100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Class notes

COMPUTER SECURITY AND CRYPTOGRAPHY

Rating
-
Sold
-
Pages
37
Uploaded on
04-10-2023
Written in
2023/2024

This document includes various ways to mitigate cyberattacks and how to conduct system audits and cryptography

Institution
Course











Whoops! We can’t load your doc right now. Try again or contact support.

Connected book

Written for

Course

Document information

Uploaded on
October 4, 2023
Number of pages
37
Written in
2023/2024
Type
Class notes
Professor(s)
Proffessor ron
Contains
All classes

Subjects

Content preview

1




JOMO KENYATTA UNIVERSITY OF AGRICULTURE AND TECHNOLOGY

BBIT 4.1

COMPUTER SECURITY AND CRYPTOGRAPHY


ICS 2411


MR. RON MUHANDE

, 2




GROUP D MEMBERS



NAME REGISTRATION NO. CLASS NO.


1. Christine Atieno Omollo HDB212-0206/2020 99

2. Momanyi Prudence Bosibori HDB212-0310 /2020 61

3. Mahalia Gitau HDB212-0283/2020 89

4. Ngigi Caroline Njango HDB212-0254/2020 72

5. Purity Moraa Makori HDB212-0360/2020 98

6. Jeremy Mwangi HDB 212-0757/2020 115

7. Anthony Kabuthu HDB212-0229/2020 137

8. Fredrick Ng'ang'a HDB212-0752/2020 108

9. Simon Mwangi HDB212-0213/2020 80

10. Wilfred Nyakweba HDB212-0326/2020 39

11. Anne Nakhabi Wakhungu HDB212-0288/2020 149

12. Isanya Faith Itsutsa HDB212-0325/2020 60

13. Kabue Rita Nkatha HDB212-0285/2020 88

14. Ndung'u Joseph Kori HDB212-0338/2020 109

15. Emmanuel Muthomi HDB212-0731/2020 38

16. Keziah Gathigia HDB212-0650/2020 160

, 3


TABLE OF CONTENTS

Contents
GROUP D MEMBERS....................................................................................................................2

TABLE OF CONTENTS.................................................................................................................3

FIREWALL AND FIREWALL PROTECTION.............................................................................5

What does a firewall do................................................................................................................5

How does a firewall work............................................................................................................5

Types of firewalls.........................................................................................................................5

Risks of not having a firewall....................................................................................................10

DOMAIN NAME SYSTEM ATTACKS (DNS)..........................................................................11

Types of DNS attacks.................................................................................................................11

How to prevent DNS attacks......................................................................................................14

INTRUSION DETECTION...........................................................................................................18

Definition...................................................................................................................................18

Examples of intrusions in cryptography include:.......................................................................18

Detection Types/ Techniques.....................................................................................................19

Types of IDS’S...........................................................................................................................20

Functions of Intrusion Detection................................................................................................20

Benefits of intrusion detection systems......................................................................................21

False Positives and Negatives....................................................................................................22

Advantages of IDS.....................................................................................................................23

Disadvantages of IDS.................................................................................................................23

, 4


Capabilities of intrusion detection systems................................................................................24

................................................................................................................................................25

Intrusion Prevention System (IPS).............................................................................................25

Techniques to evade IDS systems..............................................................................................25

Challenges associated with intrusion detection systems (IDS)..................................................26

SECURITY ASSURANCE AND AUDITING.............................................................................27

Definition...................................................................................................................................27

Security assurance..................................................................................................................27

Auditing..................................................................................................................................27

Objectives of Conducting a System Audit:................................................................................28

Security Assurance Program.....................................................................................................28

SYMMETRIC VS ASYMMETRIC CIPHERS............................................................................31

Definition of terms.....................................................................................................................31

Symmetric ciphers......................................................................................................................31

Asymmetric ciphers....................................................................................................................32

Differences between Symmetric and Asymmetric Ciphers.......................................................32

CLASSICAL AND INTRUSION TECHNIQUES.......................................................................34

Definition...................................................................................................................................34

Common Classical Techniques:.................................................................................................34

Common Intrusion Techniques:.................................................................................................35

How to Defend Against These Attacks:.....................................................................................36

REFERENCES..............................................................................................................................37
$9.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
yobrawhite

Also available in package deal

Get to know the seller

Seller avatar
yobrawhite Yale University
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
2 year
Number of followers
0
Documents
4
Last sold
-
Paper Trail pro

Welcome to Paper Trail Pro

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions