Cyber_Security_Module_2_3
Cyber_Security_Module_2_3
3. Message Authentication:
- Ensures a message is not altered during transmission.
- Example: HMAC (Hashed Message Authentication Code) - Used in banking transactions.
4. Digital Signatures:
- Verifies authenticity of a digital document.
- Example: DSA (Digital Signature Algorithm) - Used in software distribution.
6. Hashing Algorithms:
- Converts data into a fixed-length hash value.
- Example: SHA-256 - Used in Bitcoin transactions.
7. Steganography:
- Hides secret messages in images, videos, or text.
- Example: A text message hidden inside an image file.
Network security protects systems from unauthorized access, attacks, and disruptions.
3. DDoS Attacks:
- Overloads a website/server with excessive requests.
- Example: Botnet attack - Hackers use infected computers to flood a website.