it is a variable value that is used by cryptographic algorithms to produce encrypted text or decrypt encrypted text.
The length of the key reflects the difficulty to decrypt from the encrypted message.
Cryptography is first appeared in closed commercial, financial network and military systems.
We can send/receive secure e-mail, connect to secure website to purchase goods or obtain services.
Problem: how do we implement them in this global open network, internet?
To what level of encryption is sufficient to provide safe and trust services on the Net?
The Public Key Infrastructure enables users of an unsecured public network such as the internet to securely and privately exchange data through the use of a public and private cryptographic key pair that is obtained through a trusted authority.
A digital signature is basically a way to ensure that an electronic document (e-mail, spreadsheet, text file) is authentic.
This is NOT scanned signature!!
Authentic means that you know who created the document and you know that it has not been altered in any way since that person created it.
A message is generated between a 128-bit and a 256 bit through an algorithm. This generated number is then encrypted with the senders private key and added to the end of the message.
The recipient receives the message they run the message through the same hash algorithm and generate. They then decrypt the signature using the senders public key and provided the two numbers match they know the message is from who that is has not been modified.
Anti-virus software to ensure that malicious program such as worms and viruses do not damage or destroy vital information.
Anti-virus programs or utilities prevent viruses and recover the computer from them if the computer is infected.
Using intrusion detection software monitors the system and network resources and notifies of any unauthorized access.
The following are protocols that will help protect systems against hackers
Install string user authentication and encryption capabilities
Install the latest security patches
Disable guest accounts and null user accounts
Do not provide easy log in procedures for remote users.
Give an application its own server
Restrict physical access to the server
Turn audit trails on
Consider installing caller ID
Install a corporate Firewall
Install anti-virus software
conduct regular IS security audits
Verify and exercise frequent data backups for critical data.
No comments:
Post a Comment