4n6Hub
Share This
Scroll Down
//Advance Information Security

Symmetric-key and asymmetric key cryptography

Symmetric-key cryptography refers to encryption methods in which both the sender and receiver share the same key (or, less commonly, in which their keys are different, but related in an easily computable way). This was the only kind of encryption publicly known until June 1976. Symmetric-key crypto systems use the same key for encryption and decryption of a message, though a message or group of messages may have a different key than others. A significant disadvantage of symm..

Read more
  • 0 Comment

Cryptography

Cryptography means the science of secret writing. Cryptography prior to the modern age was effectively synonymous with encryption, the conversion of information from a readable state to apparent nonsense. The originator of an encrypted message shared the decoding technique needed to recover the original information only with intended recipients, thereby precluding unwanted persons to do the same. Since World War I and the advent of the computer, the methods used to ca..

Read more
  • 0 Comment

Cryptology

Objective: To Understand the concepts of Cryptology. Cryptology encompasses cryptography and cryptanalysis Cryptography – Definition Cryptography is to protect transmitted information from being read and understood by anyone except the intended recipient. Cryptanalysis - Definition  The act of obtaining the plaintext or key from the cipher text that is used to obtain valuable information to pass on altered or fake messages in order to deceive the original intended re..

Read more
  • 0 Comment

APPLICATION SYSTEM SECURITY

Objective: To understand the concepts of Software development life-cycle (SDLC) models, Testing, Program coding and security, Software maintenance and change control, Database auditing features and logs 1. SOFTWARE DEVELOPMENT METHODS Software development has different life-cycle models. Waterfall - require formal reviews and documentation before moving into the next phase of the project. Spiral - a method that builds upon the waterfall method with an emphasis on ris..

Read more
  • 0 Comment

REAL WORLD PROTOCOLS

Objective: This blog describes the popular protocols and services, discusses their intended uses and applications, and describes their security properties and characteristics 1. INTRODUCTION TO IPSec IPSec is a suite of protocols used to protect information, authenticate communications, control access, and provide non-repudiation. There are two protocols that are the driving elements Authentication Header (AH) Encapsulating Security Payload (ESP)   AUTHENTICA..

Read more
  • 0 Comment

COMMON AUTHENTICATION PROTOCOLS

COMMON AUTHENTICATION PROTOCOLS Objective: This Blog describes the popular protocols and services, discusses their intended uses and applications, and describes their security properties and characteristics.   1. AUTHENTICATION PROTOCOLS CONCEPTS An authentication protocol is a type of computer communications protocol or cryptographic protocol. It is designed for the authenticity of the data transfer between two entities. It is the most important layer of protection whi..

Read more
  • 0 Comment

OPERATING SYSTEM AND SECURITY

OPERATING SYSTEM AND SECURITY Objective: To understand the basic to advanced concepts related to Operating System OVERVIEW OF OPERATING SYSTEM An Operating System (OS) is an interface between computer user and computer hardware. An operating system is a software which performs all the basic tasks like file management, memory management, process management, handling input and output, and controlling peripheral devices such as disk drives and printers Memory Manageme..

Read more
  • 0 Comment

DIGITAL RIGHTS MANAGEMENT

DIGITAL RIGHTS MANAGEMENT To understand the concepts of digital rights management scheme and Techniques, the need of DRM, prevention of illegal file sharing on the internet, Content Scrambling and Protection methods, unsuccessful DRM Schemes, DRM asset classification and its protection methodology MEANING OF DIGITAL RIGHTS MANAGEMENT Digital rights management (DRM) is a systematic approach to copyright protection for digital media. The purpose of DRM is to preven..

Read more
  • 0 Comment
Get In Touch
Close
error: Content is protected !!