Summary-Signature-PKI-Access Control-DOS-Deception Technology

information summary

Insert image description here

The information digest generated by the hash function
ensures the integrity of the data.

MD5 and SHA-1

digital signature

Insert image description here

unique sender

Based on asymmetric encryption technology (public key and private key technology)

Guaranteed integrity and irreplaceability

PKI

Insert image description here

Digital certificate: contains public key information (public)

Insert image description here

c
Insert image description here

Insert image description here

c

Insert image description here

a

Insert image description here

b
Use the public key sent to decode

Access control

Insert image description here

Access control is a question of permissions.
Legal users log in to the system and have access permissions to which files.
Subject: user
. Object: resource.

Anti-attack technology

DOS is a denial of service attack

Insert image description here

DOS attack: paralyzing servers and disrupting availability

deception techniques

ARP spoofing

Insert image description here

ARP protocol, converts IP address to MAC address

ARP spoofing: achieve the goal by modifying the ARP table

Insert image description here

DNS spoofing

Insert image description here

IP spoofing

Insert image description here

Guess the ISN base value and increasing pattern

おすすめ

転載: blog.csdn.net/qq_41701723/article/details/132722173