0% found this document useful (0 votes)
12 views

Security Related Topics A. Information Security

The document outlines various topics related to security including classic and modern cryptography techniques, network security protocols, web application authentication and access controls, hacking techniques, and database security measures.

Uploaded by

Akshay Rana
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Security Related Topics A. Information Security

The document outlines various topics related to security including classic and modern cryptography techniques, network security protocols, web application authentication and access controls, hacking techniques, and database security measures.

Uploaded by

Akshay Rana
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Security Related Topics

A. Information Security
1. Classic Cryptography.
1.1 Ceaser Cipher.
1.2 Playfair Cipher.
1.3 Polyalphabetic Cipher (Vigenère Tableau).

2. Symmetric-Key Cryptography (Block Ciphers).


2.1 Data Encryption Standard (DES).
2.2 International Data Encryption Algorithm (IDEA).
2.3 Advance Encryption Standard (AES-128).
2.4 Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher
Feedback (CFB), Output Feedback (OFB), Counter (CTR) Modes.

3. Asymmetric-Key Cryptography.
3.1 RSA (Rivest–Shamir–Adleman) algorithm.
3.2 Diffie–Hellman key exchange (DH).

4. Authentication
4.1 Blind Signature.
4.2 Challenge Response.
4.3 Kerberos.

5. Hashing Function
5.1 Message Digest 5 (MD5).
5.2 Secure Hash Algorithm (SHA-256 / SHA-512)

B. Network Security
1. Secure Socket Layer (SSL7).
2. Transport Layer Security (TLS).
3. Session Hijacking.
4. DNS Poisoning.
5. Pretty Good Protocol (PGP).
6. Firewall.
7. Intrusion Detection System (IDS).

C. Web Application Security


1. Authentication.
1.1 Password.
1.2 Salting.
1.3 Password + Salting + Hash.
1.4 Two Factor Authentication.
1.5 Three Factor Authentication.
2. Access Control.

D. Information Hacking Techniques


1. Denial of Service Attacks (DOS).
2. Backdoors.
3. Trojan Horses.
4. Buffer Overflow.
5. IP Address Spoofing.
6. Network Sniffing.
7. Password Attacks.
8. Keylogger.

E. Database Security
1. SQL Injection.
2. Web Application & SQL Injection.
3. SQL Injection Prevention.

You might also like