Mid Term Notes
Last updated
Last updated
CIA - Confidentiality who can access the data, integrity is the data what it's supposed to be, accessability can you access the data.
AAA - Authentication authorization, accounting/auditing
Access Control -
Forms of encryption
Asymmetric vs symmetric
Both encryption methods use keys to encrypt and decrypt data. The main difference is that symmetric encryption uses the same key to encrypt and decrypt data. In contrast, asymmetric encryption uses a pair of keys – a public key to encrypt data and a private key to decrypt information.
ECV
Types of hashing
Sha1 - da39a3ee5e6b4b0d3255bfef95601890afd80709 - 40 character
sha256- 252F10C83610EBCA1A059C0BAE8255EBA2F95BE4D1D7BCFA89D7248A82D9F111 - 64 character
sha 512 - 128 characters
ETC
pkt