Overview of Hashing Cryptography

Before you start Objectives: Learn what is hashing, why do we use it, and common hashing algorithms. Prerequisites: you have to understand what is asymmetric cryptography. Key terms: hash, value, function, hashing, message, key, receiver, algorithm What is Hashing In hashing cryptography we use one-way hash function to protect the integrity of data. A one-way hash function is … Read more Overview of Hashing Cryptography

Explanation of Asymmetric Cryptography

Before you start Objectives: Learn what is asymmetric cryptography, how does it work, and about different implementations. Prerequisites: you should know what is symmetric cryptography. Key terms: key, cryptography, private, receiver, asymmetric, public, message, symmetric, encrypted, digital Key Pairs In asymmetric cryptography system both the sender and the receiver have their own key pair which consists of one … Read more Explanation of Asymmetric Cryptography

Explanation of Symmetric Cryptography

Before you start Objectives: Find our the specifics about symmetric cryptography and about specific algorithms that are often used. Prerequisites: you should know what is cryptography in general. Key terms: key, cryptography, bit, DES, symmetric, encryption, RC, algorithm, block, cipher, private What is Symmetric Cryptography The specific thing about symmetric cryptography is that both the sender and receiver … Read more Explanation of Symmetric Cryptography

Introduction to Cryptography

Before you start Objectives: Learn what is encryption, why it is used, what are its primary parts, and what are its features. Prerequisites: no prerequisites. Key terms: data, encryption, key, used, cipher, cryptography, algorithm, keys, called, ensure, access What is Cryptography Cryptography is the science of hiding sensitive communication from unintended recipients, while allowing the intended recipients to … Read more Introduction to Cryptography

Authentication Protection Techniques

Before you start Objectives: Learn which protocols are used to protect the authentication process itself. Prerequisites: you have to know what authentication is. Key terms: authentication protection, Kerberos, authentication, PAP, CHAP, EAP  Protecting Authentication To protect authentication itself, we need to implement some type of protocol. For example, this can be Kerberos, PAP, CHAP, EAP, etc. All of … Read more Authentication Protection Techniques

Types of Authentication

Before you start Objectives: Learn what is authentication, and about different common types of authentication. Prerequisites: no prerequisites. Key terms: authentication, password, token, biometrics, two-factor.  What is Authentication Authentication is the testing of claimed user identity. It is used to establish a users identity and ensure that the users are who they say they are. Authentication is the … Read more Types of Authentication

Managing Local Authentication in Windows

Before you start Objectives: learn which tools can be used in Windows OS to manage authentication locally. These include Credentials Manager, Runas command utility, and Account Policies. Prerequisites: no prerequisites. Key terms: password, user, Windows, account, authentication, policies, users, credentials, command Credentials Manager Windows OS has a set of tools that help remedy some of the authentication challenges. … Read more Managing Local Authentication in Windows

Authentication Versus Authorization

Before you start Objectives: Learn the difference between authentication and authorization, and how are those two implemented in Windows operating systems. Prerequisites: no prerequisites. Key terms: authentication, Windows, user, smart card, rights, authorization, computer, groups, cards, biometric Authentication vs Authorization There are two key terms we need to be familiar with when it comes to security and restrictions. … Read more Authentication Versus Authorization

Overview of Different Authentication Attacks

Before you start Objectives: Familiarize yourself with different types of authentication attacks and general ways to prevent them. Prerequisites: no requirements. Key terms: attacks, network, spoofing, attacker. authentication, packet, client, legitimate, private What is Spoofing There are several types of spoofing attacks. The first one is packet spoofing, which means that the source and/or destination addresses of a … Read more Overview of Different Authentication Attacks

Switches and Security

Before you start Objectives: Learn about switch security features such as VLANs, MAC address filtering, and port authentication. Prerequisites: no prerequisites. Key terms: VLAN, port security, port authentication, switch, security Switch Functions Early switches performed a single function, they switch packets between switch ports based on the MAC address. As switches have evolved, switch functions went beyond simple … Read more Switches and Security