Search Resources

6 Results

View
Selected filters:
  • Authentication
Cryptography
Unrestricted Use
CC BY
Rating

This course introduces cryptography by addressing topics such as ciphers that were used before World War II, block cipher algorithms, the advanced encryption standard for a symmetric-key encryption adopted by the U.S. government, MD5 and SHA-1 hash functions, and the message authentication code. The course will focus on public key cryptography (as exemplified by the RSA algorithm), elliptic curves, the Diffie-Hellman key exchange, and the elliptic curve discrete logarithm problem. The course concludes with key exchange methods, study signature schemes, and discussion of public key infrastructure. Note: It is strongly recommended that you complete an abstract algebra course (such as the Saylor FoundationĺÎĺ_ĺĚĺ_s MA231) before taking this course. Upon successful completion of this course, students will be able to: explain how symmetric and asymmetric key ciphers work; list and define cryptographyĺÎĺ_ĺĚĺ_s goals; list and define the most common classical ciphers; explain the workings of mechanical ciphers Enigma and Lorenz; describe the principles of substitution-permutation networks; describe the algorithms for data encryption and the advanced encryption standard; describe and use the MD5 and SHA-1 hash functions; explain the idea behind public key cryptography; use the RSA cryptography system by applying it to practical problems; test whether the large integer is prime with the mathematical tools presented in this course; define the elliptic curve and use it in cryptography; explain the Diffie-Hellman key exchange; describe the most common signature and autokey identity schemes; describe the conceptual workings of public key infrastructure. This free course may be completed online at any time. (Computer Science 409)

Subject:
Computer Science
Material Type:
Assessment
Full Course
Homework/Assignment
Lecture
Reading
Syllabus
Textbook
Provider:
The Saylor Foundation
Date Added:
04/16/2012
Remix
Database
Unrestricted Use
CC BY
Rating

Database Security is the utmost key part for any type of database, .for example financial information, personal information, employee information and enterprise information. This book will cover following topics such as creating and altering database user, password profiling, various privileges and virtual private database. All the topics are implemented by using oracle 11g software. Especially for readers this book will give clarity about database security concepts such as Authorization, Authentication and Access control. The practical part using oracle provides how to carry out database security concepts technically for the reader.

Subject:
Career and Technical Education
Material Type:
Full Course
Author:
Mumtaj Yasmin
Date Added:
08/08/2019
Remix
Database Security
Unrestricted Use
CC BY
Rating

Database Security is the utmost key part for any type of database, .for example financial information, personal information, employee information and enterprise information. This book will cover following topics such as creating and altering database user, password profiling, various privileges and virtual private database. All the topics are implemented by using oracle 11g software. Especially for readers this book will give clarity about database security concepts such as Authorization, Authentication and Access control. The practical part using oracle provides how to carry out database security concepts technically for the reader.

Subject:
Career and Technical Education
Material Type:
Full Course
Provider:
Higher College of Technology, Muscat, Oman
Author:
Girija Narasimhan
Date Added:
08/08/2019
Remix
Database Security -Exercise and Case study Solution
Unrestricted Use
CC BY
Rating

Database Security is the utmost key part for any type of database, .for example financial information, personal information, employee information and enterprise information. This book will cover following topics such as creating and altering database user, password profiling, various privileges and virtual private database. All the topics are implemented by using oracle 11g software. Especially for readers this book will give clarity about database security concepts such as Authorization, Authentication and Access control. The practical part using oracle provides how to carry out database security concepts technically for the reader.

Subject:
Computer Science
Material Type:
Activity/Lab
Case Study
Full Course
Interactive
Textbook
Unit of Study
Provider:
Higher College of Technology, Muscat, Oman
Author:
Girija Narasimhan
Date Added:
08/08/2019
Remix
Database Security -Lecture Notes(power point slides)
Unrestricted Use
CC BY
Rating

Database Security is the utmost key part for any type of database, .for example financial information, personal information, employee information and enterprise information. This book will cover following topics such as creating and altering database user, password profiling, various privileges and virtual private database. All the topics are implemented by using oracle 11g software. Especially for readers this book will give clarity about database security concepts such as Authorization, Authentication and Access control. The practical part using oracle provides how to carry out database security concepts technically for the reader.

Subject:
Career and Technical Education
Material Type:
Activity/Lab
Full Course
Interactive
Unit of Study
Provider:
Higher College of Technology, Muscat, Oman
Author:
Girija Narasimhan
Date Added:
08/08/2019
Information Security (06:03): Authentication
Only Sharing Permitted
CC BY-ND
Rating

Our third video in our Information Security series (part of the Introduction to Computer course) focuses on Authentication. Authentication is basically proving you are who you say you are

There are three forms of authentication
•Something you know
•Something you have
•Something about you

Subject:
Information Science
Business and Communication
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014