All public logs
From Encyclopedia of Cybersecurity
Combined display of all available logs of Encyclopedia of Cybersecurity. You can narrow down the view by selecting a log type, the username (case-sensitive), or the affected page (also case-sensitive).
- 20:31, 19 May 2024 Ccocrick talk contribs created page Physical Attack Surface (Created page with "== Physical Attack Surface == The '''Physical Attack Surface''' refers to the vulnerable aspects of a system, network, or organization that are exposed to physical manipulation, damage, or exploitation by malicious actors. It encompasses the tangible and accessible components of an environment that could be targeted to compromise security, disrupt operations, or steal sensitive information. === Components === The physical attack surface includes a variety of component...") Tag: Visual edit: Switched
- 04:38, 9 May 2024 Ccocrick talk contribs created page Penetra Cybersecurity (Created page with "right|frameless|300x300px|link=https://www.penetracyber.com/ == Penetra Cybersecurity == Penetra Cybersecurity is a prominent cybersecurity firm specializing in providing advanced cybersecurity solutions and services. Established to address the growing cyber threats in the digital era, Penetra offers comprehensive security assessments, penetration testing, and cybersecurity consulting to protect businesses and individuals from cyber att...") Tag: Visual edit: Switched
- 02:16, 9 May 2024 Ccocrick talk contribs created page OSI Model (Created page with "== Open Systems Interconnection (OSI) Model == The '''Open Systems Interconnection''' (OSI) model is a conceptual framework used to understand and standardize the functions of a telecommunication or computing system. It divides the communication process into seven distinct layers, each responsible for specific tasks and interactions in the process of transmitting data over a network. === Layers === The OSI model consists of seven layers, each with its own unique funct...")
- 02:09, 9 May 2024 Ccocrick talk contribs created page Remote Authentication Dial-In User Service (Created page with "== Remote Authentication Dial-In User Service (RADIUS) == The '''Remote Authentication Dial-In User Service''' (RADIUS) is a networking protocol that provides centralized authentication, authorization, and accounting (AAA) management for users who connect and use a network service, such as dial-up, VPN, or wireless network. RADIUS allows a company to maintain user profiles in a central database and authenticate users before granting them access to network resources. ==...")
- 02:08, 9 May 2024 Ccocrick talk contribs created page Lightweight Directory Access Protocol (Created page with "== Lightweight Directory Access Protocol (LDAP) == The '''Lightweight Directory Access Protocol''' (LDAP) is an open, vendor-neutral, application protocol used for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network. LDAP is commonly used for centralized authentication, authorization, and directory services in enterprise networks. === Operation === LDAP operates on a client-server model and uses a hierarchical da...")
- 02:06, 9 May 2024 Ccocrick talk contribs created page Layer 2 Forwarding (Created page with "== Layer 2 Forwarding (L2F) == '''Layer 2 Forwarding''' (L2F) is a tunneling protocol used to support virtual private networks (VPNs) by encapsulating Point-to-Point Protocol (PPP) frames within Internet Protocol (IP) packets. L2F was developed by Cisco Systems as an early VPN solution to enable remote access to corporate networks over the Internet. === Operation === L2F operates by encapsulating PPP frames within IP packets, allowing them to be transmitted over IP-ba...")
- 02:04, 9 May 2024 Ccocrick talk contribs created page PPP over ATM (Created page with "== PPP over ATM (PPPoA) == '''PPP over ATM''' (PPPoA) is a network protocol used to establish a point-to-point connection over Asynchronous Transfer Mode (ATM) networks. It enables the encapsulation of Point-to-Point Protocol (PPP) frames within ATM cells, allowing the transmission of PPP packets over ATM-based networks, such as DSL and broadband connections. === Operation === PPPoA operates by establishing a session between a client device and an Internet Service Pro...")
- 02:03, 9 May 2024 Ccocrick talk contribs created page PPP over Ethernet (Created page with "== PPP over Ethernet (PPPoE) == '''PPP over Ethernet''' (PPPoE) is a network protocol used to establish a point-to-point connection over Ethernet networks. It enables the encapsulation of Point-to-Point Protocol (PPP) frames within Ethernet frames, allowing the transmission of PPP packets over Ethernet-based networks, such as DSL, cable modem, and fiber-optic broadband connections. === Operation === PPPoE operates by establishing a session between a client device and...")
