StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

Principles of Computer Security - Coursework Example

Comments (0) Cite this document
Summary
The paper "Principles of Computer Security" traces concepts and terms related to cryptography, intrusion detection systems, standards and protocols, public and private keys, and hardening of the network. Hence, suitable methods to overcome hackers' challenges become a part of computer security…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
Principles of Computer Security
Read Text Preview

Extract of sample "Principles of Computer Security"

Download file to see previous pages Cryptography is the process used in computer engineering used for providing secure communication to avoid interception of the message by unauthorized parties. A number of tools and devices are available and these are discussed as below (Schneier, p. 45-49).

Hashing: In cryptography, the hash function is an algorithm that picks up a data block, and in return gives a bit string of a fixed size called the hash value. This means that any attempt to change or crack the hash code will not succeed.

Symmetric Encryption: Also called the private key, this is a type of cryptography algorithm that identical keys to encrypt and decrypt. The party that sends the message has the same key and the party that wants to decrypt the message must have the same key.

Public-key infrastructure - PKI refers to the infrastructure made of software, policies hardware, procedure, and other assets that are used to create, distribute, and manage digital certificates. It binds public keys with specified user identities by using the certificate authority (Bosworth and Kabay, p. 34-38).

Certification Authority - CA refers to the issuing authority for digital certificates. These certify the ownership of a public key for a person so that other parties can use the signatures to form a trusted relationship.

Registration Authorities - RA is the agency that maintains the set of international standard codes and issues new ones for parties that register with them. For Internet applications, it is the Internet Assigned Numbers Authority.

Trust and Certificate Verification is used to verify the authenticity of digital certificates that are offered by a party. Crypto API is used to verify if a party that offers a certificate is really the owner and if the certificate is authentic or forged.

Private Key Protection is protected on a user's computer by storing it in the root directory of documents, settings, user name, application data, Microsoft, crypto, RSA folder. 128-bit encryption is used for protection.

4. Standards and Protocols
A protocol refers to a set of steps that must be followed to complete the required tasks. ...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Principles of Computer Security Coursework Example | Topics and Well Written Essays - 1500 words, n.d.)
Principles of Computer Security Coursework Example | Topics and Well Written Essays - 1500 words. https://studentshare.org/information-technology/1785749-principles-of-computer-security
(Principles of Computer Security Coursework Example | Topics and Well Written Essays - 1500 Words)
Principles of Computer Security Coursework Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/1785749-principles-of-computer-security.
“Principles of Computer Security Coursework Example | Topics and Well Written Essays - 1500 Words”. https://studentshare.org/information-technology/1785749-principles-of-computer-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Principles of Computer Security

Computer Security

...Principles of Computer Security... Principles of Computer Security... In these papers ‘Why information security is hard’ by Ross Anderson and ‘The economics of information security’ by Ross Anderson and Tyler Moore wesee how a lot has been said about the lack of information security mechanisms to shield end users from scams and privacy violations. We also see aspects such as monopolistic gain, price discrimination and risk dumping as key drivers behind security system design. Furthermore it is brought to our attention how recent developments in economics of information security have led to the realization that a failure in security is caused as much by bad incentives as by bad design. To understand the nature of this proverbial beast we must take ...
3 Pages (750 words) Essay

Computer Security

...Principles of Computer Security... Principles of Computer Security... in the two papers with respect to approaches and conclusions The paper ed by MacCarthy on Information Security Policy in the U.S. Retail Payments Industry is a thorough analysis of the security policies which incorporates and evaluates the legal doctrines embraced by the players in the industry with regards to information security. The information security policies are evaluated as an economical idea; incorporating the impact of externalities which create inefficiencies and undermine incentives for investments in information security. The paper carefully examined the impact of various acts and laws such as PCI (Payment Card Industry Security Standards) on the various players in ...
3 Pages (750 words) Essay

