Security+ Links
In a sinister world where ignorance divides us, awareness is all but elusive.

KEEP America Great!
Disclaimer: No guarantee is made to the truthfulness or content of all links; use at your own discretion.
  ITIL   Network+   OSI Model   Ports   IEEE   Cables   IPv4   IPv6   Security+  

Under Construction
Under ConstructionUnder ConstructionUnder Construction
Under Construction
We are at the beginning and end of so much that descends and ascends upon us. As new technologies transform standards, old human laborious capacities of current worth will have to grapple with many of these fundamental changes, redefining security and basic human efforts. Left in realms of miraculous achievements, social conditions will be challenged climbing toward or running from all the nebulous overwhelming voids, new to human creation and invention, avalanched upon our children’s children; truth will remain in the midst of lies. Skewing exponentially the times unwind, and without moral decency to knit civilization in a bond of unity, no compass will direct us. In a troubling world God has always led the humble to sanctuaries beyond human comprehension, while darkness consumes itself in evil pursuits; God’s own blessings come to the humble remnant. To count the stars of heart is a task left to the dreams of tomorrow.

Useful Images
CLICK 
FOR 
Multifactor Authentication Security MultiFactor Types CIA Triad CIA Guiding Principles 802 Traffic Flow Wireless AAA Architecture 802.1x Port Control  LARGER
 PICTURE



Authentication = ID + Password

AAA = Authentication
          Authorization
       Accounting


CIA = Confidentiallity
 Integrity
    Availability
    Multi-factor Authentication
TYPE INCLUDES
Something you know
          (Knowledge)
Password, PIN,
CAPTCHA (OTP, Possession),
Security Questions
Something you have
         (Possession)
Smart Card, USB Token
RFID Badge, USB Dongle, Key,
Military CAC card, Phone, PC
Something you are
         (Inherence)
Fingerprint, Face, DNA,
Voiceprint, Iris, Biometrics
Somewhere you are
           (Location)
Geographical location,
Geofencing, GPS, IPv4
Something you do
         (Behavior)
Handwriting,
Signature
Something you exhibit
         (Behavior)
Personal traits
Gait, Typing
Someone you know
         (Association)
Web of trust
Digital signature


Events and Incidences
   True Positive Problem detected
   True Negative True, No problem
   False Positive
Wrong Alarm   
Better
if some
allowed
   False Negative      Missed Incident BAD  


Hashing and Digital Signatures

Symmetric and Asymmetric Cryptography

           UNDER CONSTRUCTION ...
Focus Hash
Algorithm
Symmetric
Algorithm
Asymmetric
Algorithm
Key Size
Output
Length
/ Block
Size
Comment Obsolete
MD5       128 bits Message Digest X
MD6       Up to 512 Message Digest  
RIPEMD       128,160,256,320 Developed in 1992 and 1996  
SHA-1       160 Many collision attacks identified X
SHA-2       256,512 Now retired for most
US Government use
 
SHA-3       224,256,384,512 Released by NIST in 2015  
Whirlpool       512 Square block cipher  
LANMAN       # OLD - 14 character password split into
two 7 character hashes using DES
X
NTLM       128 Password - "Pass the hash" - OLD X
PBKDF2       152 Password Based Key Deviation
Function - Key stretching (salt)
 
Bcrypt       184 bit Password - based on the
Blowfish cipher in 1999 - Another
derived key from key stretching
 
HMAC       256 bit Hash-based Message Authentication
Code - uses a cryptographic key in
conjunction with a hash function
 
DES     56-bit 64 bits Data Encryption Standard: Created
in 1975, 64-bit block and a 56-bit key
X
3DES     Three 56-bit 64 bits Triple DES -1) Encrypt with the 1st key
2) Decrypt with the second key
3) Encrypt with the third key
X
IDEA     128 64 bits International Data Encryption
Does not use variable block lengths
 
