Documente Academic
Documente Profesional
Documente Cultură
• Dynamic filters are always opening and closing whereas Static filters
remain open or close until the setting is changed manually.
• Dynamic filters are created through the policy of the network so as to
close or open the IP ports according to the need of the network. Static
filters are created through wizard.
● Availability/accessibility.
● Accuracy.
● Reliability or objectivity. ...
● Relevance/appropriateness. ...
● Completeness. ...
● Level of detail/conciseness. ...
Private Key:
In Private key, the same key (secret key) is used for encryption and
decryption. This key is symmetric because the only key is copied or shared
by another party to decrypt the ciphertext. It is faster than the public key
cryptography.
Public Key:
In Public key, two keys are used one key is used for encryption and
another key is used for decryption. One key (public key) is used for
encrypting the plain text to convert it into cipher text and another key
(private key) is used by receiver to decrypt the cipher text to read the
message.
The more popular and widely adopted symmetric encryption algorithm likely
to be encountered nowadays is the Advanced Encryption Standard (AES).
It is found at least six times faster than triple DES.
A replacement for DES was needed as its key size was too small. With
increasing computing power, it was considered vulnerable against
exhaustive key search attacks. Triple DES was designed to overcome this
drawback but it was found slow.
Digital Signature
Dictionary attack
An attack that takes advantage of the fact people tend to use common
words and short passwords. The hacker uses a list of common words, the
dictionary, and tries them, often with numbers before and/or after the
words, against accounts in a company for each username.
Brute force
Traffic interception
In this attack, the cyber criminal uses software such as packet sniffers to
monitor network traffic and capture passwords as they’re passed. Similar to
eavesdropping or tapping a phone line, the software monitors and captures
critical information.
In this attack, the hacker’s program doesn’t just monitor information being
passed but actively inserts itself in the middle of the interaction, usually by
impersonating a website or app. This allows the program to capture the
user’s credentials and other sensitive information, such as account
numbers, social security numbers, etc.
Keylogger attack
b. Factors of Authentication
One of the first steps of access control is the identification and
authentication of users. There are three common factors used for
authentication:
The something you know factor is the most common factor used and
can be a password or a simple personal identification number (PIN).
However, it is also the easiest to beat.
The something you have factor refers to items such as smart cards or
hand-held tokens. A smart card is a credit-card sized card that has an
embedded certificate used to identify the holder. The user can insert
the card into a smart card reader to authenticate the individual.
● Something you are (such as a fingerprint or other biometric method)