Misc Security
What is Diffie-Hellman? What is it used for? How is it different from the encryption methodology used in RSA? What is the Diffie Helman key vulnerable to? Is there any reason why it should be preferred over the RSA method? In what circumstances could one chose to use RSA over the Diffie Hellman method? |
- 472 views
- 1 answers
- 0 votes
Is it true that Linux is better placed than Windows with respect to security. Windows being a proprietary software is more secure as hackers would find it more difficult to see the code and therefore exploit its weaknesses. What are the reasons then for the belief that Linux systems are more secure? |
- 525 views
- 1 answers
- 0 votes
I am in the information security business and I would like to know the sources which I can refer to to be on the top of things on matters related to Information Security. Please refer me to some valid sources of information in this area. Is there something on Reddit, Twitter etc.that I can refer to? |
- 560 views
- 2 answers
- 0 votes
What is encoding? How is it different from Encryption? What are the types of encoding which are commonly used? What is Tactile encoding? On what basis do we select the type of encoding to be used? Can you please explain me the process used for encoding? What is sequence memory and how is it used in the encoding process? |
- 597 views
- 1 answers
- 0 votes
What is an Open source web application project in Security? Is it more or less secure than a proprietary one? What could be the downside of an open source project and what could be done better to overcome the shortcomings? What are its advantages? Do you see any downside for a proprietary project? |
- 632 views
- 2 answers
- 0 votes
What is public key cryptography? Is it the same as asymmetric cryptography? Public key cryptography uses public key and a private key for encryption. What is the function of each of these components? What is key distribution in the context of this. What is a digital certificate used for? What is Enveloped Public Key Encryption? |
- 549 views
- 1 answers
- 0 votes
What is browser hijacking software? What would it do to my system? Where would I most likely find it? How can I identify one when I see it? Is it some sort of malware? Please share some tips on how to protect my home PC from falling prey to the issues caused by malware. |
- 1029 views
- 2 answers
- 1 votes
What is a three way handshake? What are the three components of a 3 way handshake? What is a denial of service attack? How can the 3 way handshake method be used to create a denial of service attack? What is the consequence of a DOS attack? What can you do if your system comes under a DOS attack?
- 528 views
- 1 answers
- 0 votes
What is information protection? Name some methods used to implement the same in an organization. What should an information protection policy define? What does Information Assurance deal with? Name the techniques used in the Information Assurance method? What forms of data protection is implied this method? What is information Risk Management?
- 646 views
- 2 answers
- 0 votes
I want to beef up security on my server network. I need to install an intrusion detection system which will prevent hackers from taking over the network or compromising it. Could you advise me on the best system I can deploy in a Windows environment to ensure that anyone who attempts to intrude or by-pass security protocols will be prevented from doing so?
- 619 views
- 1 answers
- 0 votes