~Study the patterns of techniques and tools of hackers
~The most likely hack that is experienced is an attack on passwords that are weak
~Passwords are useful to hackers because in combination they work together
~Encryption is creating a security barrier so that information can be transported with security and shared privately
~Caesar’s Cipher is one of the most ancient forms of encryption. It has a letter of the alphabet to line up with the text. It’s useful and it works, once it is cracked it is always cracked.
~10 positions on the key is too easy
~256-bit keys it would take trillions of years to crack
~Symmetric encryption 2 people share the same key
~Asymmetric encryption a public key that is shared but a private key that is not shared
~Asymmetrical encryption is the foundation of all the information on the internet
https = more updated / stronger security protocol
~http = not as secure
