What i’ve learnt so far

Principles of ethical hacking

Ethical hacking study patterns techniques and tools of hackers.

You can’t let people hack you. This could be considered an attack to the owner of the domain or an attack to the company rather than just hacking a single person.

The most common attack is finding people passwords. This is most likely because of people using dodgy passwords.

Hackers want passwords to access personal details to either sell of forward on to others to access accounts such as bank accounts and social media.

Ones the hack has a match for your password, they can access all your accounts that use the same password. This is why it is important to use different passwords.

What is encryption?

Creating a barrier so that info can be transported with a sense of privacy and security.

Caesar cipher is one of the most ancient forms of encryptions recorded where the alphabet Is lined up with a certain number ahead of the actual letter he was trying to write. After a while, this was cracked so humans added a different number to each letter to make it much harder to crack.

Keys?

A key can make a code much harder to crack. 10-digit key = Few second for 10 billion combination. 256-bit keys are what we use today to secure messages. 256 won’t be enough in the future because of the speed of computers. Symmetric encryption means both sender and receiver both know the key.

A/symmetric:

The internet Is open so a symmetric key won’t work that’s why we can use an asymmetric key which anyone can access but only you can open. Is the foundation of all internet security.

If you see https in the URL it has a more updated and stronger security process called SSL, unlike http which isn’t as safe.

Secure

Socket

Layer

When you see a lock or https in the browser the computer is running this new updated learning.

Leave a comment

Design a site like this with WordPress.com
Get started