Biba model in simple terms

The Biba model, another MAC-based model, enforces integrity (unlike the Bell-LaPadula model, which enforces confidentiality). Biba includes two rules that are reversed from the Bell-LaPadula model: Simple Integrity Axiom—no read down :  Subjects granted...

Bell-LaPadula model in simple terms

David Elliott Bell and Leonard J. LaPadula designed the Bell-LaPadula model with a primary goal of ensuring confidentiality. It enforces security through two primary rules, commonly called no read up and no write down. Each of these rules compares the subject’s...

Smurf attack vs teardrop attack

A smurf attack occurs when an attacker sends a spoofed (IP spoofing) PING (ICMP ECHO) packet to the broadcast address of a large network (the bounce site). In the modified packet containing the address of the target system, all devices on its local network respond...

what is Diffie Hellman

Diffie Hellman (DH) is a key agreement algorithm describes a means for two parties to agree upon a shared secret over a public network in such a way that the secret will be unavailable to eavesdroppers. The DH algorithm converts the shared secret into an arbitrary...