Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

614 total results found

Merge all notes

CompTIA Network+

You must manually set $VaultPath before you run the script. $AllFiles = Get-ChildItem -Path $VaultPath -File -Recurse | ForEach-Object { $_.FullName } $MDFiles = $AllFiles | Where-Object {$_ -like "*.md"} $MainPath = "$VaultPath\thebigone.txt" New-Item -Pat...

Overview of Cryptography

CompTIA Security+ Unit 3

The process of writing or solving messages using a secret code. This would be the proper definition of cryptography. However, in computer systems, there is never true secrecy. The existence of information can always be detected on a computer system, one way o...

Asymmetric Encryption

CompTIA Security+ Unit 3

Where encryption and decryption are handled by two different keys. A user will generate a keypair when they want to use asymmetric encryption. One will be public, and the other will be private. The public key will be used to encrypt message being sent to the ...

Rivest-Shamir-Adleman

Documentation

A commonly used asymmetric encryption algorithm used for creating digital signatures.

Elliptic Curve Cryptography

Documentation

A more modern asymmetric encryption algorithm. ECC is able to generate smaller keys and is more secure than other methods. It's being used today to secure websites, their connections, and their data transmissions.

Diffie-Hellman

Documentation

An asymmetric encryption algorithm created to let two users that are stranger to each other to safely create a shared key over a public channel (like the Internet). The Diffie-Hellman exchange process is as follows: The two users agree on a prime number $P...

Digital Signature Algorithm

Documentation

A more modern asymmetric encryption algorithm.

Stream Ciphers

CompTIA Security+ Unit 3

A symmetric encryption method that encrypts data one bit at a time. The stream cipher is based on the one-time pad (OTP) concept that was popular back in WWII days. OTP Characteristics The OTP is a symmetric cipher that uses a secret key to encrypt and decr...

Block Ciphers

CompTIA Security+ Unit 3

A symmetric encryption algorithm that encrypts data in set chunks, with varying chunk sizes. Common sizes range from 64, 128, and 256 bits of length. Notice something? Something about all of them being powers of 2? You know, $2^6$, $2^7$, and $2^8$? When the ...

Blockchain

CompTIA Security+ Unit 3

A unique and increasingly popular implementation of cryptography that was developed in 2008. Blockchain itself is described as the method that a continuously expanding list of transactions are secured using cryptography. In blockchain, each additional record ...

Cryptographic Attacks

CompTIA Security+ Unit 3

There is no such thing as a sure thing when it comes to protecting data stored on computer systems. Encrypting data is only ever relatively secure, but hackers always have a chance of gaining access to encrypted data using a variety of methods. Dictionary At...

GNU Privacy Guard

CompTIA Security+ Unit 3

An encryption tool that encrypts emails, digitally signs them, and also encrypts documents. GPG was an implementation of the Pretty Good Privacy (PGP) protocol. However, PGP is now owned by some random company that will go unnamed. They both follow the OpenPG...

Fast Identity Online

Documentation

An open standard for passwordless authentication. The latest version of FIDO (FIDO2) relies on WebAuthentication (WebAuthn) and Client to Authenticator Protocol 2 (CTAP2) to enable user website, application and/or service login without the use of traditional ...

Smart Card Authentication

CompTIA Security+ Unit 4

The usage of plastic cards (similar to credit cards) to store and use encrypted authentication information. Smart cards use PKI technology to store asymmetric keys, digital signatures, and identification codes. They can authenticate a user when used with a sm...

Linux Group Commands

CompTIA Security+ Unit 4

Manage group accounts and group membership in the Linux operating system. Command Function Flags groupadd Creates a new group. -g (Defines the group ID)-p (Defines the group password)-r (Makes the new group a system group) groupmod ...

Network Federation

CompTIA Security+ Unit 4

The notion that a network needs to be accessible to more than just a well-defined group of employees. Organizations might need to open parts of it network to partners, suppliers, and customers. It's relatively easy to manager your own employees, but managing ...

Windows Software Update Services

Documentation

A patch management tool that allows client on a network to download software updates from an internal WSUS server in their organization. Organizations manage Windows updates from a central management point, and can pick and choose which updates their clients ...

Identity Services Engine

Documentation

A Cisco-owned NAC solution that uses policy-driven decision making to authenticate and authorize devices connecting to a network.