28.4 F
Cincinnati, Ohio
Tuesday, March 26, 2019
Home Data Security (Cryptography)

Data Security (Cryptography)

Cryptography, Encryption, Cyber Attacks, Hacking, CyberCrime

PHISHING ATTACKS WHAT IS A PHISHING ATTACK Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim...
ADVANCED PERSISTENT THREAT (APT) WHAT IS AN APT An advanced persistent threat (APT) is a broad term used to describe an attack campaign in which an intruder, or team of intruders, establishes an illicit, long-term presence on a network in order...
PENETRATION TESTING WHAT IS PENETRATION TESTING A penetration test, also known as a pen test, is a simulated cyberattack against your computer system to check for exploitable vulnerabilities. In the context of web application security, penetration testing is commonly used to...
  Kerberos   Kerberos is a commonly used authentication scheme on the Internet. Developed by MIT's Project Athena, Kerberos is named for the three-headed dog who, according to Greek mythology, guards the entrance of Hades (rather than the exit, for some reason!). Kerberos...
Cybercrimes in the United State Ilhan Turkmen The School of Information Technology University of Cincinnati E-mail: turkmein@mail.uc.edu Abstract A dangerous aspect of the Internet Age that all businesses and government agencies must effectively counteract is cybercrime. As technology advances, so do the criminals. President Obama...
Phishing in the United State by Ilhan Turkmen   Abstract Phishing is a security attack that seeks to trick people into revealing sensitive information about themselves and their internet account. This paper address the definitional concepts of phishing, its threats to society and...
You can delete a file without erasing it, erase a drive without wiping it, shred a file without deleting it, and wipe hundreds of files at once... that were already deleted. Confused? I'm not surprised! These four terms - wipe,...
Cryptographic Algorithms There are of course a wide range of cryptographic algorithms in use. The following are amongst the most well known: DES This is the 'Data Encryption Standard'. This is a cipher that operates on 64-bit blocks of data, using...
  Elliptic Curve Cryptography (ECC) In general, public-key cryptography systems use hard-to-solve problems as the basis of the algorithm. The most predominant algorithm today for public-key cryptography is RSA, based on the prime factors of very large integers. While RSA can...
  The SSL Family of Secure Transaction Protocols for the World Wide Web The Secure Sockets Layer (SSL) protocol was developed by Netscape Communications to provide application-independent secure communication over the Internet for protocols such as the Hypertext Transfer Protocol (HTTP)....






Cincinnati, United States
clear sky
28.6 ° F
31 °
26 °
53 °
63 °
69 °
66 °
68 °