MindMap Gallery Security support technology
This is a mind map about security support technology, including cryptography technology, identification and identification technology, Kerberos system area, Common AAA protocols, etc.
Edited at 2024-01-19 00:30:25This is a mind map about bacteria, and its main contents include: overview, morphology, types, structure, reproduction, distribution, application, and expansion. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about plant asexual reproduction, and its main contents include: concept, spore reproduction, vegetative reproduction, tissue culture, and buds. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about the reproductive development of animals, and its main contents include: insects, frogs, birds, sexual reproduction, and asexual reproduction. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about bacteria, and its main contents include: overview, morphology, types, structure, reproduction, distribution, application, and expansion. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about plant asexual reproduction, and its main contents include: concept, spore reproduction, vegetative reproduction, tissue culture, and buds. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about the reproductive development of animals, and its main contents include: insects, frogs, birds, sexual reproduction, and asexual reproduction. The summary is comprehensive and meticulous, suitable as review materials.
Security support technology
cryptography
development stage
classical cryptography
modern cryptography
modern cryptography
Cryptosystem composition
plain text
encryption
key
Decrypt
cipher text
Kirkhoff's Principle
key-based algorithm
Symmetric cryptography algorithm
Advantages and Disadvantages
Common algorithms
asymmetric cryptographic algorithm
Advantages and Disadvantages
Common algorithms
Hash function
Features
Common algorithms
Message verification code
Features
Message authentication method
digital signature
effect
digital certificate
life cycle
PKI
CA
RA
Identification and Identification Technology
logo
identify
authentication system
Identification type
One-way authentication
two-way authentication
third party authentication
Identification method
known to the entity
Brute force protection
Entity owned
entity characteristics
feature
Judging the effectiveness of biometric authentication systems
Multi-factor identification
Kerberos system
Key Distribution Center KDC
application server
client
process
Common AAA protocols
RADIUS
TACACS
Diameter
access control technology
discretionary access control
Access control list:ACL
Access capability table: CL
subject/object concept
Mandatory access control model
BLP
BIBA
Role access control model
RBAC0
RBAC1
RBAC2
RBAC3
Features