Home / IT Security / Security+ (page 7)


Tracing the Evolution Cryptography

Tracing the Evolution: As with the ancient Egyptians and Romans, who used secret writing methods to obscure trade or battle information and hunting routes, one of the most widely used applications of cryptography is in the safeguarding of communications between two parties wanting to share information. Guaranteeing that information is …

Read More »

Digital Millennium Copyright Act (DMCA)

Digital Millennium Copyright Act (DMCA): The DMCA is not often considered in a discussion of hacking and the question of information security, but it is relevant. The DMCA was passed in 1998 to implement the World Intellectual Property Organization Copyright Treaty (WIPO Copyright Treaty). The WIPO Treaty requires treaty parties …

Read More »

Ethics and The Law

Ethics and The Law: As an ethical hacker, you need to be aware of the law and how it affects what you do. Ignorance or lack of understanding of the law not only is a bad idea but can quickly put you out of business—or even in prison. In fact, …

Read More »

Understanding Hashing

Understanding Hashing Simply yet, hashing can be considered a type of one-way encryption. Most accurately, it is a process that creates a scrambled output that cannot be reversed—or at least cannot be reversed easily. The process of hashing takes plain text and transforms it into cipher text but does so …

Read More »

Gaining Network Information

Gaining Network Information Via Whois And Nslookup An important step in foot printing is to gain information, where possible, about a target’s network. Fortunately, there are plenty of tools available for this purpose, many of which you may already familiar with. Whois    This utility helps you gain information about a …

Read More »

[InfiniteSkills] CompTIA Security+ SY0-401 (Objectives)

This CompTIA Security+ training course from InfiniteSkill will teach you everything what you need to know about IT security career, and which successfully completes the CompTIA Security+ Certification. Once you have completed this computer based training course, you will have developed the knowledge necessary to successfully earn your CompTIA Security+ …

Read More »