Cryptography rules our world
- Hack first and deploy later
- Detect Respond Prevent Verify
- Split the network, compartmentalized (networking)
- Action: Combine feeds at scale
- DDOS Attack (Denial of Service Attack) Example ping death
- Kill Chain
- Sending out HTTP errors post login on fake website (example 400 errors)
- Dutch legislation: Co-ordinated Vulnerability Disclosure
- Individual hackers, hactivists, criminals, geopolitical state hackers
- IOT : low security and they’re connected all the time
- No authentication for IOT systems
- PGP (A symmetric keys)
- Kerchhoff System
- Networking: Hndshake between 2 networks (TLS Handshake Protocol)
- Algorithms (RSA, AES, ECDHE, SHA256)
- p = 11
- q = 29
- n = 11*29 = 319
- e=3: Public key : (p-1)(q-1)
- d=187:private key : (p-10(q-1)3*mod280=1
- OR use Wolfram Alpha Calculator
- AES Algorithm: faster than RSA
- Quantum Computing:
- https://github.com/KPN-CISO/