weekly summary- week 3
Weekly summaries week 3
No computer forensics
Computer security-
different authentication protocols- aliveness, mutual communication and message agreement1 way and two way protocols
encryption and decryption through the use of public and private keys
Computer forensics and cryptography-
Registry- including the hives and what they mean/represent
FTK imager use in lab session
SYSDA-
passwords and the hash functions used in Unix systemsaccess control
dictionary attacks
lab session- performed dictionary attack
matching hash for password
Comments
Post a Comment