Mastering Cryptography: Ensuring Data Integrity & Detecting Modifications 🔐

Explore essential cryptographic techniques for verifying data integrity and identifying unauthorized modifications. Enhance your security skills today!

Mastering Cryptography: Ensuring Data Integrity & Detecting Modifications 🔐
cybrary
132 views • Jul 3, 2018
Mastering Cryptography: Ensuring Data Integrity & Detecting Modifications 🔐

About this video

Integrity Checking: Modifications

Section 2 continues its focus on Cryptographic tools. For Part 3.3, you’re introduced to the concept of “Integrity Checking” we do this by testing for “Modifications.”

Modifications occur in two ways, accidental/unintentional, and deliberate/intentional, so you’ll explore how this is performed in penetration testing and what tools and practices you should employ when conducting this tests.

You’ll also learn how Accidental or unintentional hacks occur thru Hash transactions, Deliberate and intentional modifications are hacks that target or occur on MACs — MAC, message authentication code, and DS – digital signature.


For more updates :
Subscribe Cybrary.it Here : https://goo.gl/rjJhWe

LIKE | COMMENT | SHARE | SUBSCRIBE
----------------------------------------------------------------------------------

Video Information

Views

132

Duration

7:08

Published

Jul 3, 2018

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.