Skip to main content

Posts

Showing posts from July, 2014

Difference between symmetric and asymmetric encryption

About encryption- Encryption is used to ensure the confidentiality of data. For example, if you are sending an email (typically using an insecure medium), the email is prone to hacking/interception. The solution is to use encryption. The basic encryption process is as follows: The methods- Based on the purpose and complexity/simplicity two main types of encryption methods are used: 1. Symmetric encryption 2. Asymmetric encryption Pros and Cons of Symmetric encryption- In symmetric encryption, a public key is used for both encryption and decryption. Since the public key can be shared publicly, there is a high probability that if the key is hacked during transmission, it can be shared publicly. Therefore, key distribution problems arise when the key is shared over insecure mediums, such as the internet. Moreover, when more and more people join the conversation (the message/email transmission), the key management problems arise. Therefore, key management and key

Goals of computer security

What are the goals of computer security? The number of goals concerning computer security is highly debatable. However, every thoery that is been presented to date ensures three main types of goals: confidentiality, integrity and availability. In this blog post I have mentioned five types of security goals: confidentiality, integrity, availability, authenticity and non-repudiation / accountability. The following figure summarizes what each of these goals mean and who are involved with these goals and what needs to be done to ensure the goals' performance. Click on image to zoom Confidentiality- Confidentiality means that information or services should only be accessed by authorized personnel.  Click on image to zoom   Integrity-   Integrity means that information or services should only be modified by authorized personnel. Click on image to zoom Availability- Information or services should be available to authorized personnel when
DMCA.com Protection Status