How to crack WPA2
Wi-Fi Protected Access 2 (WPA2) is one of the most widespread security standards for wireless networks. It has been replaced by more recent WPA3, but as of 2021 WPA2 is still more spread. This post explains briefly what is WPA2,…
Wi-Fi Protected Access 2 (WPA2) is one of the most widespread security standards for wireless networks. It has been replaced by more recent WPA3, but as of 2021 WPA2 is still more spread. This post explains briefly what is WPA2,…
This post lists some of the most popular IT frameworks that can be used by an organization to implement their information security. You can read about related information security architecture frameworks on this post. List of IT Security Frameworks List…
Password hashing algorithms: PBKDF Family PBKDF1 PBKDF2 bcrypt scrypt List of Password Hashing Algorithms PBKDF1 Deprecated. PBKDF2 Supersedes PBKDF1. Use key stretching to increase the difficulty of attack. bcrypt Use key stretching to increase the difficulty of attack. scrypt Use…
CISSP (Certified Information Systems Security Professional) is a certification granted by the organization ISC2 (International Information System Security Certification Consortium). This post explains how you can prepare the exam to apply for CISSP certification. To find more information about the…
Digital certificates, also known as public key certificates or identity certificate. When I explain what a digital certificate to someone without a strong IT background I like to compare it with a seal ring, like the ones used in medieval…
CISSP (Certified Information Systems Security Professional) is an information security certification granted by organization (ISC)2. This post explains the procedure to get CISSP certification through a series of frequently asked questions (FAQs) that are set in logical order. All questions…
There are different certifications issued by the professional association ISACA. These certifications have a limited validity period that, nevertheless, can be extended. This post summarizes ways to maintain and renew ISACA certifications. The post tries to generalize the common validity…
Information Systems Audit and Control Association (ISACA) is an association of professionals for auditing and ensuring IT security on IT systems. There are different certifications issued by professional association ISACA. These certification has a limited validity period that, nevertheless, can…
A hardware security module (HSM) is a physical device that provides extra security for sensitive data. It is a removable or external device that can generate, store, and manage RSA keys used in asymmetric encryption A Trusted Platform Module (TPM) is…