- 02:02, 9 May 2024 Ccocrick talk contribs created page Cyclic Redundancy Check (Created page with "== Cyclic Redundancy Check (CRC) == The '''Cyclic Redundancy Check''' (CRC) is a type of error-detecting code used to detect accidental changes to raw data. It is commonly used in digital networks and storage devices to verify the integrity of transmitted or stored data. === Operation === CRC works by generating a fixed-size checksum, or hash value, from the data being checked. This checksum is appended to the data before transmission or storage. At the receiving end,...")
- 02:01, 9 May 2024 Ccocrick talk contribs created page Internet Key Exchange (Created page with "== Internet Key Exchange (IKE) == The '''Internet Key Exchange''' (IKE) is a key management protocol used in IPsec (Internet Protocol Security) VPNs to establish security associations (SAs) and negotiate cryptographic parameters between two communication peers. IKE provides a secure method for exchanging encryption keys and authentication information, ensuring the confidentiality and integrity of IPsec-protected communication. === Operation === IKE operates in two pha...")
- 02:00, 9 May 2024 Ccocrick talk contribs created page Data Encryption (Created page with "== Data Encryption == '''Data encryption''' is the process of encoding information in such a way that only authorized parties can access it. It converts plaintext data into ciphertext using an encryption algorithm and a cryptographic key, making the data unreadable to anyone without the corresponding decryption key. === Operation === Data encryption involves two primary processes: encryption and decryption. * '''Encryption''': The process of converting plaintext dat...")
- 01:58, 9 May 2024 Ccocrick talk contribs created page Secure Socket Tunneling Protocol (Created page with "== Secure Socket Tunneling Protocol (SSTP) == The '''Secure Socket Tunneling Protocol''' (SSTP) is a VPN protocol that provides a mechanism to transport Point-to-Point Protocol (PPP) traffic through an SSL/TLS channel. SSTP encapsulates PPP traffic over HTTPS, allowing secure and encrypted communication between a VPN client and server. === Operation === SSTP operates by encapsulating PPP frames within SSL/TLS packets, which are then transmitted over the HTTPS protocol...")
- 01:55, 9 May 2024 Ccocrick talk contribs created page Extensible Authentication Protocol (Created page with "== Extensible Authentication Protocol (EAP) == The '''Extensible Authentication Protocol''' (EAP) is an authentication framework used in computer networks and Point-to-Point Protocol (PPP) connections. EAP allows for multiple authentication methods to be used during the authentication process, providing flexibility and extensibility. It is commonly used in wireless networks, Virtual Private Networks (VPNs), and enterprise authentication systems. === Operation === EAP...")
- 01:55, 9 May 2024 Ccocrick talk contribs created page Challenge Handshake Authentication Protocol (Created page with "== Challenge Handshake Authentication Protocol (CHAP) == The '''Challenge Handshake Authentication Protocol''' (CHAP) is an authentication protocol used to verify the identity of a user or client device attempting to connect to a network. CHAP is a secure method that prevents transmission of plaintext passwords over the network. It is commonly used with Point-to-Point Protocol (PPP) connections. === Operation === When a user or client device initiates a connection to...")
- 01:53, 9 May 2024 Ccocrick talk contribs created page Password Authentication Protocol (Created page with "== Password Authentication Protocol (PAP) == thumb|right|150px|PAP Icon The '''Password Authentication Protocol''' (PAP) is an authentication protocol used to verify the identity of a user or client device attempting to connect to a network. PAP is a simple, plaintext authentication method that transmits the username and password over the network in an unencrypted format. It is primarily used with Point-to-Point Protocol (PPP) connections. === Op...")
- 01:53, 9 May 2024 Ccocrick talk contribs created page User Datagram Protocol (Created page with "== User Datagram Protocol (UDP) == The '''User Datagram Protocol''' (UDP) is a core protocol of the Internet Protocol Suite. It provides a simple, connectionless communication service between processes running on different devices in a network. UDP is a part of the transport layer of the OSI model. === Operation === UDP is a lightweight protocol that operates by sending data packets, called datagrams, without establishing a connection between the sender and receiver....")
