Articles by Team EasyExamNotes

Message digest functions

Message digest functions also called hash functions, are used to produce digital summaries of information called message digests. Message digests (also called hashes) are commonly … Read more

MD5

MD5 algorithm was developed by Professor Ronald L. Rivest in 1991. According to RFC 1321, “MD5 message-digest algorithm takes as input a message of arbitrary … Read more

SSH

Secure Shell (SSH) Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. The best known example application … Read more

Cryptography

Cryptography is the technique message from a non-readable format back to a readable format without knowing how they initially converted from readable format to non-readable … Read more

Intrusion terminology

1.Alert\Alarm A signal suggesting that a system has been attacked. 2.Firewalls The network security door. A firewall is not an IDS but their logs can … Read more

Categories of security assessments

CATEGORIES OF SECURITY ASSESSMENTS There are following categories of security Assessments: Vulnerability Assessment Penetration Test White/Grey/Black-Box Assessment Risk Assessment Threat Assessment 1.Vulnerability Assessment: Vulnerability assessment, … Read more

Intrusion detection tool

Security onion OSSEC OpenWips-ng Suricata Bro IDS 1.Security Onion: Security Onion is an Ubuntu-based Linux distribution for network monitoring and intrusion detection. The image can … Read more

Intoduction to intrusion

Introduction Intrusion-detection systems aim at detecting attacks against computer systems and networks or, in general, against information systems. Indeed, it is difficult to provide provably … Read more