Smurf attack vs teardrop attack

A smurf attack occurs when an attacker sends a spoofed (IP spoofing) PING (ICMP ECHO) packet to the broadcast address of a large network (the bounce site). In the modified packet containing the address of the target system, all devices on its local network respond...

what is Diffie Hellman

Diffie Hellman (DH) is a key agreement algorithm describes a means for two parties to agree upon a shared secret over a public network in such a way that the secret will be unavailable to eavesdroppers. The DH algorithm converts the shared secret into an arbitrary...

What are : RSA, DES, AES, RC5, RC4,SHA, MD

RSA is a Public Key or an Asymmetric Key cryptographic system DES is a Symmetric Key algorithm, meaning the same key is used for encryption and decryption. DES is a block encryption algorithm. AES is a symmetric algorithm RC5 is a symmetric encryption algorithm. It is...

Non-Discretionary Access Control

Role-based Access ControlThe Role-based Access Control (Role-BAC or RBAC) model uses roles or groups to determine access. Subjects are placed into specific roles and object permissions are granted to the roles. Although the Role-BAC model doesn’t provide the...

Discretionary Access Control

The Discretionary Access Control (DAC) model provides the most granular level of access control. It is an identity-based (or subject-based) model and allows data owners to assign permissions to subjects at the most basic level. For example, you can assign read...

Access control systems: Subject vs Objects

Access control systems can treat any of the following as subjects:• Users• Computers• Applications• Networks Access control systems can treat any of the following as objects:• Data (stored in files, folders, and shares)• Hardware (such as desktop computers, servers,...