by Reashad Hossain | Dec 11, 2022 | Security
A smurf attack occurs when an attacker sends a spoofed (IP spoofing) PING (ICMP ECHO) packet to the broadcast address of a large network (the bounce site). In the modified packet containing the address of the target system, all devices on its local network respond...
by Reashad Hossain | Dec 11, 2022 | Networking, Security
Diffie Hellman (DH) is a key agreement algorithm describes a means for two parties to agree upon a shared secret over a public network in such a way that the secret will be unavailable to eavesdroppers. The DH algorithm converts the shared secret into an arbitrary...
by Reashad Hossain | Dec 11, 2022 | Security
RSA is a Public Key or an Asymmetric Key cryptographic system DES is a Symmetric Key algorithm, meaning the same key is used for encryption and decryption. DES is a block encryption algorithm. AES is a symmetric algorithm RC5 is a symmetric encryption algorithm. It is...
by Reashad Hossain | Dec 8, 2022 | Security
Role-based Access ControlThe Role-based Access Control (Role-BAC or RBAC) model uses roles or groups to determine access. Subjects are placed into specific roles and object permissions are granted to the roles. Although the Role-BAC model doesn’t provide the...
by Reashad Hossain | Dec 8, 2022 | Security
The Discretionary Access Control (DAC) model provides the most granular level of access control. It is an identity-based (or subject-based) model and allows data owners to assign permissions to subjects at the most basic level. For example, you can assign read...
by Reashad Hossain | Dec 8, 2022 | Security
Access control systems can treat any of the following as subjects:• Users• Computers• Applications• Networks Access control systems can treat any of the following as objects:• Data (stored in files, folders, and shares)• Hardware (such as desktop computers, servers,...