Skip to main content
Stuff

Cyber Heroes Program Day: 1

By March 18, 2019No Comments

Cryptography rules our world

 

  1. Hack first and deploy later
  2. Detect Respond Prevent Verify
  3. Split the network, compartmentalized (networking)
  4. Action: Combine feeds at scale
  5. DDOS Attack  (Denial of Service Attack) Example ping death
  6. Kill Chain
  7. Sending out HTTP errors post login on fake website (example 400 errors)
  8.  Dutch legislation: Co-ordinated Vulnerability Disclosure
  9. Individual hackers, hactivists,  criminals, geopolitical state hackers
  10. IOT : low security and they’re connected all the time
  11. No authentication for IOT systems
  12. PGP (A symmetric keys)
  13. Kerchhoff System
  14. Networking: Hndshake between 2 networks (TLS Handshake Protocol)
  15. Algorithms (RSA, AES, ECDHE, SHA256)
  16.  p = 11
  17. q = 29
  18. n = 11*29 = 319
  19. e=3: Public key : (p-1)(q-1)
  20. d=187:private key : (p-10(q-1)3*mod280=1
  21. OR use  Wolfram Alpha Calculator
  22. AES Algorithm: faster than RSA
  23. Quantum Computing:
  24. https://github.com/KPN-CISO/

 

 

Leave a Reply