Computer Networks - 2 Past Paper - IPU - 2025/2024 - PDF
Document Details
![WillingHyperbola](https://quizgecko.com/images/avatars/avatar-13.webp)
Uploaded by WillingHyperbola
Ittihad University
2025
IPU
Dr. NASSIF
Tags
Summary
This document is a computer networks lecture from ITTEHAD UNIVERSITY, covering security threats and avoidance techniques. Topics discussed include security terminology, types of attacks, and cryptographic methods. The document is intended for fourth-year computer engineering students.
Full Transcript
اﻟﺟﻣﮭورﯾﺔ اﻟﻌرﺑﯾﺔ اﻟﺳورﯾﺔ ﺟﺎﻣﻌﺔ اﻹﺗﺣﺎد اﻟﺧﺎﺻﺔ ITTEHAD U...
اﻟﺟﻣﮭورﯾﺔ اﻟﻌرﺑﯾﺔ اﻟﺳورﯾﺔ ﺟﺎﻣﻌﺔ اﻹﺗﺣﺎد اﻟﺧﺎﺻﺔ ITTEHAD UNIVERSITY ——————— ————————— 2 - ﺷﺑﻛﺎت اﻟﺣﺎﺳب: اﻟﻣﻘرر، ﻛﻠﯾﺔ اﻟﮭﻧدﺳﺔ اﻟﻣﻌﻠوﻣﺎﺗﯾﺔ – س راﺑﻌﺔ:اﻟﻛﻠﯾﺔ و اﻟﺳﻧﺔ 2025/2024 : اﻟﻌﺎم اﻟدراﺳﻲ، ﻣﻔﯾد ﻧﺎﺻﯾف. د:ﻣدرس اﻟﻣﻘرر -——————————————————————————————— , – ۲- ﺷﺑﻛﺎت اﻟﺣﺎﺳب- Computer Networks -2- Tuesday, November 19, 2024 2 – ﺷﺑﻛﺎت اﻟﺣﺎﺳب Computer Networks – 2 - ch.2 أﺗﺻﺎﻻت، ﺣواﺳﯾب- ﺳﻧﺔ راﺑﻌﺔ ھﻧدﺳﺔ ﻣﻌﻠوﻣﺎﺗﯾﺔ The References : اﻟﻣراﺟﻊ - Forouzan B, Data Communcations and Networking, International Edition, McGrow-Hill , 2007, - William Stallings ,Wireless Communications and Networks second Edition, Pearson Prentice Hall, NJ, 2005 - Jim Kurose, Keith Ross Computer Networking: A Top Down Approach , 5th edition. Addison-Wesley, April 2009. Dr. NASSIF اﻟدﻛﺗور اﻟﻣﮭﻧدس ﻣﻔﯾد ﺣﺎﻓظ ﻧﺎﺻﯾف اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ: اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ Security Terminology closed system : Even this ideal, closed system is not completely secure because a user might decide to misbehave in order to view information on the , – ۲- ﺷﺑﻛﺎت اﻟﺣﺎﺳب- Computer Networks -2- Tuesday, November 19, 2024 corporate server that should be restricted or confidential. Figure -1 An Example of an Enterprise Closed System : اﻟﻨﻈﺎم اﻟﻤﻐﻠﻖ 2 Dr. NASSIF اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ: اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ , – ۲- ﺷﺑﻛﺎت اﻟﺣﺎﺳب- Computer Networks -2- Tuesday, November 19, 2024 Figure -2 An Example Enterprise Extends Beyond Its Own Boundary : اﻟﻨﻈﺎم اﻟﻤﻮﺳﻊ 3 Dr. NASSIF - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 4 اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ: اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ a vulnerability : is anything that can be considered to be a weakness that can compromise the security of something else, such as the integrity of data. , – ۲- ﺷﺑﻛﺎت اﻟﺣﺎﺳب- Computer Networks -2- Tuesday, November 19, 2024 Exploit : a tool can be used to exploit a vulnerability, An exploit is not very effective if it is used against anything other than the targeted weakness or vulnerability. Threat : Now there is an actual potential to break in, destroy, steal,or otherwise modify something without permission. This is known as a threat. Figure -3 Security Terminology Illustrated 5 Dr. NASSIF - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 6 - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 7 - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 8 - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 9 - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 10 - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 11 - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 12 اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ: اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ , – ۲- ﺷﺑﻛﺎت اﻟﺣﺎﺳب- Computer Networks -2- Tuesday, November 19, 2024 A Sample Spoofing Attack An attacker can send packets with a spoofed source IP address instead of its own, an attacker can send spoofed MAC addresses too, When the target receives the packets, it will send return traffic to the spoofed address, rather than the attacker’s actual address. 13 Dr. NASSIF - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 14 - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 15 - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 16 - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 17 - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 18 - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 19 - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 20 اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Viruses اﻟﻔﯾروﺳﺎت اﻟﺑراﻣﺞ اﻟﺗﻲ ﺗﻧﺳﺦ و ﺗوزع ﻧﻔﺳﮭﺎ وﺗﺛﺑت ﻧﻔﺳﮭﺎ - ،ﺗﺗراوح ﻣن اﻟﻣزﻋﺟﺔ إﻟﻰ اﻟﻛﺎرﺛﯾﺔ اﻟﺗداﺑﯾر اﻟوﻗﺎﺋﯾﺔ :ﺑراﻣﺞ ﻣﻛﺎﻓﺣﺔ اﻟﻔﯾروﺳﺎت -ﺣظر اﻟﻧواﻓذ اﻟﻣﻧﺑﺛﻘﺔ ﻻ ﺗﻔﺗﺢ رﺳﺎﺋل اﻟﺑرﯾد اﻹﻟﻛﺗروﻧﻲ ﻏﯾر اﻟﻣﻌروﻓﺔ Trojan horses أﺣﺻﻧﺔ طروادة : ﺑرﻧﺎﻣﺞ ﯾﺗظﺎھر ﺑﺄﻧﮫ ﺑرﻧﺎﻣﺞ ﻣﻔﯾد و ﯾﻘوم اﻟﻣﺳﺗﺧدم ﺑﺗﺛﺑﯾﺗﮫ طواﻋﯾﺔ اﻟﺗداﺑﯾر اﻟوﻗﺎﺋﯾﺔ :ﺑراﻣﺞ ﻣﻛﺎﻓﺣﺔ اﻟﻔﯾروﺳﺎت -ﺑراﻣﺞ ﺣظر ﺑراﻣﺞ اﻟﺗﺟﺳس 21 Dr. NASSIF - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 22 اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ: اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ , – ۲- ﺷﺑﻛﺎت اﻟﺣﺎﺳب- Computer Networks -2- Tuesday, November 19, 2024 Confidentiality (secrecy ) or P rivacy : Integrity authentication or identification 23 Dr. NASSIF اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ: اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ Three types of Cryptography , – ۲- ﺷﺑﻛﺎت اﻟﺣﺎﺳب- Computer Networks -2- Tuesday, November 19, 2024 24 Dr. NASSIF - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 25 - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 26 - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 27 - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 28 - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 29 - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 30 - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 31 - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 32 اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ ﻣﻠﺨﺺ اﻟﮭﺠﻤﺎت اﻷﻣﻨﯿﺔ ﻋﻠﻰ ﻧﻘﺎط اﻟﻀﻌﻒ اﻟﺒﺸﺮﯾﺔ - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- 33 Dr. NASSIF - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 