Two Basic Security Attacks

We've talked a lot about techniques for preventing common attacks on our data, but fairly little about the attacks themselves. If t weren't for attacks, of course we wouldn't even need encryption. Passive Attacks The first kind of attack leaves absolutely no trace, because the attacker isn't actually touching a target computer. In the passive attack,

Encryption: Symmetric and Asymmetric Keys

DES and AES are very similar encryptions. So similar, in fact, that you might think to put them into a category. Today we'll look at two common categories of encryptions - symmetric key and asymmetric key encryptions. Symmetric Key Symmetric key encryptions rely on both the recipient and the sender having a shared key which no one

Protecting Integrity with Encryption

We've looked at how cryptography can help protect the confidentiality of data, but that only solves one of the three basic security issues. These issues are: Confidentiality - no one else can read Integrity - the recipient gets the right message Availability - the recipient CAN get the right message Availability is a messy problem with no easy

Basic Security – It’s an input thing

If I were to ask you what the most common type of hack is, you'd probably guess something like SSL Injection, or Buffer Overflow, or something of that nature. You wouldn't be entirely wrong, but there's a much more general answer that covers all those things: The most common attack is bad input When it boils