jaxon’s Blog

Principle of ethical hacking

Ethical hacking is where we study the techniques and tools of hackers.

People who hack use bots that run through data of the internet in search of personal information such as passwords and emails, so they can access their accounts. Weak passwords are more easily hacked, and you don’t want to use the same password for multiply accounts always they will have access to all your accounts with the same password.

Encryption is where information can be shared/transported privately through a safe barrier. Caesar cipher is the most ancient encryptions record. Caesar cypher is an encryption that combines a word with the alphabet, and it changes each letter by a certain number of letters after it’s the certain letter in the alphabet to encrypt the word/s. Caesar cipher is a very useful type of encryption because it was such a simple concept, but was so hard to crack by a human. Computers can crack over 10 billion types of encryptions in less than a few seconds.

We today use 256 bit encryption to encrypt messages which would take 12 super computers over a trillion’s years. These codes are cracked by a symmetrical encryptions key that is shared with the sender and receivers over the email/message. Asymmetric encryption is where multiply people can send a message but only one person has the key to decode the encrypted message. Everything on the internet is protected by asymmetric encryptions so no one else can access your own private information and you can’t access theirs. If you see ‘https’ in the URL this means that the website is more secure the ‘http’ meaning that any information given to this website is harder for hackers to steal that info. ‘https’ means it has SSL which is short for security socket layers which is safer TLS which ‘http’ has.

Leave a comment

Design a site like this with WordPress.com
Get started