Sunteți pe pagina 1din 21

• Military base 1 wants to send a

trade secret to Military Base 2

• They do not want anyone to


know
It is composed of CA, certificates, software, services and
other cryptographic components, for the purpose of
enabling authenticity and validation of data.

Digital signatures, encryption


CA issuing
user certificates

CA

CA CA

Certificates Software Services Other Cryptographic


Components
• Full credential life-cycle management
• Self-service reduce help desk call
• Enhance security
User with Device with
Certificate Certificate
CA
Validates
Issues and accepts
certificate certificate

Presents
certificate

Certificate Client
Holder
G7JDZL L539CZ AA9CZ1
ZPQ12G 93L12B LP7FFH
18ABHU UJ14A9 334FYO
K71TYP CS3314 566HHX
SAPRW1 SP563S 3F8Y0K
PVF129 A7V8TT ADL10M
N031M1 LAE3FB 1L598X
RX0FYT LM2HU5 GT610A
I5581Z QH1UNB 9JB70W
Plaintext Encryption Ciphertext

Ciphertext Decryption Plaintext


Plaintext
Original Encrypted
Cipher
Information Information

= Two
Letters
Following
Decrypts Data

Encrypts Data

Same Key on Both Sides


Public Key Private Key Decrypts
Encrypts
Sender Receiver
For messages to be exchanged, the sender and receiver need the right
cryptographic keys

Symmetric Asymmetric cipher:


cipher: Same Each other’s public
key key
Hash Value of Hash Value
Signature Matches
Authentication
- proving you are who you say you are
- protects data or system from unauthorized access

Multi-factor Authentication
- more secure authentication scheme that requires at
least 2 authentication factors
Password

ID Card
• Something you are (Inherence)
• Fingerprints, handprints, or retinal patterns
• Something you have (Possession) Password
• Key or ID card
• Something you know (Knowledge) 24.213.151.4

• Password or PIN
• Somewhere you are or are not
• IP address or GPS
• Something you do
• Keystroke patterns
 Prevention
 Detection
 Recovery
Likelihood: Rare
Damage: Moderate

Disgruntled Former Threat of Improper


Employees Access
Intentional or
unintentional

Information Security Threats

Changes to Interruption of Interruption of Damage to Damage to


Information Services Access Hardware Facilities
Attacker Unsecured Router Information System

S-ar putea să vă placă și