Study the patterns of techniques and tools of hackers
The most likely hack that is experienced is an attack on passwords that are weak
Passwords are useful to hackers because in combination they work together
Encryption is creating a security barrier so that information can be transported with security and shared privately
Caesar’s cipher is one of the most ancient forms of encryption. It has a letter of the alphabet to line up with the text. It’s useful and it works, once it is cracked it is always cracked.
10 positions on the key is too easy
256-bit keys it would take trillions of years to crack
Symmetric encryption 2 people share the same key
Asymmetric encryption a public key that is shared but a private key that is not shared
a symmetrical encryption is the foundation of all of the information on the internet
https = more updated / stronger security protocol
http = not as secure