SLIDE 1
Last tim e
- Cryptography
- Authentication
- Key Management
– KDC – Symmetric keys – Asymmetric keys – PKI
- Security Protocols
Com puter Security Part Four Last tim e Cryptography - - PDF document
Com puter Security Part Four Last tim e Cryptography Authentication Threats Key Management KDC Policy Symmetric keys Specification Asymmetric keys PKI Design Security Protocols Kerberos
Access channel
Information system
Computing resources (processor, memory, I/O) Data Processes Software Internal security controls
Opponent
Human Software
Gatekeeper function