Wednesday, July 29, 2009

WEEK 2 (IT SECURITY)

LECTURE 2 (20 July 2009)

The topic of this lecture is Authentication and Basic Cryptography. This week I only learn about Authentication. Authentication is related to identity verification. Identity verification is classifications by something known (password), by something possessed (smart card), by physical characteristics (biometrics) like finger print and by a result of involuntary action like signature. Authentication also is a process for identifying and verifying who is sending a request. This is a general process of authentication.
(1) The sender obtains the necessary credential.
(2) The sender sends a request with the credential to the recipient.
(3) The recipient uses the credential to verify the sender truly sent the request.
(4) If yes, the recipient processes the request. If no, the recipient rejects the request and responds accordingly

In this topic I also learn how to choosing a good password and techniques for guessing passwords. Criteria to choose password is the password must hard to guess but easy o remember. The characteristics of good password are not shorter than six characters and mix all of the character. There are many techniques for guessing passwords which is you try default password, you also can all short words, 1 to 3 characters long, you also can collect all information about the user like date of birth, hobbies, family name, plat number and so on. You also can use a Trojan horse to guessing passwords.


LAB 2 (21 July 2009)

The topic of this lab is The Goal of Information Technology Security. End of this section i must know what is information tecnology security goals. I also must know how to determine if partition is NTFS or FAT32. I must implementing confidentiality, integrity and availability in Windows Server 2003.

Information technology security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction. The goals of information technology security are Confidentiality, Integrity and Availability. Confidentiality provides protection to computer related assets from being used by unauthorized user. Integrity ensures data can be modified by authorized parties and by authorized mechanism only. Availability makes sure authorized user can access information at any time without any failure.

The relationship between the three goals.

No comments:

Post a Comment