AES     128,192,256 128 bits Advanced Encryption Standard
    128 = 10 passes
    192 = 12 passes
    256 = 14 passes
Uses the Rijndael block cipher
 
BLOWFISH     32 to 448 64 bits 64-bit block cipher, variable length key
(1 to 448 bits) 16 rounds of encryption
First strong public domain cipher
 
TWOFISH     128,192,256 128 bits Improved Blowfish, AES competitor
128-bit block size, keys sizes up to 256
 
SERPENT     128,192,256 128 bits AES finalist, powerful but slow  
RC4     40,128,256 stream cipher Rivet Cipher/Ron's Code
Stream Cipher, OLD
Used with WEP and SSL
X
RC5     0-2048 32,64,128 X  
RC6     128,192,256 128 bits Block cipher and AES finalist  
SLIPJACK     80 64 bits Developed by NSA,
declassified in 1998
 
CAST     128,256 64 bits Block cipher with keys
ranging from 128 to 256 bits
 
PGP/GPG   #   Pretty Good Privacy/GNU Privacy Guard
1) PGP/GPG generates symmetric key
2) Encrypted using receiver's public key
3) Receiver decrypts with private key
 
RSA     Up to 4096   Rivest,Shamir,Adleman
Key generated from two prime numbers
Widely used for digital signatures
 
DSA     512,1024   Digital Signature Algorithm  
ECC     163,256,384,512   Elliptic Curve Cryptography
ECC is for phones except
if military phone uses AES
 
El Gamal     128,256   based upon Diffie-Hellman  
DH key-exchange     384,1024,2048 ...   Diffie-Hellman (used with IPSec)
a collection of different algorithms
 
Quantum     Random   Quantum Key Distribution (QKD) -
Considers a quantum system can
be disturbed thereby detecting
interference or eavesdropping
 
X     #   X  

Memory mnemonic:
3
2
B
R
A
I
D
S
3DES
TWOFISH
BLOWFISH
RC
AES
IDEA
DES
SERPENT


D
E
E
R
Q
Diffie-Hellman (DH)
Elliptical Curve Cryptography (ECC)
El Gamal
RSA
Quantum








         PKI , PGP , GPG


PENDING INSERT AREA
(Under Construction)

Effective key/hash comparisons?
Key exchange analysis
   
UNDER CONSTRUCTION:
Authentication Standards

PAP
CHAP           NTLM (old ... pre-Kerberos)
MS-CHAP
PPTP (old ... pre-L2TP)

SSL (old ... pre-TLS) / TLS (current)
L2TP
IPSec
EAP                      VPN
802.1x (NAC)
802.11i (WPA2)

RADIUS
TACACS+       KERBEROS
LDAP



      PSTN           Internet       Local VLAN       Wireless    
PAP
PPP
CHAP
IPSec,
PPTP
L2TP
802.1x
EAPoL
802.1x
802.11i
RAS
NAS

VPN Server
/ Firewalls
Ethernet
Switches
Access Points
(WAP)
    ⭨ ⭩    

     AAA Server "RADIUS or TACACS+" - KERBEROS / SESAME     
⤡             ⤢
⭨                    LDAP                    ⭩

NETWORK ACCESS
(Intranet / Extranet)

Useful Images
CLICK 
FOR 
Infected RADIUS / TACACS+ IEEE 802.1x Kerberos Authentication Kerberos Authentication / Authorization Kerberos Ticket VPN Tunnel LDAP Samba Network Network  LARGER
 PICTURE


  ITIL   Network+   OSI Model   Ports   IEEE   Cables   IPv4   IPv6   Security+  

Security+ Help Useful Videos Utility
Security Performance Based Test

Security 401 Test Review questions

CompTiaExamTest.com/501

ExamCompass.com

Pluralsight.com

GetCertifiedGetAhead.com

Security+ Acronyms

Quizlet - Security+ Acronyms

SecurityPlusPro.com



To all who seek...
May luck & opprotunity
be close visitors!
Udemy: Mike Myers 601

