+ All Categories

Ch27

Date post: 24-Dec-2014
Category:
Upload: idris-usmani
View: 129 times
Download: 3 times
Share this document with a friend
Description:
 
Popular Tags:
13
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001 Chapter 27 Network Security
Transcript
Page 1: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Chapter 27

NetworkSecurity

Page 2: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 27-1

Aspects of security

Page 3: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 27-2

Secret key encryption

Page 4: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 27-3

Public key encryption

Page 5: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 27-4

Combination

Page 6: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 27-5

Signing the whole document

Page 7: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 27-6Signing the digest

Page 8: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 27-7

Sender site

Page 9: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 27-8Receiver site

Page 10: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 27-9

PGP at the sender site

Page 11: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 27-10

PGP at the receiver site

Page 12: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 25-11

Access authorization with secret key encryption

Page 13: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 25-12

Access authorization with public key encryption


Recommended