Wednesday , June 20 2018

Blog Layout

Confidentiality and Strength

Confidentiality and Strength

Confidentiality and Strength: One of the major reasons of implement a cryptographic system is to ensure the confidentiality of the information being used. Confidentiality may be intended to prevent the unauthorized disclosures of information in a local network or to prevent the unauthorized disclosure of information across a network. A …

Read More »

Password Attacks

Password Attacks

Password Attacks occur when an account is attacked repeatedly. This is accomplished by using applications known as password crackers, which send possible passwords to the account in a systematic manner. The attacks are initially carried out to gain passwords for an access or modification attack. There are several types of …

Read More »

The Principles Behind Social Engineering

The Principles Behind Social Engineering

The Principles Behind Social Engineering: A number of principals, or elements, allow social engineering attacks to be effective. Most of these based on our nature to be helpful, or trust other in general, and to believe that there is a hierarchy of leadership that should be followed. For the exam, …

Read More »

Understanding Hashing

Understanding Hashing

Understanding Hashing: Simply yet, hashing can be considered a type of one-way encryption. More accurately, it is a process that creates a scrambled output that can’t be reversed—or at least can’t be revered easily. The process of hashing takes plain text and transform it into cipher text but does so …

Read More »

Cross Site Scripting

Cross Site Scripting

Cross-Site Scripting (XSS) is a type of attack that can occur in many forms, but in general they occur when data of some type enters a web application through an untrusted source (in the major of cases, a web request). Typically, this data is included as part of dynamic content …

Read More »