Bell-LaPadula model in simple terms

David Elliott Bell and Leonard J. LaPadula designed the Bell-LaPadula model with a primary goal of ensuring confidentiality. It enforces security through two primary rules, commonly called no read up and no write down. Each of these rules compares the subject’s...

Smurf attack vs teardrop attack

A smurf attack occurs when an attacker sends a spoofed (IP spoofing) PING (ICMP ECHO) packet to the broadcast address of a large network (the bounce site). In the modified packet containing the address of the target system, all devices on its local network respond...

what is Diffie Hellman

Diffie Hellman (DH) is a key agreement algorithm describes a means for two parties to agree upon a shared secret over a public network in such a way that the secret will be unavailable to eavesdroppers. The DH algorithm converts the shared secret into an arbitrary...

What are : RSA, DES, AES, RC5, RC4,SHA, MD

RSA is a Public Key or an Asymmetric Key cryptographic system DES is a Symmetric Key algorithm, meaning the same key is used for encryption and decryption. DES is a block encryption algorithm. AES is a symmetric algorithm RC5 is a symmetric encryption algorithm. It is...

Non-Discretionary Access Control

Role-based Access ControlThe Role-based Access Control (Role-BAC or RBAC) model uses roles or groups to determine access. Subjects are placed into specific roles and object permissions are granted to the roles. Although the Role-BAC model doesn’t provide the...