Computer security

...Principles of Computer Security... Principles of Computer Security... Computer Security Program Matriculation number Word Count: 1526 words Contents 3 Introduction 4 IdentifyingThreats and Vulnerabilities 4 Examination of the Security Principles Broken 4 Recommendations 5 References 7 Abstract Computer security refers to the minimization of vulnerabilities to assets and resources. There is no such thing has 100% security, although one can get close to it. The case study provides an example of how security lapses can occur and expose the system’s vulnerabilities. This paper looks into the threats and vulnerabilities that the event exposed and examines the security principles that were broken. It also provides recommendations for them. Threats to...
6 Pages (1500 words) Essay

Computer Security

...Principles of Computer Security... Principles of Computer Security... you change your social network setting after these readings? How can social networks disclose health information? What are the possible negativeconsequences of this? With the review of the provided literature the fact that social networking and the pleasure that one derives from being a part of a virtual community might come at a price is brought to light. To update your privacy settings or to at the very least review the privacy policies of social communities that you are members of is a necessary precaution. This is mainly due to the fact that although online social networks offer exciting new opportunities for interaction and communication but due to their vast membership...
2 Pages (500 words) Essay

Computer Security

...Principles of Computer Security... Principles of Computer Security... Return to the discussion of how spam has or has not changed the infrastructure. Has this changed your perspective? What could incent ISPs to improve detection in terms of architecture and disclosure? How might that empower attackers? My perspective has greatly changed when I look at the effect that spam has had on the infrastructure of technology. Spam, spyware, identity and data theft are a form of technological abuse that have brought along noticeable shifts in the technological infrastructure. Spyware the term loosely describes a new class of computer software that may track user activities online and offline, provide targeted advertising and engage in other types of...
2 Pages (500 words) Essay

Proposing a Solution

3 Pages (750 words) Essay

Computer Security

...Principles of Computer Security... Principles of Computer Security... Introduction Computer networking has been developed over the years and this has brought many advantages in the today's business society. With computer networks, it is possible to share resources and information. Information can be stored in a common location and this location be put in a network where everyone who can access the network will have the chance to access it and therefore save them the trouble of having to look for that information and carry it using external storage devices. The network also makes it possible to share resources like printers and hard drives. This therefore reduces costs for of having to buy these resources. Proposed client-tier architecture The...
4 Pages (1000 words) Essay

Successful information security management

Security incident management facilitates the development of security incident handling and planning including preparation for detection and reply to information security issues. The standard of the incident management primarily relates to ensure the existence of processes rather than the contents of these procedures. The security incident of different computing systems will have dissimilar effects and escort to different consequences, bureau, departments the Internal Revenue Service need to tailor the security incident handling plan according to specific operational requirements. Internal Revenue Service invests enormous money to buy and install computing equipments for securing their networks. Information systems security is a...
9 Pages (2250 words) Research Paper

Computer security

...Principles of Computer Security... Principles of Computer Security... Report on Computer security for Oracle Inc Report of the Topic The topic reports that computer security is an essential aspect that Oracle Corporation emphasizes to the users to enable them avoid cases of hacking. Oracle Corporation is the world’s principal software company for the database enhancement. The article is significant since it exposes aspects about hacking as a grave offense that can affect the reliability and status of an individual or an organization. In March 2011, Oracle experienced this crisis when its Website was hacked by Cernaianu Manole Razvan (Lennon, 2012). This made the users of the Website encounter difficulty in accessing data from their website. Every ...
1 Pages (250 words) Essay

Computer Security

...Principles of Computer Security... Principles of Computer Security... Computer Security Program Matriculation number Word Count: 1526 words Contents 3 Introduction 4 Identifying Threats and Vulnerabilities 4 Examination of the Security Principles Broken 4 Recommendations 5 References 7 Abstract Computer security refers to the minimization of vulnerabilities to assets and resources. There is no such thing has 100% security, although one can get close to it. The case study provides an example of how security lapses can occur and expose the system’s vulnerabilities. This paper looks into the threats and vulnerabilities that the event exposed and examines the security principles that were broken. It also provides recommendations for them. Threats to t...
6 Pages (1500 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic Principles of Computer Security for FREE!

Contact Us