cryptanalysis - is what the general public refers to as "breaking the code, modification - The attack is related to integrity , interception - The attack on confidentiality, masquerade - the attack that uses a fake identity, dos - The atttack which attempt prevent legitimate user from accessing the services , access control - Various method for enforcing resource access privileges, hacker - The one who is only interested in penetrating into your system, transposition - Elements in the plaintext are rearranged , substitution - Each element in the plaintext is mapped into another element, brute force - The attacker tries every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtain,

NETWORK SECURITY AND CRYTOGRAPHY

autors:

Līderu saraksts

Vizuālais stils

Iespējas

Pārslēgt veidni

Atjaunot automātiski saglabāto: ?