weekly summary- week 3

Weekly summaries week 3

No computer forensics 

Computer security-
different authentication protocols- aliveness, mutual communication and message agreement
1 way and two way protocols

encryption and decryption through the use of public and private keys

Computer forensics and cryptography-
Registry- including the hives and what they mean/represent

FTK imager use in lab session

SYSDA-
passwords and the hash functions used in Unix systems
access control
dictionary attacks

lab session- performed dictionary attack
matching hash for password

Comments