Hashing

IT Security Terms

Modern Cryptography concerns itself with the following four objectives:

  1. Confidentiality (the information cannot be understood by anyone for whom it was unintended)
  2. Integrity (the information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected)
  3. Non-repudiation (the creator/sender of the information cannot deny at a later stage his or her intentions in the creation or transmission of the information)
  4. Authentication (the sender and receiver can confirm each other’s identity and the origin/destination of the information) 
  5. False Positive is when you think (scan device) you have a specific vulnerability in your program but in fact you don’t have a vulnerability.
  6. False Negative is when you think (scan device) you don’t have a specific vulnerability in your program but you have a vulnerability.
  7. True Positive is when you think (scan device) you have a specific vulnerability in your program and this is true, you have a vulnerability
  8. True Negative is when you think (scan device) you don’t have a specific vulnerability in your program and it is true you don’t have a vulnerability.
error: Content is protected !!