Monty Python’s characteristic cartoon artwork from the TV show, as crossed and combined with medieval manuscript illustration (complete with a grumpy monk). November 28, 2016 Read More »
The three major forms of cyber crime: are computer and network intrusions, identity theft, and Internet fraud. November 14, 2016 Read More »
In WhatsApp Security white paper, a key distribution and management mechanism has been employed for subsequent end-to-end encryption. Which of these keys will you categorize as a master key and session key(s)? October 25, 2016 Read More »
For distribution of public keys, briefly describe why do we prefer public key certificates over public key authority October 25, 2016 Read More »
What is the function of SSL handshake protocol? From your web browser, figure out different security parameters exchanged by SSL handshake protocol with https://www.google.com.au/ October 25, 2016 Read More »