- 01:49, 9 May 2024 Ccocrick talk contribs created page SSH File Transfer Protocol (Created page with "== SSH File Transfer Protocol (SFTP) == The '''SSH File Transfer Protocol''' (SFTP) is a secure file transfer protocol that provides file access, file transfer, and file management functionalities over a secure data stream. SFTP is an extension of the Secure Shell (SSH) protocol and typically operates on port 22. === Operation === SFTP allows users to securely transfer files between a client and server using the SSH protocol. It provides commands to navigate directori...")
- 01:48, 9 May 2024 Ccocrick talk contribs created page File Transfer Protocol (Created page with "== File Transfer Protocol (FTP) == The '''File Transfer Protocol''' (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network. FTP operates over the Transmission Control Protocol (TCP) or, in some cases, over the User Datagram Protocol (UDP). Typically, FTP operates on port 21 for control connections and port 20 for data connections. === Operation === FTP allows users to upload and download f...")
- 01:45, 9 May 2024 Ccocrick talk contribs created page Post Office Protocol (Created page with "== Post Office Protocol (POP) == The '''Post Office Protocol''' (POP) is an application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a mail server. POP operates over TCP/IP connections, normally on port 110. POP version 3 (POP3) is the most recent version in common use and is defined in RFC 1939. === Operation === When an e-mail client connects to a mail server using POP, it typically downloads all the messages stored on the server f...")
- 01:41, 9 May 2024 Ccocrick talk contribs created page Internet Message Access Protocol (Created page with "== Internet Message Access Protocol == The '''Internet Message Access Protocol''' (IMAP) is a communication protocol used by email clients to retrieve email messages from a mail server over a TCP/IP connection. Unlike Post Office Protocol (POP), which downloads email messages to the client device, IMAP allows users to view and manage email messages directly on the server, enabling access from multiple devices while keeping messages synchronized. === Overview ==...")
- 01:33, 9 May 2024 Ccocrick talk contribs created page Simple Mail Transfer Protocol (Created page with "== Simple Mail Transfer Protocol == The '''Simple Mail Transfer Protocol''' (SMTP) is a communication protocol used for transmitting email messages between email servers. It is a core component of the Internet's email infrastructure and is responsible for routing and delivering email messages across networks. === Overview === SMTP provides a set of rules and conventions for exchanging email messages between mail transfer agents (MTAs), which are responsible for sendin...")
- 01:26, 9 May 2024 Ccocrick talk contribs created page Transmission Control Protocol (Created page with "== Transmission Control Protocol == The '''Transmission Control Protocol''' (TCP) is a core protocol of the Internet Protocol Suite, responsible for establishing and maintaining reliable, end-to-end communication between applications on networked devices. TCP provides a connection-oriented, stream-based communication service, ensuring the reliable delivery of data packets over IP networks. === Overview === TCP is one of the main protocols in the transport layer (Layer...")
- 01:21, 9 May 2024 Ccocrick talk contribs created page Internet Protocol (Created page with "== Internet Protocol == The '''Internet Protocol''' (IP) is a network layer (Layer 3) protocol used for routing data packets across networks. It is the foundation of the Internet and enables communication between devices connected to different networks, allowing them to exchange data packets in a standardized format. === Overview === IP provides the addressing and routing mechanism necessary for data packets to be transmitted across networks. It defines a set of rules...")
- 01:10, 9 May 2024 Ccocrick talk contribs created page Point-to-Point Protocol (Created page with "== Point-to-Point Protocol == The '''Point-to-Point Protocol''' (PPP) is a data link layer (Layer 2) protocol used to establish a direct connection between two nodes in a network, typically over serial connections such as dial-up or dedicated lines. PPP provides a standardized method for encapsulating and transmitting data packets over point-to-point links, enabling reliable and efficient communication between network devices. === Overview === PPP is widely used for e...")
