In this week we covered the following topics:
- X.800 Security Architecture
- Security Service
- Authentication
- Access Control
- Data Confidentiality
- Data Integrity
- Security Attacks
- Actice Attacks
- Passive Attacks
- Security Meshanism
- Selective
- Encipherment, Digital Signatures, Access Control, Routing Control, Data Integrity, Authentication Exchange, Traffic Padding, and Notarization
- Pervasive
- Trusted Functionality
- Security Audit Trials
- Disaster Recovery or Security Recovery
- Malware
- Viruses
- Worms
- Trojans
- Hoax
- Spyware
- Anual Rate of Occurence ARO
- Single Loss Expectensy SLE
- Annual Loss Expectancy ALE
No comments:
Post a Comment