Real-life Public Key Encryption (And Why It Matters)
One major topic in Learning Tree Course 468 System and Network Security Introduction is that of encryption. It is a core technology in cyber security because it is used to secure confidential data, as well as protect passwords and the integrity of documents. There are two basic families of encryption used to ensure the confidentiality […]
Are You Absolutely Certain That You Have The Real Source Code?
Why would you want to build a Linux kernel? Maybe you realize that there’s a local root exploit possible on your kernel version. Maybe you want to take advantage of improved storage performance or extended network capability. Maybe you need a very specific kernel version to support a combination of your motherboard hardware plus network […]
Skeptical Looks at Cryptography
We cannot have cyber security without cryptography! Confidentiality requires encryption of the sensitive data. Integrity is important, hash functions let us detect inappropriate modification of data and system configurations. Authentication of users and hosts can be done in many ways, and the more secure methods involve hash functions, encryption, or some combination of the two. […]