Kevin Poulsen was arrested in the year 1990 in the US after he hacked all the phone lines in the LA City. It was announced on the radio station that the 102nd caller who would call in the contest hosted by the channel would receive a Porsche as a gift and Kevin hacked all the phone lines in the city to secure his victory. A bad idea, but what an idea!
guy), then a young student in college, hacked into Arpanet. Poulsen was too sharp for his age and took control over the Arpanet that was considered as a precursor to internet and controlled the network that extended all over the US. Network security experts and firewalls were almost defenseless against the young hacker for some time.
Eksempel: Edward Snowden, eller Helle Thorning Schmidts skattesag. Tampering Unauthorized altering of information. Eksempel: Afstemningsfusk. Vandalism Interference with the proper operation of a system without a gain to the perpetrator. Eksempel: DDoS angreb, SQL dumps, take-overs.
værdi af. Den samme streng som hashes med samme algoritme vil give samme hashede værdi - men vil ikke kunne de-hashes. Så vi kan ikke komme tilbage igen, hvilket er den rigtige måde at håndtere passwords. Hashing vs Kryptering Kryptering Vi tager en streng og laver den om til noget uforståeligt, men vi har mulighed for at dekryptere beskeden igen, såfremt vi kender måden beskeden er krypteret på. Derfor er dette nyttigt når vi udveksler information på tværs af netværk.
name suggests - Public. It is made available to everyone via a publicly accessible repository or directory. On the other hand, the Private Key must remain confidential to its respective owner. Afsender krypterer med sin modtagers public key og modtager har nu mulighed for at dekryptere med sin private key. Beskeden kan ikke læses af andre end de to - og afsender kan ikke dekryptere beskeden igen.