Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Class notes

COMPUTER SECURITY AND CRYPTOGRAPHY

Rating
-
Sold
-
Pages
37
Uploaded on
04-10-2023
Written in
2023/2024

This document includes various ways to mitigate cyberattacks and how to conduct system audits and cryptography

Institution
Course

Content preview

1




JOMO KENYATTA UNIVERSITY OF AGRICULTURE AND TECHNOLOGY

BBIT 4.1

COMPUTER SECURITY AND CRYPTOGRAPHY


ICS 2411


MR. RON MUHANDE

, 2




GROUP D MEMBERS



NAME REGISTRATION NO. CLASS NO.


1. Christine Atieno Omollo HDB212-0206/2020 99

2. Momanyi Prudence Bosibori HDB212-0310 /2020 61

3. Mahalia Gitau HDB212-0283/2020 89

4. Ngigi Caroline Njango HDB212-0254/2020 72

5. Purity Moraa Makori HDB212-0360/2020 98

6. Jeremy Mwangi HDB 212-0757/2020 115

7. Anthony Kabuthu HDB212-0229/2020 137

8. Fredrick Ng'ang'a HDB212-0752/2020 108

9. Simon Mwangi HDB212-0213/2020 80

10. Wilfred Nyakweba HDB212-0326/2020 39

11. Anne Nakhabi Wakhungu HDB212-0288/2020 149

12. Isanya Faith Itsutsa HDB212-0325/2020 60

13. Kabue Rita Nkatha HDB212-0285/2020 88

14. Ndung'u Joseph Kori HDB212-0338/2020 109

15. Emmanuel Muthomi HDB212-0731/2020 38

16. Keziah Gathigia HDB212-0650/2020 160

, 3


TABLE OF CONTENTS

Contents
GROUP D MEMBERS....................................................................................................................2

TABLE OF CONTENTS.................................................................................................................3

FIREWALL AND FIREWALL PROTECTION.............................................................................5

What does a firewall do................................................................................................................5

How does a firewall work............................................................................................................5

Types of firewalls.........................................................................................................................5

Risks of not having a firewall....................................................................................................10

DOMAIN NAME SYSTEM ATTACKS (DNS)..........................................................................11

Types of DNS attacks.................................................................................................................11

How to prevent DNS attacks......................................................................................................14

INTRUSION DETECTION...........................................................................................................18

Definition...................................................................................................................................18

Examples of intrusions in cryptography include:.......................................................................18

Detection Types/ Techniques.....................................................................................................19

Types of IDS’S...........................................................................................................................20

Functions of Intrusion Detection................................................................................................20

Benefits of intrusion detection systems......................................................................................21

False Positives and Negatives....................................................................................................22

Advantages of IDS.....................................................................................................................23

Disadvantages of IDS.................................................................................................................23

, 4


Capabilities of intrusion detection systems................................................................................24

................................................................................................................................................25

Intrusion Prevention System (IPS).............................................................................................25

Techniques to evade IDS systems..............................................................................................25

Challenges associated with intrusion detection systems (IDS)..................................................26

SECURITY ASSURANCE AND AUDITING.............................................................................27

Definition...................................................................................................................................27

Security assurance..................................................................................................................27

Auditing..................................................................................................................................27

Objectives of Conducting a System Audit:................................................................................28

Security Assurance Program.....................................................................................................28

SYMMETRIC VS ASYMMETRIC CIPHERS............................................................................31

Definition of terms.....................................................................................................................31

Symmetric ciphers......................................................................................................................31

Asymmetric ciphers....................................................................................................................32

Differences between Symmetric and Asymmetric Ciphers.......................................................32

CLASSICAL AND INTRUSION TECHNIQUES.......................................................................34

Definition...................................................................................................................................34

Common Classical Techniques:.................................................................................................34

Common Intrusion Techniques:.................................................................................................35

How to Defend Against These Attacks:.....................................................................................36

REFERENCES..............................................................................................................................37

Connected book

Written for

Course

Document information

Uploaded on
October 4, 2023
Number of pages
37
Written in
2023/2024
Type
Class notes
Professor(s)
Proffessor ron
Contains
All classes

Subjects

$10.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
yobrawhite

Also available in package deal

Get to know the seller

Seller avatar
yobrawhite Yale University
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
2 year
Number of followers
0
Documents
4
Last sold
-
Paper Trail pro

Welcome to Paper Trail Pro

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions