General guidelines for securing operating systems and networks

When we want to strengthen the security of the system, we we need to follow some basic guidelines. For hardening or locking down an operating system (OS) we first start with security baseline. Then we have to make sure that we’re using file systems that supports security, keep our OS patched and remove any unneeded services, protocols or applications. In general, … Read moreGeneral guidelines for securing operating systems and networks

Security Issues Related to Network Media and Removable Media

Media security has two primary components: cabling media security and removable media security. Cabling Security Cabling is often an overlooked aspect of designing a security for a network. Unfortunately, cabling problems are a common cause of network failures. Cabling should be protected from unauthorized physical access. We must also be considerate of what type of … Read moreSecurity Issues Related to Network Media and Removable Media

Introduction to Public Key Infrastructure (PKI)

Before you start Objectives: Learn what is PKI, what are its components, and how do they work together. Prerequisites: you should know what is cryptography. Key terms: CA, certificate, PKI, model, trust, Cas, key, authority, environment, organization, list PKI PKI is based on standard protocol X.509 which defines the structure and content of certificates. PKI can be used … Read moreIntroduction to Public Key Infrastructure (PKI)

Examples of Cryptographic Attacks

Before you start Objectives: Learn about general cryptographic attacks, and how to deal with them. Prerequisites: no prerequisites. Key terms: attack, password, attacker, algorithm, hash, key, cryptographic, database, discover Password Attack Attacks related to passwords are often password cracking or password guessing. Attackers attempt to discover passwords by attempting reversed hash matching on stolen hashed passwords from databases. … Read moreExamples of Cryptographic Attacks

Overview of Hashing Cryptography

Before you start Objectives: Learn what is hashing, why do we use it, and common hashing algorithms. Prerequisites: you have to understand what is asymmetric cryptography. Key terms: hash, value, function, hashing, message, key, receiver, algorithm What is Hashing In hashing cryptography we use one-way hash function to protect the integrity of data. A one-way hash function is … Read moreOverview of Hashing Cryptography

Explanation of Asymmetric Cryptography

Before you start Objectives: Learn what is asymmetric cryptography, how does it work, and about different implementations. Prerequisites: you should know what is symmetric cryptography. Key terms: key, cryptography, private, receiver, asymmetric, public, message, symmetric, encrypted, digital Key Pairs In asymmetric cryptography system both the sender and the receiver have their own key pair which consists of one … Read moreExplanation of Asymmetric Cryptography

Explanation of Symmetric Cryptography

Before you start Objectives: Find our the specifics about symmetric cryptography and about specific algorithms that are often used. Prerequisites: you should know what is cryptography in general. Key terms: key, cryptography, bit, DES, symmetric, encryption, RC, algorithm, block, cipher, private What is Symmetric Cryptography The specific thing about symmetric cryptography is that both the sender and receiver … Read moreExplanation of Symmetric Cryptography

Giveaway: EaseUS Data Recovery Pro licence ($89.95 worth). Read more
+