Principle’s of ethical hacking!

~Study the patterns of techniques and tools of hackers

~The most likely hack that is experienced is an attack on passwords that are weak

~Passwords are useful to hackers because in combination they work together

~Encryption is creating a security barrier so that information can be transported with security and shared privately

~Caesar’s Cipher is one of the most ancient forms of encryption. It has a letter of the alphabet to line up with the text. It’s useful and it works, once it is cracked it is always cracked.

~10 positions on the key is too easy

~256-bit keys it would take trillions of years to crack

~Symmetric encryption 2 people share the same key

~Asymmetric encryption a public key that is shared but a private key that is not shared

~Asymmetrical encryption is the foundation of all the information on the internet

https = more updated / stronger security protocol

~http = not as secure

Design a site like this with WordPress.com
Get started