Single Key/shared
Essay by pat3456 • July 19, 2012 • Case Study • 293 Words (2 Pages) • 1,545 Views
Single key/shared
Codebooks
Reversible algorithm
Fast/easy/simple
https - secure
ARP - address resolution protocol: used to convert an IP address into a physical spoofed
website: a fraudulent website. Public/private key pair
Wire shark - ease dropping
packet sniffer - software that talks to the NIC
Asymmetrical
> Key pair 2-key
> Trap door algorithm
> 1-way algorithm
> Slow complex
Public key encrypts his message and decrypts with her private key.
message
1. Encrypt with private key ----------------------------------------------------
encrypted message
What is Bob's ---------------------------------------------------------------
2. --------------------------------------------------
3. Decrypts with public key
Port Scanning
Port scanning
Portray
Nbtstat-a, an
Nbtstat-n
DNS - ip address/ URL
NIC- Network Interface Card. Address of the NIC is MAC
Fuzz a port - submitting random programs to find a break
Case study:
Hacker - interested in programming
Cracker
Alice
Software
Encryption DRM - digital rights management
System
Domain
The word hacker comes from a term "I'll hack away at it" difficulty
Enthusiasm -enjoys and determined
Innovation - creative
Skillz - 1337, expertise, leet, elite
Negative characteristics
> Arrogance/egotism
> Notoriety/reputation based
Hacker ethic
1. Info should be free
2. Authority must be mistrusted
...
...