Tuesday, January 25, 2011

Security Attack

masalah yg sering dihadapi oleh Windows;
  1. Virus
  2. Trojan
  3. IP Starting
  4. D-Dos

cara utk hack/scan komputer lain
  1. SQL injection
  2. Scanner
software lain yg blh digunakan
  1. IP Scanner / IP Anggry
  2. Wireshark
  3. nmap
  4. Brutus
  5. netstanble (utk wireless)
  6. GFI LBN
  7. netcut
  8. kismet
cara utk menangani Security Attack
  1. Antivirus
  2. Firewall
  3. Encryption
  4. IP Segmentation
  5. IP Security (IPSec)
Perbezaan ant Hashing. Symmetric dan Asymmetric

  • Symmetric encryption may also be referred to as shared key or shared secret encryption. In symmetric encryption, a single key is used both to encrypt and decrypt traffic.  
  • Common symmetric encryption algorithms include DES, 3DES, AES, and RC4.
  • Symmetric encryption algorithms can be extremely fast, and their relatively low complexity allows for easy implementation in hardware. Asymmetric encryption is also known as public-key cryptography.
  • Asymmetric encryption differs from symmetric encryption primarily in that two keys are used: one for encryption and one for decryption.
  • The most common asymmetric encryption algorithm is RSA.
    • Compared to symmetric encryption, asymmetric encryption imposes a high computational burden, and tends to be much slower.
    • Hashing is a form of cryptographic security which differs from encryption.
    • Whereas encryption is a two step process used to first encrypt and then decrypt a message, hashing condenses a message into an irreversible fixed-length value, or hash
    • Two of the most common hashing algorithms seen in networking are MD5 and SHA-1.

    • Hashing is used only to verify data; the original message cannot be retrieved from a hash.

    No comments:

    Post a Comment