0

Cybersecurity: Summary

Viruses and Malware -- a computer security vulnerability wherein one computer could send another instructions to delete everything on it or take it over, or impersonate another's identity by guessing, cracking, or extracting a password.  
These vulnerabilities will never be rid of, because they are built in the internet's very architecture.

Photo from checkpoint.com




Public-Key Cryptography

  • Begins with a publicly available number
  • Addition of secret numbers, Private number A, to be mixed using;
  • Modular Math, or mathematical operations, with a another number;
  • Private Number B, to create a secret key.

For example, one's email service will use this secret key to transform and scramble your message. It will then transmit your coded message to your recipient, wich will also use this secret key to reverse the transformations and reveal the message you've sent.


Hacking -- "creative" problem-solving that takes advantage of the property of things in unexpected ways. 

Computer Hacking -- "creative" problem-solving that takes advantage of the property of computers and networks in unexpected ways. 

When one hears the word "hacker," it initially gives off a negative connotation, but the role of a hacker is flexible; Hackers can be a range of people, from criminals for theft, government for surveillance workers, to hacktivists for political agendas. Whether they're good or bad depends on why they hack in the first place. 

0 comments:

Post a Comment