Cryptography Algorithms, Protocols, and Standards for Computer Security
This book by Zoubir Mammeri provides an in-depth exploration of cryptography, focusing on algorithms, protocols, and standards essential for computer security. It covers fundamental concepts of cryptographic systems, including symmetric and asymmetric cryptosystems, cryptographic primitives, and cry...
Autor principal: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Newark :
John Wiley & Sons, Incorporated
2024.
|
Edición: | 1st ed |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009811319306719 |
Tabla de Contenidos:
- Cryptography
- Contents
- Preface
- 1 Introduction to Computer Security
- 1.1 Introduction
- 1.1.1 Why Do Attacks Occur?
- 1.1.2 Are Security Attacks Avoidable?
- 1.1.3 What Should Be Protected in Cyberspace?
- 1.1.4 Security vs Safety
- 1.1.5 Cybersecurity vs IT Security
- 1.2 Security Terms and Definitions
- 1.2.1 Assets and Attackers
- 1.2.2 Vulnerabilities, Threats, and Risks
- 1.3 Security Services
- 1.3.1 Confidentiality and Privacy
- 1.3.2 Integrity
- 1.3.3 Availability
- 1.3.4 Authentication and Authenticity
- 1.3.5 Non-repudiation and Accountability
- 1.3.6 Authorization
- 1.4 Attacks
- 1.4.1 Taxonomy of Attacks
- 1.4.1.1 Attacks According to Their Origin
- 1.4.1.2 Passive vs Active Attacks
- 1.4.1.3 Attacks According to Their Objectives
- 1.4.2 Taxonomy of Attackers
- 1.4.3 Malware Taxonomy
- 1.4.3.1 Virus
- 1.4.3.2 Worm
- 1.4.3.3 Trojan