Thursday, 5 January 2012

First Weeks Conclusion

In this week we covered the following topics:
  • X.800 Security Architecture
    • Security Service
      • Authentication
      • Access Control
      • Data Confidentiality
      • Data Integrity
    • Security Attacks
      • Actice Attacks
      • Passive Attacks
    • Security Meshanism
      • Selective
        • Encipherment, Digital Signatures, Access Control, Routing Control, Data Integrity, Authentication Exchange, Traffic Padding, and Notarization
      • Pervasive
        • Trusted Functionality
        • Security Audit Trials
        • Disaster Recovery or Security Recovery
  • Malware
    • Viruses
    • Worms
    • Trojans
    • Hoax
    • Spyware
  • Anual Rate of Occurence ARO
  • Single Loss Expectensy SLE
  • Annual Loss Expectancy ALE

No comments:

Post a Comment