Lecture Security and Control


TECHNOLOGIES AND TOOLS FOR SECURITY AND CONTROL



Download 0.85 Mb.
View original pdf
Page11/13
Date23.03.2021
Size0.85 Mb.
#56158
1   ...   5   6   7   8   9   10   11   12   13
securing information systems
TECHNOLOGIES AND TOOLS FOR SECURITY AND CONTROL
Firewalls, Intrusion Detection Systems, and
Antivirus Software (Continued)


Management Information Systems
Lecture 10 Security and Control
TECHNOLOGIES AND TOOLS FOR SECURITY AND CONTROL
A Corporate Firewall
Figure 10-7


Public key encryption:
Uses two different keys, one
private and one public. The keys are mathematically
related so that data encrypted with one key can be
decrypted using only the other key

Message integrity:
The ability to be certain that the
message being sent arrives at the proper destination
without being copied or changed
Management Information Systems

Download 0.85 Mb.

Share with your friends:
1   ...   5   6   7   8   9   10   11   12   13




The database is protected by copyright ©ininet.org 2024
send message

    Main page