Cryptography and Network Security (4th Edition)
1.8. Key Terms, Review Questions, and Problems
Key Terms
access control active threat authentication authenticity availability data confidentiality data integrity denial of service encryption integrity intruder masquerade nonrepudiation OSI security architecture passive threat replay security attacks security mechanisms security services traffic analysis Review Questions
Problems
|
Категории