The job of a security analyst is to protect an organization’s data and information from attack by those such as hackers and other criminals looking to steal valuable information from...Read More
Ssl (secure sockets layer) -the secure socket layer is used to establish a secure communication connection between two tcp-based machines. this protocol uses the handshake method. when a connection...Read More
Pptp-2. ipsec-a protocol or set of communication rules called point-to-point tunneling protocol (pptp) has been proposed that would make it possible to create a virtual private network (vpn) through...Read More
Authenticode-the activex code is bundled into a single file called an activex control. activex controls can be digitally signed using microsofts authenticode technology. internet explorer can be...Read More
Lack of security awareness -social engineering attacks work because of the availability heuristic, law of reciprocity, and law of consistency. in the past people have had experiences where a...Read More
Trojan horse -trojan horses are programs that enter a system or network under the guise of another program. a trojan horse may be included as an attachment or as part of an installation program. the...Read More
6-the handshake begins when a browser connects to an ssl-enabled server, and asks the server to send back its identification, a digital certificate that usually contains the server name, the trusted...Read More