Cloud Security Lecture 1
Cloud Security Lecture 1
Mohamed Loey
Course Details
Introduction
Computer Security
Key Properties
Cryptology
❑ Course Code : 212202.FCI.CIS604
❑ 10 => Attendance.
❑ 10 => Presentation
❑ Presentation
❑ Topics
❑ next slide.
• Kali Linux
• Amazon AWS Security
Course Details
Introduction
Computer Security
Key Properties
Cryptology
Cryptography : is the science of secret writing and is an ancient
art; the first documented use of cryptography in writing dates
back to 1900 B.C. when an Egyptian scribe used non-standard
hieroglyphs in an inscription (handwriting).
Course Details
Introduction
Computer Security
Key Properties
Cryptology
❑ Computer Security - generic name for the collection of tools
designed to protect data.
D W W D F N D W G D Z Q
❑ Assuring the receiver that the received message has not been
altered in any way from the original.
❑ The unique unbroken seal ensures no one has read the contents.
❑ Ensuring timely and reliable access to and use of information.
Introduction
Computer Security
Key Properties
Cryptology
❑ The Network layers security architecture focuses on:
➢ Security mechanism.
➢ Security service.
➢ Security attack.
❑ A process (or a device incorporating such a process) that is
designed to detect, prevent, or recover from a security attack.
Introduction
Computer Security
Key Properties
Cryptology
❑ Plaintext is the original message or data.
Introduction
Computer Security
Key Properties
Cryptology
Single use key: (one time key)
Introduction
Computer Security
Key Properties
Cryptology
❑ Cryptology: is the term referring to the wide study of secret
writing, and covered both cryptography and cryptanalysis.