jagomart
digital resources
picture1_Ppt For Information Security 73336 | Topic10 A Model For Network Security


 164x       Filetype PPTX       File size 1.04 MB       Source: vulms.vu.edu.pk


File: Ppt For Information Security 73336 | Topic10 A Model For Network Security
a model for network security objectives of the topic after completing this topic a student will be able to describe a model for network security 2 a model for network ...

icon picture PPTX Filetype Power Point PPTX | Posted on 01 Sep 2022 | 3 years ago
Partial capture of text on file.
             A Model For Network Security
                                     Objectives of the 
                                     Topic 
                                     • After completing this 
                                       topic, a student will 
                                       be able to
                                        –describe a model 
                                          for network 
                                          security.
                                                                  2
             A Model For Network Security
                                     Figures and material 
                                     in this topic have 
                                     been
                                     • adapted from 
                                       “Network Security 
                                       Essentials: 
                                       Applications and 
                                       Standards”, 2014, by 
                                       William Stallings.
                                                                  3
              A Model For Network Security
                                     • Assume a message is 
                                        to be transferred from 
                                        one party to another 
                                        across some sort of 
                                        Internet service. 
                                     • The two parties, who 
                                        are the principals  in 
                                        this transaction, must 
                                        cooperate for the 
                                        exchange to take 
                                        place. 
                                                                   4
             A Model For Network Security
                                     • A logical information 
                                       channel is established 
                                       by defining a route 
                                       through the Internet 
                                       from source to 
                                       destination and by the 
                                       cooperative use of 
                                       communication 
                                       protocols (e.g., 
                                       TCP/IP) by the two 
                                       principals.
                                                                  5
              A Model For Network Security
                                     • To protect the 
                                        information from an 
                                        opponent who may 
                                        present a threat to 
                                        confidentiality, 
                                        authenticity, and so 
                                        on, security comes 
                                        into play.
                                     • All of the security 
                                        techniques have two 
                                        components:
                                                                   6
The words contained in this file might help you see if this file matches what you are looking for:

...A model for network security objectives of the topic after completing this student will be able to describe figures and material in have been adapted from essentials applications standards by william stallings assume message is transferred one party another across some sort internet service two parties who are principals transaction must cooperate exchange take place logical information channel established defining route through source destination cooperative use communication protocols e g tcp ip protect an opponent may present threat confidentiality authenticity so on comes into play all techniques components...

no reviews yet
Please Login to review.