Skip to main content

Recently Updated Pages

Discovery Protocols

Documentation

An enumeration of some common host discovery protocols. Cisco Discovery Protocol Used in all Ci...

Updated 1 month ago by table!

Application Header

Documentation

aliases: AH A core protocol of IPSec. AH performs a cryptographic hash on the whole pa...

Updated 1 month ago by table!

Encapsulating Security Payload

Documentation

aliases: ESP A core protocol of IPsec. ESP is used to encrypt only the payload, and do...

Updated 1 month ago by table!

Temporal Key Integrity Protocol

Documentation

A security protocol designed to enhance the security of WEP without introducing breaking changes.

Updated 1 month ago by table!

Screened Subnet

Documentation

A network segment that's isolated from the rest of a private network by one or more firewalls tha...

Updated 1 month ago by table!

Block Ciphers

CompTIA Security+ Unit 3

A symmetric encryption algorithm that encrypts data in set chunks, with varying chunk sizes. Com...

Updated 1 month ago by table!

Stream Ciphers

CompTIA Security+ Unit 3

A symmetric encryption method that encrypts data one bit at a time. The stream cipher is based o...

Updated 1 month ago by table!

Digital Signature Algorithm

Documentation

A more modern asymmetric encryption algorithm.

Updated 1 month ago by table!

Transport Layer Security

Documentation

An authentication and encryption service for the TCP/IP stack. Developed from the now obsolete SS...

Updated 1 month ago by table!

Diffie-Hellman

Documentation

An asymmetric encryption algorithm created to let two users that are stranger to each other to sa...

Updated 1 month ago by table!

Elliptic Curve Cryptography

Documentation

A more modern asymmetric encryption algorithm. ECC is able to generate smaller keys and is more ...

Updated 1 month ago by table!

Rivest-Shamir-Adleman

Documentation

A commonly used asymmetric encryption algorithm used for creating digital signatures.

Updated 1 month ago by table!

Overview of Cryptography

CompTIA Security+ Unit 3

The process of writing or solving messages using a secret code. This would be the proper definit...

Updated 1 month ago by table!

Hardware

Documentation

A reference to the physical devices and circuits that make up the different parts of a computer s...

Updated 1 month ago by table!

1.1.7 Internal Components of a PC

CompTIA A+ Unit I

Component List Power Supply Central Processing Unit (CPU) Heatsink Motherboard Memory Modules | ...

Updated 1 month ago by table!

9.3.1 Data Transmission Encryption

CompTIA A+ Unit IX

Learn what network protocols to use to protect data being transmitted over the internet. An attac...

Updated 1 month ago by table!

9.1.2 Common Windows File Locations

CompTIA A+ Unit IX

Learn common file locations that are used in Windows-based systems.o Name Purpose Location ...

Updated 1 month ago by table!

8.6.1 System Backups

CompTIA A+ Unit VIII

Learn about backups and how and when to perform them. A backup is an archived copy of data you ca...

Updated 1 month ago by table!

Malware

CompTIA Security+ Unit 2

Software that serves a malicious purpose, typically installed without the user's consent (or know...

Updated 1 month ago by table!

Social Engineering

CompTIA Security+ Unit 2

Use Loki's tactics to convince unsuspecting users to provide sensitive data or to violate securit...

Updated 1 month ago by table!