- Virus
- Trojan
- IP Starting
- D-Dos
cara utk hack/scan komputer lain
- SQL injection
- Scanner
software lain yg blh digunakan
- IP Scanner / IP Anggry
- Wireshark
- nmap
- Brutus
- netstanble (utk wireless)
- GFI LBN
- netcut
- kismet
cara utk menangani Security Attack
- Antivirus
- Firewall
- Encryption
- IP Segmentation
- IP Security (IPSec)
Perbezaan ant Hashing. Symmetric dan Asymmetric
- Symmetric encryption may also be referred to as shared key or shared secret encryption. In symmetric encryption, a single key is used both to encrypt and decrypt traffic.
- Common symmetric encryption algorithms include DES, 3DES, AES, and RC4.
- Symmetric encryption algorithms can be extremely fast, and their relatively low complexity allows for easy implementation in hardware. Asymmetric encryption is also known as public-key cryptography.
- Asymmetric encryption differs from symmetric encryption primarily in that two keys are used: one for encryption and one for decryption.
- The most common asymmetric encryption algorithm is RSA.
- Compared to symmetric encryption, asymmetric encryption imposes a high computational burden, and tends to be much slower.
- Hashing is a form of cryptographic security which differs from encryption.
- Whereas encryption is a two step process used to first encrypt and then decrypt a message, hashing condenses a message into an irreversible fixed-length value, or hash.
- Two of the most common hashing algorithms seen in networking are MD5 and SHA-1.
- Hashing is used only to verify data; the original message cannot be retrieved from a hash.
No comments:
Post a Comment