ITM 820 Study Guide - Midterm Guide: Boot Sector, Logic Bomb, Clickjacking

238 views2 pages

Document Summary

Data link layer: frame, transport segement , network link. E(cid:374)(cid:272)(cid:396)yptio(cid:374): it"s a se(cid:272)(cid:396)et, you (cid:374)eed a key; alog(cid:396)oith(cid:373) Hexa to bin, (543)base 5, wrong would needa be (543) base6. 5 and 4: convert to binary so 101 and 100. 5 or 4 : 100, 100 = 101 : (5) base 10. Confidentiality other person, privacy is personal info. Active attack: doing an attack to the system. Human attack surface e. x is social engineering, network: dos attack, software: sql injection. Asymmetric encryption: 1 key for encrypt, 1 key decrypt. Data block length aes is 128 bit. Mono alpha sub: algorithm replace 1 letter for 1 letter. One time pad: relationship between plaintext and key length is it should be the same. Whe(cid:374) it"s a u(cid:374)i(cid:395)ue output e(cid:448)e(cid:396)yti(cid:373)e a(cid:374)d sa(cid:373)e i(cid:374)put, output is same. Collision if 2 diffe(cid:396)e(cid:374)t i(cid:374)put, sa(cid:373)e output. Verified by public key, signed using private key. Output feedback encryption method: k5 = iv so: (((((iv)k)k)k)k)k)