Interview Questions for Ethical Hacking – Chapter 1

Q.1. How will you explain a newbie or beginner about what is cyber security? A.1. Cyber security can be defined as the calculated measures taken to protect the systems that are inter-connected to software and online applications, hardware and storage from cyber attacks.   Q. 2. What is vulnerability? A.2. Vulnerability in any system or application can be said to as the weakness or flaw that can let intruders or bugs penetrate the system, causing major threat.

Read more

Digital Signatures

Introduction: – In the previous tutorial, you have learned about the different ways of message authentication schemes and techniques. In this tutorial you will learn more about the authentication of digital messages and documents.   What is Digital Signature: – Digital signature is a mathematical model implemented for validating the integrity and authenticity of any information, message, e-documents or software. You can say it as digitally equivalent of handwritten signature or the stamp-seal being made in papers and hard copies. But

Read more

Authentication of Message

Introduction: – In the earlier chapters, you have learned about the various types and sub types of encryption technique along with their names. There are more in cryptography and cryptographic techniques that deals with the integrity of data and their threats. There is another type of data threat which is lack in authentication of message. In this case of threat the user is not sure whether the message he/she received is from the originator (one who has origin or created

Read more

Asymmetric Key Encryption

Introduction: – In the earlier tutorial you have learned about the symmetric key encryption and also saw some of the examples and algorithms associated with it. In this tutorial, you will see another type of encryption technique – the asymmetric key cryptography. These techniques are also dependent on the number of keys used and in which form. Asymmetric Key Cryptography: – Asymmetric Key Encryption: These are special encryption technique which is having 2 keys, the public and the private key.

Read more

PKI and Digital Certificates

Introduction: – In this tutorial you will learn about some distinct properties and uses of some security services. Yes, I’m talking about the PKI and Digital Certificates. So, let us dig deep into it.   PKI (Public Key Infrastructure): – PKI is a service that allows internet users and other public networks in having a secured communication, data or monetary exchange, or even files exchanging. This is done through a key pair combination, public and private keys sanctioned by any

Read more