Security

Tom Kelliher, CS42

Dec. 6, 1996

  1. What is being secured?
    1. Data.

    2. Systems: software integrity and hardware.

  2. ``Security through obscurity.''

  3. Attacks:
    1. Trojan horse.

    2. Worms, viruses.

    3. Denial of service.

    4. Trap door.

  4. Authentication.

  5. Encryption (secure communication, digital signatures):
    1. DES.

    2. Clipper chip.

    3. Public key cryptography.



Thomas P. Kelliher
Fri Dec 6 12:15:22 EST 1996
Tom Kelliher