Cryptography

Home/Tag: Cryptography

8-Steps to Secure Your Computer

2020-09-23T04:09:03+00:00Categories: Computer & Network Concepts, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , |

8-Step to Secure Your Computer Whether you use your computer primarily for work tasks or personal use or both, it’s highly likely you want to keep it and its contents safe and secure. Keeping your computer secure helps you avoid malware and direct hacking attempts designed to steal your personal information. In this post, we’ll [...]

About Hashing And Its Applications

2020-09-26T06:31:03+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , , |

We have already mentioned hashing in some posts, for example, in this post. We want to talk more about hashing now. Hashing data is a common practice in computer science and is used for several different purposes. Hashing is the practice of taking a string or input key, a variable created for storing narrative data, [...]

SSL and TLS

2020-09-24T11:41:19+00:00Categories: Computer & Network Concepts, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , |

In this post, we'll take a look at SSL protocol and TLS protocol to help you understand the different aspects of these protocols. One of the most important topics in Cyber-security course is web secure.     What’s SSL?  SSL (Secure Sockets Layer) is a protocol for establishing authenticated and encrypted links between networked computers. [...]

Cryptolocker Attack

2020-09-24T12:42:32+00:00Categories: Network Security|Tags: , , , , , , , , , , , , |

The CryptoLocker ransomware attack was a cyberattack using the CryptoLocker ransomware that occurred from 5 September 2013 to late May 2014. It is believed that the operators of CryptoLocker successfully extorted a total of around $3 million from victims of the trojan. It propagated via infected email attachments, and via an existing Gameover ZeuS botnet. [...]

Define and Apply Secure Coding Guidelines and Standards

2020-07-15T12:54:02+00:00Tags: , , , , , , , , , , , , , , , , |

Define and Apply Secure Coding Guidelines and Standards In this section of this tutorial, we'll take a look at defining and applying secure coding guidelines and standards to help you understand the different aspects of secure coding. Organizations that develop software, need to develop policies and standards regarding the development of source code to [...]

Cryptography- Part 4

2020-07-15T13:40:33+00:00Tags: , , , , , , , , , , , |

Cryptography- Part 4 Hashing Hash functions are primarily used to provide integrity. Hashing and cryptography have a very close relationship. A one-way function ensures that the same key can’t encrypt and decrypt a message in an asymmetric key system. A one-way function’s purpose is to ensure confidentiality. A one-way hashing algorithm produces a hashing [...]

Cryptography- Part 3

2020-07-15T13:36:17+00:00Tags: , , , , , , , , , , , , , , , , |

Cryptography- Part 3 Public Key Infrastructure (PKI) A PKI is an arrangement whereby a central authority stores encryption keys or certificates associated with users and systems. PKI is a key element in cryptography. The four basic components of a PKI are: Certificate Authority (CA): It comprises hardware, software, and the personnel administering the PKI. [...]

Cryptography- Part 2

2020-07-15T13:29:55+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Cryptography- Part 2 Asymmetric Cryptography / Public Key Cryptography In this method, two keys are used: Private Key: This key is only known by the owner itself. Public key: This key is issued by using Public Key Infrastructure (PKI) where a trusted Certification Authority (CA) certifies the ownership of key pairs. Only the private [...]

Go to Top