34 - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 35 اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ ﻣﺜﺎل ﻋﻦ اﻟﺘﺸﻔﯿﺮ ﺑﺎﻟﻤﻔﺘﺎح اﻟﻌﺎم ﻣﺒﺪأ ﻋﻤﻞ ﺧﻮارزﻣﯿﺔ RSA : - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- 36 Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ ﻣﺜﺎل ﻋﻦ اﻟﺘﺸﻔﯿﺮ ﺑﺎﻟﻤﻔﺘﺎح اﻟﻌﺎم ﻣﺒﺪأ ﻋﻤﻞ ﺧﻮارزﻣﯿﺔ RSA : - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- 37 Dr. NASSIF - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 38 - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 39 اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ ﻟﻠﺜﻮﺛﯿﻖ Auth.أو ﻟﻠﺴﻼﻣﺔ Integrity - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- 40 Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- ﻣﺜﺎل ﻋﻦ اﻟﺘﺸﻔﯿﺮ ﺑﺘﺎﺑﻊ اﻟﺘﺠﺰﺋﺔ )(Hash ﻣﺒﺪأ ﻋﻤﻞ ﺧﻮارزﻣﯿﺔ اﻟﺘﺠﺰﺋﺔMD5 : 41 Dr. NASSIF - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 42 - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 43 - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 44 اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ: اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ Digital Signature , – ۲- ﺷﺑﻛﺎت اﻟﺣﺎﺳب- Computer Networks -2- Tuesday, November 19, 2024 45 Dr. NASSIF اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ: اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ Digital Signature , – ۲- ﺷﺑﻛﺎت اﻟﺣﺎﺳب- Computer Networks -2- Tuesday, November 19, 2024 46 Dr. NASSIF اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ: اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ Digital Signature Verification , – ۲- ﺷﺑﻛﺎت اﻟﺣﺎﺳب- Computer Networks -2- Tuesday, November 19, 2024 47 Dr. NASSIF - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 48 - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 49 اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- ﺧﻄﻮات اﻟﺤﺼﻮل ﻋﻠﻰ ﺷﮭﺎدة رﻗﻤﯿﺔ ﻣﺼﺪﻗﺔ ﻣﻦ ﻣﺮﺟﻊ ﻣﻮﺛﻮق )ﻣﺼﺪق( 50 Dr. NASSIF - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 51 اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- ﺳﻠﻄﺎت أو ھﯿﺌﺎت إﺻﺪار اﻟﺸﮭﺎدات )(CAھﻲ اﻟﻤﺨﻮﻟﺔ ﻹﺻﺪار ﻗﻮاﺋﻢ اﻟﺘﺴﺠﯿﻞ ):(CRL 52 Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ اﻟﺼﻔﺎت اﻷﺳﺎﺳﯿﺔ ﻟﻠﻤﺮﺟﻊ اﻟﻤﺼﺪق )(CA اﻟﻤﮭﺎم اﻷﺳﺎﺳﯿﺔ ﻟﻠﻤﺮﺟﻊ اﻟﻤﺼﺪق )(CA )ھﯿﺌﺔ إﺻﺪار اﻟﺸﮭﺎدات( : - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- 53 Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ اﻟﻤﮭﺎم اﻷﺳﺎﺳﯿﺔ ﻟﮭﯿﺌﺔ اﻟﺘﺴﺠﯿﻞ ) (RAﻟﺒﻨﯿﺔ اﻟﻤﻔﺎﺗﯿﺢ اﻟﻌﺎﻣﺔ ) :(PKIﻟﺘﺤﺪﯾﺪھﻮﯾﺔ اﻟﻤﺴﺘﺨﺪﻣﯿﻦ - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- 54 Dr. NASSIF - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 55 - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 56 - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 57 - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 58 - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 59 - Computer Networks -2- Tuesday, November 19, 2024ﺷﺑﻛﺎت اﻟﺣﺎﺳب, – ۲- Dr. NASSIF اﻟﻔﺼﻞ اﻟﺜﺎﻧﻲ :اﻟﺘﮭﺪﯾﺪ ات اﻷﻣﻨﯿﺔ و وطﺮق ﺗﺠﻨﺒﮭﺎ 60