计算机网络安全技术与实施(旧) 思科网络学院CCNA Security资源 第7章加密.pptx

计算机网络安全技术与实施(旧) 思科网络学院CCNA Security资源 第7章加密.pptx

  1. 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
  2. 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  3. 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
加密Managing Administrative AccessA network LAN can be secured through:Device hardeningAAA access controlFirewall featuresIPS implementationsHow is network traffic protected when traversing the public Internet? Using cryptographic methodsSecure Communications Requires …AuthenticationIntegrityConfidentialityAuthenticationAuthentication guarantees that the message:Is not a forgery.Does actually come from who it states it comes from.Authentication is similar to a secure PIN for banking at an ATM. The PIN should only be known to the user and the financial institution. The PIN is a shared secret that helps protect against forgeries. AuthenticationData nonrepudiation is a similar service that allows the sender of a message to be uniquely identified. This means that a sender / device cannot deny having been the source of that message. It cannot repudiate, or refute, the validity of a message sent. IntegrityData integrity ensures that messages are not altered in transit. The receiver can verify that the received message is identical to the sent message and that no manipulation occurred.European nobility ensured the data integrity by creating a wax seal to close an envelope. The seal was often created using a signet ring. An unbroken seal on an envelope guaranteed the integrity of its contents. It also guaranteed authenticity based on the unique signet ring impression.ConfidentialityData confidentiality ensures privacy so that only the receiver can read the message. Encryption is the process of scrambling data so that it cannot be read by unauthorized parties. Readable data is called plaintext, or cleartext.Encrypted data is called ciphertext. A key is required to encrypt and decrypt a message. The key is the link between the plaintext and ciphertext. Managing Administrative AccessAuthentication, integrity, and confidentiality are components of cryptography. Cryptography is both the practice and the study of hiding information.It has been used for centuries to protect secret d

您可能关注的文档

文档评论(0)

WanDocx + 关注
实名认证
内容提供者

大部分文档都有全套资料,如需打包优惠下载,请留言联系。 所有资料均来源于互联网公开下载资源,如有侵权,请联系管理员及时删除。

1亿VIP精品文档

相关文档