Sunday, December 22, 2019

Annotated Bibliography On Encryption And Cryptography

Contents 1 Cryptography 2 Introduction 2 Methods of encryption or cryptography. 2 Symmetric 2 Asymmetric 2 Operation and Working of Both Methods 3 Ingredients of symmetric encryption 3 Working of symmetric cryptography (Graphical Representation) 4 Ingredients of Asymmetric cryptography 4 Working principal of Asymmetric encryption (Graphical representation) 5 Strengths and Weaknesses of Both 6 Strength of Symmetric Encryption 6 Strength of Asymmetric Encryption 6 Weakness of symmetric encryption 6 Weakness of Asymmetric Cryptography 6 Use of Symmetric and Asymmetric cryptography in IT sector 7 2. VPN and Cryptography in VPN 7 Types of VPN 8 Site-To-Site VPN 9 Remote Access VPN 9 3. Authentication of Users in Windows Environment 10 Integrated Windows Authentication 10 Basic Authentication 10 Digest Authentication 11 4. Kerberos Protocol 11 Kerberos V5 Protocol Standard 12 Encryptions used by the Kerberos v5 protocol 12 Helping Hands (web references) 13 1 Cryptography Introduction The concept of securing the messages through cryptography has a long history. The word cryptography stems from the two Greek words â€Å"crypto† and â€Å"grafein† meaning â€Å"hidden† and â€Å"write† respectively. Julius Caesar is credited with creating one of the earliest methods of cryptography system to send the message to his generals. Cryptography simply means to encrypt your message into something else so that nobody can read it that is not authorised to read the information. Only that person canShow MoreRelatedA Research on the Internal Control for Information Security3378 Words   |  13 Pagesï » ¿Internal Control for Information Security PLEASE PUT THE TOPIC DEFINITION STATEMENT HERE AT THE FIRST PAGE PLEASE PUT THE ANNOTATED BIBLIOGRAPHY AT THE LAST PAGE BEFORE THE REFERENCE PAGE Introduction Control is a set of mechanism that assists an organization to attain the desired objective. Control is fundamental to achieve organizational goal, and control aligns the aspiration of workforce with their capabilities. On the other hand, internal control for information security is the practiceRead MoreAnnotated Bibliography: Internal Control for Information Security1614 Words   |  7 PagesInternal Control for Information Security: Annotated Bibliography Making the case for Network Security. (2012, Apr 19). Retrieved from Wikibon Blog: http://wikibon.org/blog/making-the-case-for-network-security/ This author addresses the central concerns regarding information security in the modern business world using broad strokes to make the importance of network security as a key business operation readily apparent to the reader. As the article is addressed primarily on business managers and

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.