Articles by Team EasyExamNotes

Digital signature

A digital code (generated and authenticated by public key encryption ) which is attached To an electronically transmitted document to verify its contents and the … Read more

Message digest functions

Message digest functions also called hash functions, are used to produce digital summaries of information called message digests. Message digests (also called hashes) are commonly … Read more

MD5

MD5 algorithm was developed by Professor Ronald L. Rivest in 1991. According to RFC 1321, “MD5 message-digest algorithm takes as input a message of arbitrary … Read more

SSH

Secure Shell (SSH) Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. The best known example application … Read more

Cryptography

Cryptography is the technique message from a non-readable format back to a readable format without knowing how they initially converted from readable format to non-readable … Read more

Intrusion terminology

1.Alert\Alarm A signal suggesting that a system has been attacked. 2.Firewalls The network security door. A firewall is not an IDS but their logs can … Read more

Categories of security assessments

CATEGORIES OF SECURITY ASSESSMENTS There are following categories of security Assessments: Vulnerability Assessment Penetration Test White/Grey/Black-Box Assessment Risk Assessment Threat Assessment 1.Vulnerability Assessment: Vulnerability assessment, … Read more

Intrusion detection tool

Security onion OSSEC OpenWips-ng Suricata Bro IDS 1.Security Onion: Security Onion is an Ubuntu-based Linux distribution for network monitoring and intrusion detection. The image can … Read more

Intoduction to intrusion

Introduction Intrusion-detection systems aim at detecting attacks against computer systems and networks or, in general, against information systems. Indeed, it is difficult to provide provably … Read more