Summary-Signature-PKI-Access Control-DOS-Deception Technology
information summary
The information digest generated by the hash function
ensures the integrity of the data.
MD5 and SHA-1
digital signature
unique sender
Based on asymmetric encryption technology (public key and private key technology)
Guaranteed integrity and irreplaceability
PKI
Digital certificate: contains public key information (public)
c
c
a
b
Use the public key sent to decode
Access control
Access control is a question of permissions.
Legal users log in to the system and have access permissions to which files.
Subject: user
. Object: resource.
Anti-attack technology
DOS is a denial of service attack
DOS attack: paralyzing servers and disrupting availability
deception techniques
ARP spoofing
ARP protocol, converts IP address to MAC address
ARP spoofing: achieve the goal by modifying the ARP table
DNS spoofing
IP spoofing
Guess the ISN base value and increasing pattern