Question

In your own words, describe the following concepts: 1. Certificate authority 2. Whitelist 3. Passive fingerprinting 4. Spywar
0 0
Add a comment Improve this question Transcribed image text
Answer #1

a) Certificate Authority: The certificate authority is the most trusted entity that helps in managing and issues the security certificates and the public keys which are generally used for the secured communication in the public network. The certificate authority is a part of the public key encryption and the registration authority that verifies the information provided by the requester of the digital certificate.

b) Whitelist: The whitelist is nothing but the list of items or users or traffics that are being granted access to the certain system or protocol. The whitelist is being used when all the entities have been denied access expect the whitelist. The whitelisting is mostly used in email filtering by only allowing the emails coming from a whitelisted source. Even in terms of firewall, the whitelisted traffic will only grant the access others will be denied.

c) Passive Fingerprinting: The passive fingerprinting is the method used to learn more about the enemy withing letting them know. Mostly, the operating system and other characteristics of the remote host are determined using the sniffer traces. The method will not provide cent percent results but yet considered effective.

d) Spyware: Spyware is nothing but the unwanted application which infiltrates the computer systems, and even steal the data and other sensitive information. Spyware is a type of malware designed to gain access and even results in damaging your system files without the user's knowledge.

e) clickjacking: Clickjacking is also known as the UI redress attack, and the term given to it when an attacker use multiple transparent layer in order to trick the user and letting the user clicking on a button or even link on another page. The attacker then hijacks the click meant for the page and routing those into another page, that is mostly owned by other application.

Add a comment
Know the answer?
Add Answer to:
In your own words, describe the following concepts: 1. Certificate authority 2. Whitelist 3. Passive fingerprinting...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT