Define:
1. Cryptography – asymmetric vs. symmetric, examples of modern
cryptographic systems (protocols) use which?
2. Block ciphers – how they work, examples and best uses
3. Encryption vs. Hashing, how they work to together – which areas
in the security triad do they satisfy?
4. How do embedded systems affect security?
5. Ethics and white hat hacking
6. Legal/ethical issues with running some tools “in the wild”
7. Role of routers/firewalls in security
8. DMZ role in security
9. Host IDS, Network IDS
10. Session Hijacking – Explanation
11. Cross site Scripting – Explanation
12. Footprinting – Explanation
13. Enumeration – Explanation
14. Cracking WEP
15. Security in Depth- Be able to explain layers you would put in
place
16. Be able to describe an example of an attacker’s potential plan
to orchestrating an attack from the early stages in
generalities
17. SQL Injections – Explanation
18. Non-technical aspects of an attack
19. Replay attacks
20. Buffer Overflows-Explanation
We need at least 10 more requests to produce the answer.
0 / 10 have requested this problem solution
The more requests, the faster the answer.
Define: 1. Cryptography – asymmetric vs. symmetric, examples of modern cryptographic systems (protocols) use which? 2....