy of the data can be reloaded from backup. Ismail Hassan Lecture slides are Licensed under (CC BY-NC-ND 4.0)
What is Cryptography? Cryptography is a Greek word meaning hidden text or writing: I Crypto = Hidden I Graphy = Writing or text Ismail Hassan Lecture slides are Licensed under (CC BY-NC-ND 4.0)