cyber

  • Period: to

    cyber security

  • mark quiz 1

    1) An algorithm can be used to attack and disable a computer by forcing it to use memory or by overworking its CPU 2) The term BYOD stands for "bring your own device" 3) An amateur hacker is called a script kiddie
  • mark quiz 2

    1) Two common hash functions are MD5 and SHA 2) Authorization is the service that determines which resources a user can access along with the operations that a user can perform 3) Version Control is the mechanism that organizations use to prevent accidental changes by authorized users
  • mark quiz 3

  • Hashing Algorithm Research

  • hashing exercise

    we used a random hash generator to get random hash which we recorded my first hash was 10f12151ef41361b91ee3fc1065e14d2
  • Kevin Mitnick interview

  • Symmetric/Asymmetric Examples

  • 1st Cipher Chart

  • Google Data Centre / Security Key

  • configure the FTP server

    FTP servers are the solutions used to facilitate file transfers across the internet. If you send files using FTP, files are either uploaded or downloaded to the FTP server.
  • configure the web server

    A web server is a computer that runs websites. It's a computer program that distributes web pages as they are requisitioned
  • configure the email sever

    A mail server (or email server) is a computer system that sends and receives email.
  • configure the DNS server

    The Domain Name System (DNS) is the phonebook of the Internet. Humans access information online through domain names, like nytimes.com or espn.com.
  • configure the NTP server

    NTP is an internet protocol that's used to synchronise the clocks on computer networks to within a few milliseconds of universal coordinated time (UTC). It enables devices to request and receive UTC from a server that, in turn, receives precise time from an atomic clock.
  • configure the AAA server

    The AAA server is a network server that is used for access control. Authentication identifies the user. Authorization implements policies that determine which resources and services an authenticated user may access. Accounting keeps track of time and data resources that are used for billing and analysis.
  • PKA file