mirror of
https://github.com/jackyzha0/quartz.git
synced 2025-12-27 06:44:07 -06:00
vault backup: 2022-08-16 13:40:13
This commit is contained in:
parent
aa9ed14b46
commit
62bb2326ce
50
content/notes/07-cryptography-applications.md
Normal file
50
content/notes/07-cryptography-applications.md
Normal file
@ -0,0 +1,50 @@
|
|||||||
|
---
|
||||||
|
title: "07-cryptography-applications"
|
||||||
|
aliases:
|
||||||
|
tags:
|
||||||
|
- comp210
|
||||||
|
- lecture
|
||||||
|
---
|
||||||
|
|
||||||
|
|
||||||
|
interest doesn't have low level security
|
||||||
|
- this would decrease compatibility
|
||||||
|
- easier to add this at hosts and software layer
|
||||||
|
|
||||||
|
# Layer model
|
||||||
|
- each layer of network hides information about lower levels and adds information for higher levels\
|
||||||
|
- transmission is only at physical layer
|
||||||
|
|
||||||
|
OSI model - more complicated but most common
|
||||||
|
|
||||||
|
TCP model
|
||||||
|
- application (http etc)
|
||||||
|
- transport (tcp etc)
|
||||||
|
- network (IP)
|
||||||
|
- data link (ethernet, wifi)
|
||||||
|
- physical layer
|
||||||
|
|
||||||
|
# End to end principle
|
||||||
|
- add "smarts" at the endpoints
|
||||||
|
- easier to change these than the middle
|
||||||
|
- keep middle simple, scalable, dumb
|
||||||
|
- KISS
|
||||||
|
|
||||||
|
# security not built in
|
||||||
|
- originall no security
|
||||||
|
- security was added
|
||||||
|
- http -> https
|
||||||
|
- ssl (secure socket layer) has been replaced by tls
|
||||||
|
- tls (transport layer security)
|
||||||
|
- ftp - sftp (file transfer)
|
||||||
|
- scp (secure copy)
|
||||||
|
- ssh (secure shell)
|
||||||
|
|
||||||
|
# security certificates
|
||||||
|
- client needs to authenticate the server
|
||||||
|
- also vice versa
|
||||||
|
- need to establish secure connection
|
||||||
|
- trusted third parties are used to sign server host's certificates
|
||||||
|
- "tree of trust"
|
||||||
|
- based on public key crypto
|
||||||
|
|
||||||
@ -30,4 +30,5 @@ No final exam
|
|||||||
- [03-threats-social-engineering-and-failures](notes/03-threats-social-engineering-and-failures.md)
|
- [03-threats-social-engineering-and-failures](notes/03-threats-social-engineering-and-failures.md)
|
||||||
- [04-authentication-authorisation-passwords](notes/04-authentication-authorisation-passwords.md)
|
- [04-authentication-authorisation-passwords](notes/04-authentication-authorisation-passwords.md)
|
||||||
- [05-cryptography](notes/05-cryptography.md)
|
- [05-cryptography](notes/05-cryptography.md)
|
||||||
|
- [06-hashing-binary-public-key-cryptography](notes/06-hashing-binary-public-key-cryptography.md)
|
||||||
-
|
-
|
||||||
Loading…
Reference in New Issue
Block a user