Page 131 - CISSO_Prep_ Guide
P. 131

Another way to attack cryptosystems is to find mathematical
            weaknesses in the algorithm, such as algebraic flaws that may
            allow a person to manipulate the cryptographic operation.

            A cryptanalyst may make a cipher-text only attack that examines
            samples of ciphertext and attempts to decode the messages.
            They may also measure the exact timing and power used by the
            cryptosystem to do the encryption or decryption process and
            learn information about the behaviors of the system from that
            data.




            Summary of Cryptography
            The security manager should know the strengths and
            weaknesses of symmetric and asymmetric algorithms, the
            methods of message integrity, the purpose of certificates, and
            how the various components of cryptography are used and work
            together.



            Access Controls
            Access control can be described as the heartbeat of information
            security.  It  is  through  controlling  access  to  our  networks,
            facilities,  equipment,  and  administrative  functions  that  an
            organization  is  best  able  to  preserve  the  security  of  its
            information.

            Access  control  is  usually  divided  into  four  sections;
            identification,  authentication,  authorization,  and  accounting
            (sometimes also called auditing). Each of these plays an important
   126   127   128   129   130   131   132   133   134   135   136