- 01:05, 9 May 2024 Ccocrick talk contribs created page Point-to-Point Tunneling Protocol (Created page with "== Point-to-Point Tunneling Protocol == '''Point-to-Point Tunneling Protocol''' (PPTP) is a network protocol used to create Virtual Private Networks (VPNs) over the internet or other IP-based networks. It enables secure and private communication between remote users and a private network by encapsulating PPP (Point-to-Point Protocol) packets within IP packets for transmission over the internet. === Overview === PPTP was developed by Microsoft and others as a s...")
- 01:00, 9 May 2024 Ccocrick talk contribs created page Layer 2 Tunneling Protocol (Created page with "== Layer 2 Tunneling Protocol == '''Layer 2 Tunneling Protocol''' (L2TP) is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs. It operates at the data link layer (Layer 2) of the OSI Model, providing a mechanism for encapsulating various network protocols within IP tunnels for secure transmission over the internet or other IP-based networks. === Overview === L2TP combines the best features of two ot...")
- 00:56, 9 May 2024 Ccocrick talk contribs created page Internet Protocol Security (Created page with "== Internet Protocol Security == '''Internet Protocol Security''' (IPsec) is a suite of protocols used to secure internet communications at the IP layer. IPsec provides a framework for encrypting and authenticating IP packets, ensuring the confidentiality, integrity, and authenticity of data transmitted over IP networks. === Overview === IPsec was developed to address the security needs of IP-based communications, including virtual private networks (VPNs), remote acce...")
- 00:54, 9 May 2024 Ccocrick talk contribs created page Client-to-Site VPN (Created page with "== Client-to-Site VPN == A '''Client-to-Site Virtual Private Network''' (VPN), also known as a Remote Access VPN or a Road Warrior VPN, is a type of VPN that enables individual users or client devices to securely connect to a private network from remote locations over the internet. Client-to-Site VPNs provide users with secure access to resources and services on the private network, allowing remote work and access to internal systems and data. === Overview === In...")
- 00:49, 9 May 2024 Ccocrick talk contribs created page Site-to-Site VPN (Created page with "== Site-to-Site VPN == A '''Site-to-Site Virtual Private Network''' (VPN) is a type of VPN that establishes secure connections between multiple networks or sites over the internet. Site-to-Site VPNs enable seamless communication and resource sharing between geographically dispersed locations, such as branch offices, data centers, and partner networks. === Overview === Site-to-Site VPNs create secure tunnels between the networks of different sites or locations, allowin...")
- 00:45, 9 May 2024 Ccocrick talk contribs created page User Authentication (Created page with "== User Authentication == '''User Authentication''' is the process of verifying the identity of an individual or entity attempting to access a system, network, or application. Authentication ensures that only authorized users are granted access to resources and services, protecting sensitive information from unauthorized access and misuse. === Overview === User Authentication is a fundamental security mechanism used in various contexts, including computer systems, net...")
- 00:12, 9 May 2024 Ccocrick talk contribs created page Remote Access VPN (Created page with "== Remote Access VPN == A '''Remote Access Virtual Private Network''' (VPN) is a type of VPN that allows individual users to securely connect to a private network from remote locations over the internet. Remote Access VPNs provide users with secure access to resources and services on the private network, enabling remote work and access to internal systems and data. === Overview === Remote Access VPNs create a secure and encrypted tunnel between the user's device (such...")
- 00:04, 9 May 2024 Ccocrick talk contribs created page Virtual Private Network (Created page with "== Virtual Private Network (VPN) == A '''Virtual Private Network''' (VPN) is a network technology that allows users to securely connect to a private network over the internet. VPNs provide a secure and encrypted connection between the user's device and the private network, ensuring privacy, confidentiality, and data integrity. They are commonly used to access resources and services on private networks remotely and to protect sensitive information from unauthorized acces...")
- 00:00, 9 May 2024 Ccocrick talk contribs created page Blowfish (Created page with "== Blowfish == '''Blowfish''' is a symmetric-key block cipher algorithm designed by Bruce Schneier in 1993 as a fast, free alternative to existing encryption algorithms. It operates on 64-bit blocks and supports key lengths from 32 bits to 448 bits. Blowfish is known for its simplicity, efficiency, and resistance to cryptanalytic attacks. === Overview === Blowfish operates in two main phases: key expansion and data encryption. During key expansion, the algorithm g...")
