OtherPapers.com - Other Term Papers and Free Essays
Search

Single Key/shared

Essay by   •  July 19, 2012  •  Case Study  •  293 Words (2 Pages)  •  1,545 Views

Essay Preview: Single Key/shared

Report this essay
Page 1 of 2

Single key/shared

Codebooks

Reversible algorithm

Fast/easy/simple

https - secure

ARP - address resolution protocol: used to convert an IP address into a physical spoofed

website: a fraudulent website. Public/private key pair

Wire shark - ease dropping

packet sniffer - software that talks to the NIC

Asymmetrical

> Key pair 2-key

> Trap door algorithm

> 1-way algorithm

> Slow complex

Public key encrypts his message and decrypts with her private key.

message

1. Encrypt with private key ----------------------------------------------------

encrypted message

What is Bob's ---------------------------------------------------------------

2. --------------------------------------------------

3. Decrypts with public key

Port Scanning

Port scanning

Portray

Nbtstat-a, an

Nbtstat-n

DNS - ip address/ URL

NIC- Network Interface Card. Address of the NIC is MAC

Fuzz a port - submitting random programs to find a break

Case study:

Hacker - interested in programming

Cracker

Alice

Software

Encryption DRM - digital rights management

System

Domain

The word hacker comes from a term "I'll hack away at it" difficulty

Enthusiasm -enjoys and determined

Innovation - creative

Skillz - 1337, expertise, leet, elite

Negative characteristics

> Arrogance/egotism

> Notoriety/reputation based

Hacker ethic

1. Info should be free

2. Authority must be mistrusted

...

...

Download as:   txt (2.6 Kb)   pdf (74.5 Kb)   docx (10.8 Kb)  
Continue for 1 more page »
Only available on OtherPapers.com