Encryption

Encryption is creating a system for barrier so that information can be shared or transported with some sense of security and control.

Caesar’s Cipher is one of the most ancient recorded forms of encryption where we have the alphabet lined up against a number or position so that we can send a secret message. It was a useful way, but it is simple which means it can be cracked and once it is cracked It is always cracked as their was only 26 ways.

Symmetric encryption is where the receiver and sender share, use and know the same key

Asymmetric encryption has a public key and a private key. The public key can be shared with anybody and is used to encrypt data and can only be decrypted with a computer that knows the public key. Private keys only you know to get to the messages sent through the public key. Asymmetric encryption is used to protect information and keep it safe and is the foundation of all security on the internet.

If you see https in the URL then that has a more updated and stronger security posture/protocol as it has SSL whereas just http does not have SSL and it not updated in their security.

Principles of Ethical Hacking

Ethical hacking is when we study the techniques and tools of hackers. Hacking will not ever be allowed, even if you are allowing your friend the website they are hacking will not know that is your friend and think that it is just a general hacker. The most likely hack is an attack on passwords that are weak. With passwords are useful to hackers as when combined with other personal details such as names, birthdates or email addresses, the hacker will be able to get other account details. When they have one password for an account it is run through other your accounts and this is what might make your details vulnerable. If you put a password into one account and that company gets breached your password then can be taken from that company and hackers will have access to that information.

Design a site like this with WordPress.com
Get started