Tag: encryption

Guarding the Digital Realm: Essential Tips for Keeping Your Information Safe

In today’s digital world, where data breaches and cyberattacks seem to be in the news constantly, keeping your information secure is more important than ever. Whether you’re protecting personal data or managing a company’s sensitive information, there are some key practices that can help shield your digital life from harm. Think of these as your …

Continue reading

German Enigma Machine

This is a four rotor Enigma machine that was created by German around the time of 1943-1944.  Germany built this rare Enigma for its ally, Japan.  You can tell by both the character and the fourth rotor.  Germany was unaware that Britain had cracked the Enigma they added the fourth rotor in 1942 to strengthen …

Continue reading

International Spy Museum Army Cipher Device

At the International Spy Museum located in Washington D.C. there are many interesting things that can be found.  Here is a graphic depicting an Army cipher device.

Security Concerns of a Collaboration System

[Abstract] The purpose of this document is to analyze the collaboration system that is to be migrated into the Kucera Clothier‚Äôs company and identify security concerns with the system, as well as, identify methods to minimize the risk of an incident of unauthorized access to company information. This document is intended for anybody looking to …

Continue reading

Areas Digital Forensic Investigators Find Evidence

[Abstract] The purpose of this document is to provide a basic understanding of computer forensics by identifying five areas in computers and computer applications a forensic investigator can look for digital evidence. Also included within this document are three types of criminal investigations that can utilize the services of computer forensic investigators. Lastly, a description …

Continue reading

Challenges Forensic Investigators Face

[Abstract] The purpose of this document is to provide a basic understanding of computer forensics by identifying five technology-related challenges that digital forensics investigators are faced with. Also included within this document are solutions to resolve each of the challenges. This document is intended for anybody looking to gain a basic knowledge or understanding of …

Continue reading

Internet Protocol Security (IPsec)

Abstract The purpose of this document is to provide a basic knowledge and understanding of the Internet Protocol Security otherwise known as IPSec to include additional protocols that are used as part of the IPsec suite. This document is intended for anybody looking to gain a basic knowledge and understand of what IPSec is and …

Continue reading

Pretty Good Privacy

Abstract The purpose of this document is to provide a basic understanding Pretty Good Privacy (PGP) and how it applies to message security. Also included within this document is an explanation to provide a basic understanding of what functions PGP performs to ensure a message is secured. Finally this paper explains why the first two …

Continue reading

Message Authentication

Abstract The purpose of this document is to define message authentication, as well as, to identify different types of attacks that message authentication was designed to protect against. This document is intended for anybody looking to gain a basic knowledge or understanding of message authentication. Content A Message Authentication Code (MAC) is a short piece …

Continue reading

Public-key Cryptography

Abstract The purpose of this document is to provide a basic understanding of public-key cryptography. Also included within this document is a description of the basic components to the public-key cryptography system. This document is intended for anybody looking to gain a basic understanding or knowledge of public-key cryptography. Content When the Internet was first …

Continue reading

Data Encryption Standard and 3DES

Abstract The purpose of this document is to explain how Data Encryption Standard (DES) works and why 3 DES is now used. Also included within this document is an explanation of why the middle portion of 3DES is a decryption instead of an encryption. The last item talked about within this document is a nonce …

Continue reading

Link and End-to-End Encryption Techniques

Abstract The purpose of this document is to provide fundamental differences between link and end-to-end encryption techniques. Also included within this document is a description of traffic padding and what its fundamental purpose is. The last item that can be found within this document is a description of differences between a session key and a …

Continue reading

Encryption Techniques

[Abstract] The purpose of this document is to analyze cryptographic transposition techniques by showing a few examples of some different techniques. The next portion of this document is to provide an answer to the question ‚ÄúIs it possible to decrypt the message that was encrypted with a two-stage transposition technique with a different key?‚Äù The …

Continue reading

Hardening OS X

[Abstract] The purpose of this document is to provide a basic understanding of operating systems and vulnerabilities with hardening practices for ensuring Apple’s operating system OS X is secured. Also included within this document are methods for ensuring that a web server is secured. [Content] “Every Mac is secure right out of the box,” thanks …

Continue reading

Disposition of Sensitive Information

[Abstract] The purpose of this document is to provide a summary of the article entitled “Disposition Of Sensitive Automated Information” as the author understands this article. Also included within this document is an explanation of how disk encryption can help to protect the information on that disk in the event it was lost or stolen. …

Continue reading

Financial Institutions Handle Privacy

[Abstract] The purpose of this document is to analyze why many financial institutions assess privacy as a compliance issue as opposed to a risk management issue. Included within this document are two different current regulations to help consumers protect their privacy. Also included within this document is an example of the primary causes of network …

Continue reading

Information System Controls

[Abstract] The purpose of this document is intended to look at a course registration system within a university and argue which controls should be inputted into that system to ensure the system is not being abused. Also included within this document is an argument for which controls should be put into place to ensure students …

Continue reading

Home Wireless Network Users Need to Properly Secure Their Networks From Threats

In recent years, technology has been rapidly developing. This development introduced us to the Internet, commercial networks, and even home networks to move towards using wireless networks. In America, home networks are the vast majority of users on the Internet. Since home networks are the majority of users on the Internet, you will learn about …

Continue reading

CompUSA Never Ceases to Amaze

Today I was scheduled to take the Microsoft 70-290 exam. I went over to the CompUSA testing center and went in to take the test. When I got there I found out the test proctor’s husband had a stroke and she was unable to give the test. You would think CompUSA would have planned for …

Continue reading