CBT Nuggets Security+ 501

Keith Barker Learn IT

IPSec-VPN, by Keith Barker

601 Security+ Professor Messer

SYO-501 Practice Questions Set #1

Security+ 501 Test Review questions

Security+ 601 - 10 Test questions

Security+ 601 - Exam Dumps & Questions

IT.DOJO

Common Security Issues - Prof. Messer

Secure Protocols - Prof. Messer



Blockchain components in a network

SSLs.com

HoaxSlayer.com

ScamAdviser.com

Snopes.com - Misinformation SCAMs

SecTools.org

NetworkMiner

Immersive Labs 🌠

Network Forensics

SlavaSoft HashCalc

LookingGlassCyber.com

National Vulnerability Database

ATT&CK Matrix   ATT&CK Links

NoScript.net

CyberChef


Disclaimer: All pictures used with my webpages have been obtained
from internet image collections or linked sites, and the use of which is
intended to instruct and to assist all students. Images and or sites are
presented for informational purposes only and do not constitute
endorsement of any websites or other sources. I disclaim any liability
in connection with the use or misuse of this information. I will link
images to any valid request. No copyright infringement is intended.

WarDriving.com

CVE Security Database

XXX

XXX

Door Security Videoes

James Veitch respnds to SPAM

Terms and Conditions May Apply

Iran and STUXnet, Iran is HACKED (Cyberwar)

Bomb Blast Simulator


If the chains of evil cannot be broken, a possible time is coming where the wasted petty arguing we do today, in the modern “civilized” world, will become so insignificant, as nations implode upon the shear hate for life, and then comes the assault on all those that would hope for peace as the children cry. Most of time is filled with the cries of all that is unjust. Truth stands for justice and our senses are deceived as lies have too often overwhelmed the times, past regrets, where ashes crush the people. Wisdom is calculated by the ability to correct reason with truth in actions.

If through our tears we can regain laughter, in this hope might strength return with purpose where commendations replace criticisms, and godly humbled hearts can unapologetically rest upon love shared for one another in the open. Hate is the cancer that steals laughter, that one precious component of innocence. Truth is not right when it rests in lies or believes opinion over fact. Those today screaming victimization due to prejudice often are the ones found to be the most prejudice, unable to bury the hate that divides all cold hearted souls to turmoils, within self-inflicted isolated narcissistic oblivions. Timeless corruption, for all that is unholy by judgmental fools, and to whom passionately hate life itself, with anger as their only vision, this is why security implementations must take precedence into the foreseeable future, and even more so as governments collide, and perhaps internally splinter. May our children find greater unity than the divisions we now must face with piercings of heart.


These are NOT LINKS. Example images included here below expose evil threats that put us all at risk.
Unfortunately the Internet is filled with unethical entities
CLICK 
FOR 
Bad website choices can lead to having all your files encrypted by bad individuals The elderly are being fooled by liars   
  These scams have the appearance of being authentic using known industry logos These fake warnings introduce urgency as a weapon of fear Often these stealthy assaults  offer convenience to resolve the immediate problem These annoyances usually disable the ability to close the Warning window Even the best of us can be fooled so caution must always be in mind  LARGER
 PICTURE
Never click on these ↗ [Ctrl-Alt-Del] → Task Manager & turn Browser off


Change background color to:
Sky Blue White Plum Maroon Green Brown Gray
Tan Teal Black Gold Tomato Purple Orange Pink
COLORS ARE A GIFT WITHOUT CHARGE


Click here to add this page to your favorites


Home Page | ScienceLinks | Network+ | OSI Model | Ports | IEEE | E-Mail Me | Blank
Pending work to be published
Follow me on Twitter Follow me on Facebook     Visit My YouTube Channel     View my Linkedin Profile     People love Instagram    Follow me on pinterest

top