-
Book Overview & Buying
-
Table Of Contents
Modern Cryptography for Cybersecurity Professionals
By :
In this chapter, we outlined the importance of protecting encryption protocols, processes, and cryptographic techniques. We saw how attacks such as an MiTM attack or a brute-force attack on encrypted data can minimize or negate the effectiveness of these techniques. We discussed Kali Linux, a freely available suite in a hacker's arsenal, which contains hundreds of tools. We then reviewed the dangers of how implementing a weak cipher, such as WEP, can lead to the exposure of data.
We then took a look at some of the attacks against the PKI, which is a framework or infrastructure that is essential for securing data effectively. We saw how various attacks, such as an SSL/TLS strip and DoS attacks, can render the cryptographic processes, elements, and algorithms in PKI useless.
We finished with a discussion on how, over time, there have been advances in computing, with one of these advances being quantum computing. We learned that, because of the power of quantum computing...
Change the font size
Change margin width
Change background colour