Warning:
JavaScript is turned OFF. None of the links on this page will work until it is reactivated.
If you need help turning JavaScript On, click here.
This Concept Map, created with IHMC CmapTools, has information related to: ch7, Crytography is the art of encoding in a format that only the intended recipient can access, Crytography provides the basis for most computer security mechanisms., threats and attacks are denial of service- flooding a channel or other resource with messages in order to deny access for others, Crytography prevents threats and attacks, threats and attacks are Message tampering - intercepting messages and altering their contents before passing them on to the intended recipient., threats and attacks are Leakage - the acquisition of information by unauthorized recipients., threats and attacks are Tampering - the unauthorized alteration of information, threats and attacks are Eavesdropping - obtaining copies of messages without authority, Security is Crytography, threats and attacks are replaying - storing intercepted messages and sending them at a later date. This attack may be effective even with authenticated and encrypted messages., threats and attacks are masquerading - sending or recieving messages using the identity of anotherprincipal without their authority., threats and attacks are Vandalism - interferance with the proper operation of a system without gain to the perpetrator., Message tampering - intercepting messages and altering their contents before passing them on to the intended recipient. an example is The man in he middle attack an attacker intercepts the very first message in an exchange of encryption keys to establish a secure channel. the attacker substitutes compromised keys to enable him to decrypt subsequent messages before reencrypting them in the correct keys and passing them on.