Data Security – media3training

DATA SECURITY

Data security refers to the process of protecting data from unauthorized access and data corruption throughout its lifecycle. Data security includes data encryption, tokenization, and key management practices that protect data across all applications and platforms.

Organizations around the globe are investing heavily in information technology (IT) cyber defense capabilities to protect their critical assets. Whether an enterprise needs to protect a brand, intellectual capital, and customer information or provide controls for critical infrastructure, the means for incident detection and response to protecting organizational interests have three common elements: people, processes, and technology.

Micro Focus drives leadership in data security solutions with over 80 patents and 51 years of expertise. With advanced data encryption, tokenization, and key management to protect data across applications, transactions, storage, and big data platforms, Micro Focus simplifies the protection of sensitive data in even the most complex use cases.

DATA SECURITY

 

INTRODUCTION

Cryptography

Data Security

Cryptographic Systems

  • Public-Key Systems
  • Digital Signatures

Information Theory

  • Entropy and Equivocation
  • Perfect Secrecy
  • Unicity Distance

Complexity Theory

  • Algorithm Complexity
  • Problem Complexity and NP-Completeness
  • Ciphers Based on Computationally Hard Problems

Number Theory

  • Congruences and Modular Arithmetic
  • Computing Inverses
  • Computing in Galois Fields

ENCRYPTION ALGORITHMS

Transposition Ciphers

Simple Substitution Ciphers

  • Single-Letter Frequency Analysis

Homophonic Substitution Ciphers

  • Beale Ciphers
  • Higher-Order Homophonics

Polyalphabetic Substitution Ciphers

  • Vigen6re and Beaufort Ciphers
  • Index of Coincidence
  • Kasiski Method
  • Running-Key Ciphers
  • Rotor and Hagelin Machines
  • Vernam Cipher and One-Time Pads

Polygram Substitution Ciphers

  • Playfair Cipher
  • Hill Cipher

Product Ciphers

  • Substitution-Permutation Ciphers
  • The Data Encryption Standard (DES)
  • Time-Memory Tradeoff

Exponentiation Ciphers

  • Pohlig-Hellman Scheme
  • Rivest-Shamir-Adleman (RSA) Scheme
  • Mental Poker
  • Oblivious Transfer

Knapsack Ciphers

  • Merkle-Hellman Knapsacks
  • Graham-Shamir Knapsacks
  • Shamir Signature-Only Knapsacks
  • A Breakable NP-Complete Knapsack

CRYPTOGRAPHIC TECHNIQUES

Block and Stream Ciphers

Synchronous Stream Ciphers

  • Linear Feedback Shift Registers
  • Output-Block Feedback Mode
  • Counter Method

Self-Synchronous Stream Ciphers

  • Autokey Ciphers
  • Cipher Feedback

Block Ciphers

  • Block Chaining and Cipher Block Chaining
  • Block Ciphers with Subkeys

Endpoints of Encryption

  • End-to-End versus Link Encryption
  • Privacy Homomorphisms

One-Way Ciphers

  • Passwords and User Authentication

Key Management

  • Secret Keys
  • Public Keys
  • Generating Block Encryption Keys
  • Distribution of Session Keys

Threshold Schemes

  • Lagrange Interpolating Polynomial Scheme
  • Congruence Class Scheme

ACCESS CONTROLS

Access-Matrix Model

  • The Protection State
  • State Transitions
  • Protection Policies

Access Control Mechanisms

  • Security and Precision
  • Reliability and Sharing
  • Design Principles

Access Hierarchies

  • Privileged Modes
  • Nested Program Units

Authorization Lists

  • Owned Objects
  • Revocation

Capabilities

  • Domain Switching with Protected Entry Points
  • Abstract Data Types
  • Capability-Based Addressing
  • Revocation
  • Locks and Keys
  • Query Modification

Verifiably Secure Systems

  • Security Kernels
  • Levels of Abstraction
  • Verification

Theory of Safe Systems

  • Mono-Operational Systems
  • General Systems
  • Theories for General Systems
  • Take-Grant Systems

INFORMATION FLOW CONTROLS

Lattice Model of Information Flow

  • Information Flow Policy
  • Information State
  • State Transitions and Information Flow
  • Lattice Structure
  • Flow Properties of Lattices

Flow Control Mechanisms

  • Security and Precision
  • Channels of Flow

Execution-Based Mechanisms

  • Dynamically Enforcing Security for Implicit Flow
  • Flow-Secure Access Controls
  • Data Mark Machine
  • Single Accumulator Machine

Compiler-Based Mechanism

  • Flow Specifications
  • Security Requirements
  • Certification Semantics
  • General Data and Control Structures
  • Concurrency and Synchronization
  • Abnormal Terminations

Program Verification

  • Assignment
  • Compound
  • Alternation
  • Iteration
  • Procedure Call
  • Security

Flow Controls in Practice

  • System Verification
  • Extensions
  • A Guard Application

INFERENCE CONTROLS

Statistical Database Model

  • Information State
  • Types of Statistics
  • Disclosure of Sensitive Statistics
  • Perfect Secrecy and Protection
  • Complexity of Disclosure

Inference Control Mechanisms

  • Security and Precision
  • Methods of Release

Methods of Attack

  • Small and Large Query Set Attacks
  • Tracker Attacks
  • Linear System Attacks
  • Median Attacks
  • Insertion and Deletion Attacks

Mechanisms that Restrict Statistics

  • Cell Suppression
  • Implied Queries
  • Partitioning

Mechanisms that Add Noise

  • Response Perturbation (Rounding)
  • Random-Sample Queries
  • Data Perturbation
  • Data Swapping
  • Randomized Response (Inquiry)
  • Course Features

    • Duration

      12 weeks


    • Live Projects

      Yes


    • Internship

      Yes


    • Limited Seats

  • Leave A Comment

      RELATED COURSE

    • GET IN TOUCH
      Call: 903 206 6166
      Mail: info@media3training.com
    • Head Office

      Media3 Empire,Kshatriya Kalayanamandapam
      Seethammadhara, Visakhapatnam – 530013

    • Hyderabad

      205, Aditya Trade Center, Ameerpet, Hyderabad,Telangana 500016,  90320  66166

    • Vijayawada

      Opp. Sweet Magic, DV Manor Road, Below Kotak Mahindra Bank, Bandar Road, Vijayawada, Andhra Pradesh  520002, 90320 66166,  90009 14648

    • Vizianagaram

      Suit-303, Vijaya Mansion, Opp.Commercial Tax Office,LIC Complex  Back Side, Lower Tank Bund Road, Siddarth Nagar, Vizianagaram 535003,  90320 66166

    • Kurnool

      9642668768, 9121099933

    • Tirupathi
      D/No:7-43-46, Venkatadri Plaza Building Main Road, near Flipkart Office, Mangalam, Tirupati, Andhra Pradesh 517501
      9642668768, 9121099933

    • Rajahmundry

      47-7-47, Upstairs of AYASYA showroom ,PARK road Danvaipeta,Rajahmundry 9542055666, 8555003678