Copy of CSC 307- Lecture Note on Network Security
Copy of CSC 307- Lecture Note on Network Security
CSC 307
Why threat or cybercrime?
• Low cost of Internet usage
• High level of IT innovation/education
• Personal gain e.g. yahoo-yahoo hackers
• Covering of corruption e.g. burning of data,
computer room, building to prevent evidence
• Targets: data, storage device, web sites
How is threat performed
Types of Internet Threat
Threats…
Data encryption
• It means en-scrambling of data to make it meaningless to receiver
• A public key system assigns each entity a pair of keys. One of the
user’s keys, called the private key, is kept secret, while the other,
called the public key