We've talked a lot about techniques for preventing common attacks on our data, but fairly little about the attacks themselves. If t weren't for attacks, of course we wouldn't even need encryption.
The first kind of attack leaves absolutely no trace, because the attacker isn't actually touching a target computer. In the passive attack,
DES and AES are very similar encryptions. So similar, in fact, that you might think to put them into a category.
Today we'll look at two common categories of encryptions - symmetric key and asymmetric key encryptions.
Symmetric key encryptions rely on both the recipient and the sender having a shared key which no one
We've looked at how cryptography can help protect the confidentiality of data, but that only solves one of the three basic security issues. These issues are:
Confidentiality - no one else can read
Integrity - the recipient gets the right message
Availability - the recipient CAN get the right message
Availability is a messy problem with no easy
If I were to ask you what the most common type of hack is, you'd probably guess something like SSL Injection, or Buffer Overflow, or something of that nature. You wouldn't be entirely wrong, but there's a much more general answer that covers all those things:
The most common attack is bad input
When it boils