Monday, October 26, 2009

Protection on Network Attack

PROTECTION ON NETWORK ATTACK :)

Encryption
Policy ( Rules) - obey the rules.
Software - antivirus, spyware software,password.
Hardware - thumb scan, finger print.
Physical Control - ownself protection of the belonging such as using laptop lock
[ am not very sure what its been called act.. hihihi=)

above are the method used for the vital protection.

ENCRYPTION :

the READABLE text/plain change to unreadable text.

DECRYPTION :

change the UNREADABLE text to plain text.

TYPE OF ENCRYTION:

3 Chipping Step
counting three step forward of the alphabet to become new alphabet.
extra info !!
pioneer of 3 step chipping is Julies Ceasar.


Streganography
hidden word in one extra block of text.
can be break using software called GIF IT UP.
a combination of text and graphic, after being encrypt get the info.
extra info!!
using by AL QAEDA to crush the World Trade Centre.

Digital Drop Box
secret info in the draft email.

No comments:

Post a Comment

OTHERS BLOGGERS =)