Posts

Showing posts from August, 2017

Protecting Employee Data in a Global Corporation

Image
Questions and Answers in case discussion Question 03 a.   Why protecting employee data in global corporation important? In every organization have their own employee database and they maintain their database. The take many actions to protect their databases. The reason of it the database contains employees private data such as email address, salary, phone numbers ect. So every organization maintain their employee data in securely manner. They have responsible for protect their employees privacy. Governments are create some lows to protect personal data. Sometimes loose the privacy of data may be cause to financial loss. b.     Should a corporation which only has employees in the U.S.be worried   about the EU’s Data Protection Directive? Why or Why not? No, The organization pay attention about they own employees if the corporation has US employee only no need to worried about EU lows. They can protect their sensitive data in US rules and laws.

How to hack windows 2000 using nessus.....

Image
What is nessus? Nessus  is a propriety vulnerability scanner developed by tenable network. It is free of charge for personal use in a non-enterprise environment. We use kali Os to hacking windows server, to testing vulnerabilities . ·          In Linux we have to search both Os are in the same network. And search the ip address of each systems.              ·          To windows :Open the terminal and type “ipconfig”                                     ·          To Linux : Open terminal and type      “ifconfig”                                   ·          Ten now we have both ip addresses. Using ping command can check the connection between        each        other.                                     Ex: ping 192.168.55.99 ·          Then both are connected we can start the nessus and can find the vulnerabilities. ·                                        Using “service ness

History of Cryptography.....

Image
                                     ⭐ Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago. Until        recent decades, it has been the story of what might be called classic cryptography — that is, of            methods of encryption that use pen and paper, or perhaps simple mechanical aids.  Over the centuries, various cipher methods, physical devices, and aids have been used to encrypt and decrypt text:  • Scytale      Earliest cryptography method was used by the Spartans in ancient Greece                             • Caesar cipher  Julius caesar use to use to encrypted message to communicate with his generals. He Use shift by 3 times in every letter. If he wants to write letter "A" → he relapsed A with D.                         • Vigenère Cipher  In 1586, Frenchman Blaise de Vigenère described a polyalphabetic system of encryption. It became known as the Vigenère Cipher.   Based on the Caesar ciph