Cryptography: Concepts and Examples

Cryptography involves many topics and theories. This article covers topics including Symmetric Encryption Algorithms (also known as block ciphers), Hash Functions, Message Authentication Code (MAC), Authenticated Encryption (AE), Modes of Operation, Common Cryptography Terms, Cryptographic Applications, Approval Status, Random Number Generators, Seeds and XOR Calculation. Keyless Algorithms Keyless algorithms do not use a secret key … Read more

Vulnerability Management with Nmap and Netdiscover

Nmap is a network scanning tool often used for vulnerability management. It can discover hosts and services on subnets accessible by the scanner. Through Nmap, vulnerability researchers and auditors can assess system vulnerabilities within a corporate environment and formulate remediation plans. This article looks at Nmap commands and explains their usages and differences.

Threat Management: Concepts and Examples

Threat Management helps organizations manage risks and comply with industrial standards and regulations. It includes identifying threats, formulating strategies and developing mitigation measures. Various frameworks and standards are designed for managing an organization’s security posture. This article discusses threat management concepts and provides examples of their applications. Zero-day Zero-day vulnerabilities refer to software flaws unknown … Read more