Cryptography Integrity Checking Modifications

Integrity Checking: Modifications Section 2 continues its focus on Cryptographic tools. For Part 3.3, you’re introduced to the concept of “Integrity Checkin...

cybrary•132 views•7:08

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Thailand under the topic 'สภาพอากาศ'.

About this video

Integrity Checking: Modifications Section 2 continues its focus on Cryptographic tools. For Part 3.3, you’re introduced to the concept of “Integrity Checking” we do this by testing for “Modifications.” Modifications occur in two ways, accidental/unintentional, and deliberate/intentional, so you’ll explore how this is performed in penetration testing and what tools and practices you should employ when conducting this tests. You’ll also learn how Accidental or unintentional hacks occur thru Hash transactions, Deliberate and intentional modifications are hacks that target or occur on MACs — MAC, message authentication code, and DS – digital signature. For more updates : Subscribe Cybrary.it Here : https://goo.gl/rjJhWe LIKE | COMMENT | SHARE | SUBSCRIBE ----------------------------------------------------------------------------------

Video Information

Views
132

Total views since publication

Duration
7:08

Video length

Published
Jul 3, 2018

Release date

Quality
sd

Video definition