preview

Is4560

Better Essays

Asymmetric Encryption Encryption that uses two keys: if you encrypt with one you may decrypt with the other MD5 Message Digest 5. A hashing funciton used to provide integrity. MD5 uses 128 bits. A hash is simply a number created by applying the algorithm to a file or message at different times. The hashes are compared to each other to verify that integrity has been maintained. IPSec 1) Set of protocols developed to support the secure exchange of packets IPv4 and IPv6 2) Operates at a low level in the OSI model (Layer 3) 3) Transparent security protocol for applications, users, and software OSI Model 7.Application 6.Presentation 5.Session 4.Transport 3.Network 2.Data 1.Physical OSI Model Layer 3-Network Handles …show more content…

Dsniff is highly effective for sniffing both switched and shared networks. It uses the arpredirect and macof tools for switching across switched networks. It can also be used to capture authentication information for FTP, telnet, SMTP, HTTP, POP, NNTP, IMAP, etc. Netstat Netstat shows IP-related statistics including: * Current connections * Incoming and outgoing connections * Active selections, ports, and sockets * The local routing table Netstat is used to view protocol connections that have been established by the system, as well as what incoming TCP/IP ports are in use by the system. Scareware / Adware Adware: software specifically designed to display ads in the form of popups or nag screens Scareware: malware designed to trick victims into purchasing and downloading useless and potentially dangerous software worm a type of virus that spreads itself, not only from file to file, but also from computer to computer. the primary difference between a virus and a worm is that a virus must attach to something. such as an executable file, in order to spread. worms do not need to attach to anything to spread and can tunnel themselves into computers. Virus Code that attaches itself to a program that is designed to cause malfunctioning of a computer or damage the data stored on the computer. bluejacking sending unsolicited messages to another device using Bluetooth to get the recipient to open

Get Access