2019-2020-1 20191320 "Introduction to information security professionals," the twelfth week learning summary

2019-2020-1 20191320 Li Zehao "Introduction to information security professionals," the twelfth week learning summary

Teaching materials learning summary

This chapter learning content related to computer security. We understand that encrypted confidentiality, integrity, availability, non-repudiation and so on. I learned symmetric encryption and asymmetric encryption, learned that public and private keys associated application methods. In the homework, I practice using the gpg, the piece of information encrypted, then decrypt the message transmission. With practice, I realized that the security of asymmetric encryption, non-repudiation features. We later learned force three kinds of identification documents, namely identification documents, smart cards and biometrics. These methods are used to prove the user's identity.

We also learned some knowledge of some of the primary relevant classical cryptography and encryption methods, including Caesar password. We also learned about some of the common types of computer attacks, antivirus software is an effective way to prevent cyber attacks.

Code debugging and problem solving in the process

Question: When implementing pgp encrypted several times do not understand its principles and procedures, the code uses the use of gpg error

Problem Solution: Check the information to try several times, asked the students after the completion of a final settlement of the problem.


Code hosting

Guess you like

Origin www.cnblogs.com/Ressurection-20191320/p/12079612.html