Internet Society:
– I S O C is a professional membership society with worldwide organizational
and individual membership. It provides leadership in addressing issues
that confront the future of the Internet and is the organization home for the groups responsible for Internet infrastructure standards, including the
Internet Engineering Task Force (I E T F) and the Internet Architecture
Board (I A B). These organizations develop Internet standards and related
specifications, all of which are published as Requests for Comments (R F
C s).
Copyright © 2020 Pearson Education, Inc. All Rights Reserved.
Standards (2 of 2) • I T U-T:
– The International Telecommunication Union (I T U) is an international
organization within the United Nations System in which governments and
the private sector coordinate global telecom networks and services. The I
T U Telecommunication Standardization Sector (I T U-T) is one of the three sectors of the I T U. I T U-T’s mission is the development of technical
standards covering all fields of telecommunications. I T U-T standards are
referred to as Recommendations
• I S O:
– The International Organization for Standardization (I S O) is a worldwide federation of national standards bodies from more than 140 countries,
one from each country. I S O is a nongovernmental organization that
promotes the development of standardization and related activities with a
view to facilitating the international exchange of goods and services and
to developing cooperation in the spheres of intellectual, scientific, technological, and economic activity. I S O’s work results in international
agreements that are published as International Standards
Copyright © 2020 Pearson Education, Inc. All Rights Reserved.
Summary
• Describe the key security requirements of confidentiality, integrity, and
availability
• List and briefly describe key organizations involved in cryptography
standards
• Provide an overview of keyless, single-key and two-key cryptographic
algorithms
• Provide an overview of the main areas of network security
• Describe a trust model for information security
• Discuss the types of security threats and attacks that must be dealt
with and give examples of the types of threats and attacks that apply to
different categories of computer and network assets
Copyright © 2020 Pearson Education, Inc. All Rights Reserved.
Copyright
This work is protected by United States copyright laws and is
provided solely for the use of instructors in teaching their
courses and assessing student learning. Dissemination or sale of
any part of this work (including on the World Wide Web) will
destroy the integrity of the work and is not permitted. The work
and materials from it should never be made available to students
except by instructors using the accompanying text in their
classes. All recipients of this work are expected to abide by these
restrictions and to honor the intended pedagogical purposes and
the needs of other instructors who rely on these materials.