General guidelines for securing operating systems and networks

When we want to strengthen the security of the system, we we need to follow some basic guidelines. For hardening or locking down an operating system (OS) we first start with security baseline. Then we have to make sure that we’re using file systems that supports security, keep our OS patched and remove any unneeded services, protocols or applications. In general, … Read moreGeneral guidelines for securing operating systems and networks

Security Issues Related to Network Media and Removable Media

Media security has two primary components: cabling media security and removable media security. Cabling Security Cabling is often an overlooked aspect of designing a security for a network. Unfortunately, cabling problems are a common cause of network failures. Cabling should be protected from unauthorized physical access. We must also be considerate of what type of … Read moreSecurity Issues Related to Network Media and Removable Media

Key Management Principles

Before you start Objectives: Learn about some common principles and terms when it comes to key management. Prerequisites: you have to know what is PKI. Key terms: key, certificate, deployment, facts, principles, PKI, management  What to have in mind There are some basic things that we should have in mind when working with keys. For example, key length … Read moreKey Management Principles

Introduction to Public Key Infrastructure (PKI)

Before you start Objectives: Learn what is PKI, what are its components, and how do they work together. Prerequisites: you should know what is cryptography. Key terms: CA, certificate, PKI, model, trust, Cas, key, authority, environment, organization, list PKI PKI is based on standard protocol X.509 which defines the structure and content of certificates. PKI can be used … Read moreIntroduction to Public Key Infrastructure (PKI)

Examples of Cryptographic Attacks

Before you start Objectives: Learn about general cryptographic attacks, and how to deal with them. Prerequisites: no prerequisites. Key terms: attack, password, attacker, algorithm, hash, key, cryptographic, database, discover Password Attack Attacks related to passwords are often password cracking or password guessing. Attackers attempt to discover passwords by attempting reversed hash matching on stolen hashed passwords from databases. … Read moreExamples of Cryptographic Attacks

Overview of Hashing Cryptography

Before you start Objectives: Learn what is hashing, why do we use it, and common hashing algorithms. Prerequisites: you have to understand what is asymmetric cryptography. Key terms: hash, value, function, hashing, message, key, receiver, algorithm What is Hashing In hashing cryptography we use one-way hash function to protect the integrity of data. A one-way hash function is … Read moreOverview of Hashing Cryptography

Explanation of Asymmetric Cryptography

Before you start Objectives: Learn what is asymmetric cryptography, how does it work, and about different implementations. Prerequisites: you should know what is symmetric cryptography. Key terms: key, cryptography, private, receiver, asymmetric, public, message, symmetric, encrypted, digital Key Pairs In asymmetric cryptography system both the sender and the receiver have their own key pair which consists of one … Read moreExplanation of Asymmetric Cryptography

Explanation of Symmetric Cryptography

Before you start Objectives: Find our the specifics about symmetric cryptography and about specific algorithms that are often used. Prerequisites: you should know what is cryptography in general. Key terms: key, cryptography, bit, DES, symmetric, encryption, RC, algorithm, block, cipher, private What is Symmetric Cryptography The specific thing about symmetric cryptography is that both the sender and receiver … Read moreExplanation of Symmetric Cryptography

Introduction to Cryptography

Before you start Objectives: Learn what is encryption, why it is used, what are its primary parts, and what are its features. Prerequisites: no prerequisites. Key terms: data, encryption, key, used, cipher, cryptography, algorithm, keys, called, ensure, access What is Cryptography Cryptography is the science of hiding sensitive communication from unintended recipients, while allowing the intended recipients to … Read moreIntroduction to Cryptography

Authentication Protection Techniques

Before you start Objectives: Learn which protocols are used to protect the authentication process itself. Prerequisites: you have to know what authentication is. Key terms: authentication protection, Kerberos, authentication, PAP, CHAP, EAP  Protecting Authentication To protect authentication itself, we need to implement some type of protocol. For example, this can be Kerberos, PAP, CHAP, EAP, etc. All of … Read moreAuthentication Protection Techniques