-
- BYOD means bring your own device
- Vulnerability a weakness that makes a target susceptible to an attack
- LinkedIn is a example of an Internet data domain?
-
- something you know can be used to verify data
- something you are can be used to verify your data
- MD5 is a common hash function
-
- The term logic bomb means a malicious program that uses a trigger to awaken the malicious code. 2.Worms self-replicate but viruses do not. 3.backdoor is a name given to a program that bypasses normal authentication.
-
I completed this on Tuesday, 9 February 2021.
1. MD5 hash generator
2. SHA1
3. Hash -
- HashCalc works out text files hash keys.
- longer hashes provide better security 3.
-
- FTP wasn't built to be secure.
- Telnet is an insecure protocol.
- SSH is a secure protocol.
-
- Two step authentication is a boost to the normal password people keep. 2.A security key login is your specific key which is registered to your google account. 3.Data can be also found in your laptop, computer, mobile phone and other local devices.
-
- encrypt
- decrypt
- ciphertext
-
- IDEA considered to be very secure
- AES got replaced by IDEA
- AES can have 128, 192 and 256-bits key lengths
-
- Hacker
- On the run
- Untraceable
-
- hacker
- wanted
- did the impossible
-
- IDEA is one of the best publicly known algorithms.
- AES can have 128, 192 and 256-bits key lengths.
- ElGamal communicates between two parties and encrypts the message.
-
- FTP
- server config
- computer network configuration
-
1.Configuring the FTP server makes it so that you can transfer and upload files using a server
2.The web server is a configuration file on the web server machine
3.Configuring the Email server you can make the emails on the network function correctly
4.DNS server translates web addresses to machine friendly IP addresses
5.NTP server synchronizes computer clock times on a network
6.AAA lets you track the services that users are accessing and the amount of network resources that they are using -
- ftp
- network
-
1.HTTP
2.Hashing
3.Text Editing -
1.wpa2 psk security
2.wpa2 radius
3. wep is weak