Network Security Cryptography
Network Security Cryptography
• Lecture# 5
• Lecture Slides Prepared by:
• Dr. Syed Irfan Ullah
• Abasyn University Peshawar
Class Management
• Three Segments:
– Regular Class: 5:15 PM
– Revision of Previous Lectures: 5:30 PM-6:20
PM
– Test: 6:30 PM-7:00 PM
Securing a Network
• Key Distribution
Key Distribution
• For symmetric encryption to work, the two parties must share
the same key and that key must be protected from access by
others
© ©
Class Test(1)
• Q.1
– What is the OSI security architecture?
– Explain the difference between an attack surface and an
attack tree.
• Q.2
– Consider an automated cash deposit machine in which
users provide a card or an account number to deposit cash.
Give examples of confidentiality, integrity, and availability
requirements associated with the system, and, in each case,
indicate the degree of importance of the requirement.
Class Test(2)
• Q.3 For each of the following assets, assign a low, moderate, or high impact level for
the loss of confidentiality, availability, and integrity, respectively. Justify your answers.
a. A student maintaining a blog to post public information.
b. An examination section of a university that is managing sensitive information
about exam papers.
c. An information system in a pathological laboratory maintaining the patient’s
data.
d. A student information system used for maintaining student data in a university
that contains both personal, academic information and routine administrative
information (not privacy related). Assess the impact for the two data sets
separately and the information system as a whole.
e. A University library contains a library management system which controls the
distribution of books amongst the students of various departments. The library
management system contains both the student data and the book data. Assess the
impact for the two data sets separately and the information system as a whole.
Some other schemes also..
?
What….
Some other schemes also..
.
.
.
Self
.
.
Organizations that provide
key distribution Facility…?
Assignment…. Self
\Documents and Settings\< username >\Application
Data\Microsoft\Crypto\RSA……?