Mid Term Notes

CIA - Confidentiality who can access the data, integrity is the data what it's supposed to be, accessability can you access the data.

AAA - Authentication authorization, accounting/auditing

Access Control -

https://champlain.instructure.com/courses/2028046/files/254932183/download?download_frd=1

Forms of encryption

https://champlain.instructure.com/courses/2028046/files/254932239/download?download_frd=1

Asymmetric vs symmetric

Both encryption methods use keys to encrypt and decrypt data. The main difference is that symmetric encryption uses the same key to encrypt and decrypt data. In contrast, asymmetric encryption uses a pair of keys – a public key to encrypt data and a private key to decrypt information.

ECV

Types of hashing

Sha1 - da39a3ee5e6b4b0d3255bfef95601890afd80709 - 40 character

sha256- 252F10C83610EBCA1A059C0BAE8255EBA2F95BE4D1D7BCFA89D7248A82D9F111 - 64 character

sha 512 - 128 characters

ETC

pkt

Last updated