Message digest functions
Message digest functions also called hash functions, are used to produce digital summaries of information called message digests. Message digests (also called hashes) are commonly … Read more
Message digest functions also called hash functions, are used to produce digital summaries of information called message digests. Message digests (also called hashes) are commonly … Read more
Cryptography is the technique message from a non-readable format back to a readable format without knowing how they initially converted from readable format to non-readable … Read more
Cryptography Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read … Read more
1.Alert\Alarm A signal suggesting that a system has been attacked. 2.Firewalls The network security door. A firewall is not an IDS but their logs can … Read more
CATEGORIES OF SECURITY ASSESSMENTS There are following categories of security Assessments: Vulnerability Assessment Penetration Test White/Grey/Black-Box Assessment Risk Assessment Threat Assessment 1.Vulnerability Assessment: Vulnerability assessment, … Read more
Security onion OSSEC OpenWips-ng Suricata Bro IDS 1.Security Onion: Security Onion is an Ubuntu-based Linux distribution for network monitoring and intrusion detection. The image can … Read more
Introduction Intrusion-detection systems aim at detecting attacks against computer systems and networks or, in general, against information systems. Indeed, it is difficult to provide provably … Read more
The different security principles and there terminology are as below Confidentiality: The confidentiality principle means that only the sender and the intended recipient should be … Read more