only works one way (irreversible) - applying algorithm to message, message hash/digest is
created. If same hashing algorithm is applied to message digest, it will not result in the
original message.
1) Creates a fixed-length output usually smaller than original message
2) Used to verify the integrity of the message (not security)
Give this one a go later!
, Hashing
designed to improve speed of retrieving most common or recently visited web pages
Give this one a go later!
Web Cache server
intended for power failures that last for longer periods - normally coupled with other devices
such as uninterruptible power Supply (UPS) to compensate for power loss until alternate
power supply becomes available
Give this one a go later!
Alternative Power Supplies
penetration testers provided with info related to target and network design and target's IT
team is aware of testing
Give this one a go later!
Targeted Testing
,good antivirus software, but need to be updated periodically to remain effective
Give this one a go later!
Vaccines
timing of two events and an action that causes one event to happen later than expected
Give this one a go later!
Race Condition exploit
utilizes a simple transmission model without implicit handshaking routes for providing
reliability, ordering, or data integrity - provides unreliable service and datagrams may arrive
out of order, appear duplicated, or get dropped
1) Assumes error checking and correction either not necessary or performed in app, avoiding
overhead of such processing in network level
Give this one a go later!
User Datagram Protocol (UDP)
reconnaissance technique that gathers info about target before the attack - used to
determine address
, Give this one a go later!
Port Scanning
protocol used to establish a secure, encrypted, command-line shell session, typically used
for remote logon
Give this one a go later!
Secure Shell (SSH)
(ensures integrity) configuring it to the most secure manner (installing latest security patches,
defining access controls, authorization for users and admins, disabling insecure options and
uninstalling unused services) to prevent nonprivileged users from gaining right to execute
privileged instructions to risk integrity of OS
Give this one a go later!
Hardening
encryption key is changed frequently, reducing risk of key being compromised and message
being decrypted
vi. Static Keys: using same key for long time - risk of compromise
Give this one a go later!
Dynamic Keys
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller codersimon. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.00. You're not tied to anything after your purchase.