- 23:54, 8 May 2024 Ccocrick talk contribs created page Triple DES (Created page with "== Triple DES == '''Triple DES''', also known as 3DES or Triple Data Encryption Algorithm (TDEA), is a symmetric encryption algorithm that applies the Data Encryption Standard (DES) cipher algorithm three times to each data block. It is an enhancement of the original DES algorithm to address its vulnerability to brute-force attacks due to its short key length. === Overview === Triple DES operates by encrypting plaintext data using three successive applications of...")
- 22:59, 8 May 2024 Ccocrick talk contribs protected Main Page [Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite) (hist)
- 16:20, 8 May 2024 Ccocrick talk contribs created page Public-Key Cryptography (Created page with "== Public Key Cryptography == '''Public Key Cryptography''', also known as asymmetric cryptography, is a cryptographic technique that uses a pair of keys—a public key and a private key—to perform encryption and decryption of data. In public key cryptography, the public key is made freely available to anyone, while the private key is kept secret and known only to the owner. This enables secure communication and data exchange without the need for pre-shared secret key...") Tag: Visual edit: Switched
- 16:09, 8 May 2024 Ccocrick talk contribs created page Opaque Tokens (Created page with "== Opaque Tokens == '''Opaque Tokens''' are cryptographic tokens used in authentication and authorization systems to represent the identity and permissions of users or entities without disclosing sensitive information. Unlike self-contained tokens, such as JSON Web Tokens (JWTs), opaque tokens do not contain readable information about the user or their attributes. Instead, they serve as references or pointers to user data stored securely on the server side. === Overvie...")
- 16:03, 8 May 2024 Ccocrick talk contribs created page Asymmetric Encryption (Created page with "== Asymmetric Encryption == '''Asymmetric Encryption''', also known as public-key cryptography, is a cryptographic technique that uses a pair of keys—a public key and a private key—to perform encryption and decryption of data. Unlike symmetric encryption, where the same key is used for both encryption and decryption, asymmetric encryption employs separate keys for these operations, offering enhanced security and flexibility in cryptographic systems. === Overview ==...")
- 16:00, 8 May 2024 Ccocrick talk contribs created page Symmetric Encryption (Created page with "== Symmetric Encryption == '''Symmetric Encryption''' is a cryptographic technique that uses a single shared secret key for both encryption and decryption of data. In symmetric encryption, the same key is used by both the sender and the recipient to encrypt and decrypt messages, ensuring confidentiality and integrity during data transmission and storage. === Overview === Symmetric encryption algorithms operate on the principle of using a single secret key to perform e...")
- 15:48, 8 May 2024 Ccocrick talk contribs created page Cryptographic Algorithm (Created page with "== Cryptographic Algorithm == A '''Cryptographic Algorithm''' is a mathematical procedure or set of rules used to encrypt and decrypt data, generate digital signatures, and perform other cryptographic operations to ensure the security and integrity of information. Cryptographic algorithms are essential components of modern cryptography and are used in various security protocols, encryption schemes, and cryptographic systems. === Overview === Cryptographic algorithms a...")
- 15:40, 8 May 2024 Ccocrick talk contribs created page Ciphertext (Created page with "== Ciphertext == '''Ciphertext''' refers to the encrypted form of plaintext data, which has undergone a cryptographic transformation using an encryption algorithm and possibly a secret key. Ciphertext is generated to secure sensitive information during transmission or storage, ensuring that only authorized parties with the corresponding decryption key can access the original plaintext. === Overview === The purpose of ciphertext is to protect the confidentiality and in...")
- 15:25, 8 May 2024 Ccocrick talk contribs created page Initialization Vector (Created page with "== Initialization Vector (IV) == An '''Initialization Vector''' (IV) is a fixed-size, randomly generated value used in conjunction with cryptographic algorithms, such as block ciphers and encryption modes, to ensure the uniqueness and security of encrypted data. The IV is an essential component in achieving confidentiality and preventing cryptographic attacks, such as replay attacks and known-plaintext attacks. === Overview === The primary purpose of an IV is to intro...")
