Sunday, September 30, 2018

Free Ethical Hacking and Cybersecurity Course

Try this Free Ethical Hacking and Cybersecurity Course




Covered subjects include:


Cybersecurity
Ethical Hacking
Information Security
Application Security
Software Security
Network Security
Disaster Recovery
Hacking
Threats and Attacks
Penetration Testing
End User Education
Encryption

Simply Click the below link "Free Cybersecurity Course" at the end of each section click on "up next" to instantly link to next subject.



Free Cybersecurity Course




Interested in learning to code? Try these Free Code Examples:

Share with Friends


Twitter Facebook Google LinkedIn Email Pinterest Reddit StumbleUpon Tumblr











Friday, September 21, 2018

Encryption

Encryption


Encryption is the process of converting data to an unrecognizable or "encrypted" form.

In encryption the information or message, referred to as plaintext, is encrypted using an encryption algorithm – a cipher – generating ciphertext that can be read only if decrypted.

Cryptography


Cryptography or Cryptology is from the Greek words κρυπτός kryptós, "hidden, secret"; and γράφειν graphein, "to write", or -λογία -logia, "study" Cryptology is the study of codes, or the art of writing and solving them.

Cryptanalysis


Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") is the study of analyzing information systemsin order to study the hidden aspects of the systems. Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages.

Encryption

Encryption is the process of converting plain text into something that appears to be random sometimes called ciphertext.

Decryption

Decryption is the process of converting ciphertext back into plaintext. A Key is often used to create secret codes.



Types of Encryption


Asymmetric-key - or Public Key the encryption key is published or public for anyone to use and encrypt messages. However, only the receiving party has access to the decryption key that is private and enables messages to be read.

Symmetric-key - Private or Secret Key the encryption and decryption keys are the same. Communicating parties must have the same key in order to achieve secure communication.

Examples of asymmetric systems include RSA (Rivest-Shamir-Adleman), and ECC (Elliptic Curve Cryptography). Symmetric models include AES (Advanced Encryption Standard) and DES (Data Encryption Standard).

Hashing - or a Hash Function is the transformation of a string of characters into a usually shorter fixed-length value or key it is always a one-way operation. 

(MACs) Message authentication codes - are much like cryptographic hash functions, except that a secret key can be used to authenticate the hash value.