system security
Analysis of test points
Generally not beyond the scope
Basic knowledge of information security (key)
Five basic elements are often examined
: Confidentiality: Encrypted messages
Integrity: The combination of message digest and digital signature technology, checksum technology
Availability: Use of denial-of-service attacks to disrupt availability
Controllability
: Use of logs
Information storage security
cyber security
The composition framework of information security system
Technology System
d
d
b
c
Information security technology
Not much investigation, just understanding
Symmetric encryption technology
inspection
Encryption algorithms are:
DES
3DES
AES
RC-5
IDEA
asymmetric encryption
Public key-private key (public key encryption algorithm)
Only you have the private key, the public key is public
Encrypt using the recipient's public key
Common public key encryption algorithms include; RSA, ECC
Comparison of symmetric keys and asymmetric keys
Digital envelope: combines symmetric encryption and asymmetric encryption
1 uses an asymmetric encryption algorithm to transfer the key (the key of symmetric encryption)
2 uses a symmetric encryption algorithm to transfer data