- 15:20, 8 May 2024 Ccocrick talk contribs created page Encrypted Key (Created page with "== Encrypted Key == An '''Encrypted Key''' refers to a cryptographic key that has been protected using encryption techniques to safeguard it from unauthorized access or disclosure. Encrypted keys are commonly used in various security protocols and systems to securely store and transmit sensitive cryptographic material, such as symmetric keys, private keys, and passwords. === Overview === The primary purpose of encrypting a key is to prevent unauthorized entities from...")
- 15:18, 8 May 2024 Ccocrick talk contribs created page Hash-Based Message Authentication Code (Created page with "== Hash-Based Message Authentication Code (HMAC) == '''Hash-Based Message Authentication Code''' (HMAC) is a type of message authentication code (MAC) that uses a cryptographic hash function along with a secret key to verify the integrity and authenticity of a message. HMAC provides a mechanism for verifying that a message has not been altered or tampered with during transmission and that it originated from a trusted source. === Overview === HMAC combines the security...")
- 15:12, 8 May 2024 Ccocrick talk contribs created page Elliptic Curve Diffie-Hellman (Created page with "== Elliptic Curve Diffie-Hellman (ECDH) == '''Elliptic Curve Diffie-Hellman''' (ECDH) is a key exchange protocol based on Elliptic Curve Cryptography (ECC) used to establish a shared secret key between two parties over an insecure communication channel. ECDH enables secure communication and encryption by allowing parties to derive a shared secret key without exchanging the key itself, providing confidentiality and integrity of data transmission. === Overview === E...")
- 15:01, 8 May 2024 Ccocrick talk contribs created page Elliptic Curve Discrete Logarithm Problem (Created page with "== Elliptic Curve Discrete Logarithm Problem (ECDLP) == The '''Elliptic Curve Discrete Logarithm Problem''' (ECDLP) is a mathematical problem underlying the security of cryptographic algorithms based on Elliptic Curve Cryptography (ECC). ECDLP involves finding the discrete logarithm of a point on an elliptic curve with respect to a base point, which is computationally difficult and forms the basis of security for various cryptographic schemes. === Overview === The...")
- 14:48, 8 May 2024 Ccocrick talk contribs created page Public Key Infrastructure (Created page with "== Public Key Infrastructure (PKI) == '''Public Key Infrastructure''' (PKI) is a framework of policies, procedures, and technologies used to manage digital certificates and public-private key pairs, enabling secure communication and authentication over insecure networks, such as the internet. PKI provides the foundation for establishing trust, verifying identities, and protecting sensitive information in various digital environments. === Overview === PKI is commonly u...")
- 14:37, 8 May 2024 Ccocrick talk contribs created page Elliptic Curve Digital Signature Algorithm (Created page with "== Elliptic Curve Digital Signature Algorithm (ECDSA) == The '''Elliptic Curve Digital Signature Algorithm''' (ECDSA) is a cryptographic algorithm used to generate digital signatures based on Elliptic Curve Cryptography (ECC). ECDSA provides a secure and efficient method for signing data, verifying the integrity and authenticity of messages, and preventing tampering and forgery. === Overview === ECDSA is widely used in digital signature schemes, such as secure com...")
- 14:30, 8 May 2024 Ccocrick talk contribs created page JSON Web Signature (Created page with "== JSON Web Signature (JWS) == '''JSON Web Signature''' (JWS) is a standard for securing content in JSON format by applying digital signatures, enabling message integrity, authentication, and non-repudiation. JWS allows for the creation of compact, URL-safe tokens that can be used to verify the integrity and authenticity of data transmitted between parties. === Overview === JWS is commonly used in web applications and APIs to protect sensitive information, such as aut...")
- 14:27, 8 May 2024 Ccocrick talk contribs created page JSON Web Encryption (Created page with "== JSON Web Encryption (JWE) == '''JSON Web Encryption''' (JWE) is a standard for encrypting data in a JSON object format, enabling secure transmission and storage of sensitive information between parties. JWE defines a framework for encrypting content using a combination of cryptographic algorithms, providing confidentiality, integrity, and authenticity of the data. === Overview === JWE is commonly used in web applications and APIs to protect sensitive informatio...")