Principals of ethical hacking

Study the patterns of techniques and tools of hackers

The most likely hack that is experienced is an attack on passwords that are weak

Passwords are useful to hackers because in combination they work together

Encryption is creating a security barrier so that information can be transported with security and shared privately

Caesar’s cipher is one of the most ancient forms of encryption. It has a letter of the alphabet to line up with the text. It’s useful and it works, once it is cracked it is always cracked.

10 positions on the key is too easy

256-bit keys it would take trillions of years to crack

Symmetric encryption 2 people share the same key

Asymmetric encryption a public key that is shared but a private key that is not shared

a symmetrical encryption is the foundation of all of the information on the internet

https = more updated / stronger security protocol

http = not as secure

Leave a comment

Design a site like this with WordPress.com
Get started