Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cryptography and system security (Introduction and number theory…
Cryptography and system security
System security
Buffer overflow
Cross site Scripting
SQL Injection
malvares
Rootkits
Logic Bombs
Trojans
Worms
Viruses
Format String
Introduction and number theory
substitution cipher
transposition cipher
vulnerability and its types
security mechanism
euclid's algorithm
security services
extended euclid's algorithm
security goals
symmetric and asymmetric key cryptography and key managemnet
Stream cipher
Public key cryptography
RSA Algorithm
AES
DES algorithm
block cipher
Diffie helllman key exchangealgorithm
Network security and application
Spoofing technique
ARP Spoofing
IP Spoofing
DNS Spoofing
Source address spoofing
flooding
TCP/ Syn flood
ICMP Flood
UDP flood
DOS Attack
TCP/IP Layers vulnerability
internet security protocols
SSL
FIREWALL
IPSEC
IDS
HONEY POTS