1. CYBER
SECURITY
CERTIFICATION
WWW.APPONIX.COM
It explains how programmers and
network professionals can use
cryptography to maintain the privacy of
computer data. Starting with the origins
of cryptography, it moves on to explain
cryptosystems, various traditional and
modern ciphers, public key encryption,
data integration, message
authentication, and digital signatures.
CRYPTOGRAPHY
Phishing is a type of social
engineering where an attacker
sends a fraudulent ("spoofed")
message designed to trick a human
victim into revealing sensitive
information to the attacker or to
deploy malicious software on the
victim's infrastructure
PHISHING
Almost everyone is aware of the
Wikileaks; a media NGO which set off its
controversial course as early as in
October, 2006. Wikileaks collects its
material from diverse, usually
anonymous, sources, some of which
might have used hacking as their
method of information collectiON.
SYSTEM HACKING
Malware is any software
intentionally designed to cause
damage to a computer, server,
client, or computer network. By
contrast, software that causes
unintentional harm due to some
deficiency is typically described as
a software bug.
MALWARE