Friday, February 28, 2020

Computer Security Service

Before we begin this blog I wanted to understand how public and private key works. We will just do a quick remainder here. A public & private key pair is created at the same time not like one created yesterday and one tomorrowJ. They are created as a mathematical key pair together and the magic is anything you encrypt with one of them can be decrypted with the other and vice versa.  Anything you encrypt with the private key can be decrypted with the public key. Anybody can create the key pair, we can create them either in the cisco router, on a server,. Computer Security Service The secret of them is we can keep the private key private not sharing with anybody and you can share the public key with anybody you want to.

Digital Signature and  how it works

A Digital signature is a hash that has been encrypted with the sender’s private key.

The sender of a packet will take the data and they will create a hash and then will take the hash and encrypt with the private key. Now the sender will send the data and the digital signature (HASH encrypted with private key) to the recipient.
Digital Signature = HASH(DATA)
Sender  (DATA + Digital signature ) --> recipient

Now the recipient takes the data and they generate the own hash and they then take the digital signature which is encrypted hash and they decrypt with the senders public key .  If the result is the same this confirms the integrity between the sender and the recipient.

  • Recipient receives the data and digital signature
  • Hash the received data
  • Decrypts the encrypted hash with senders public key
  • Compare both the HASH value.
  • If it matches then it compares the data is not tampered or not modified

Thursday, February 27, 2020

Security Connection

Where you place the camera lens is important. The distance of the camera from its subject should be carefully considered, making sure the right areas are in focus and clearly visible. If you mount a camera to a wall or structure, make sure it's mounted properly so the camera won't shake and distort the picture. Outdoor cameras can deter criminals from ever attempting a break-in, Security Connection and they can cover large areas, but a camera placed outside should have an appropriate weatherproof casing to protect it from the elements. Tough casings can also prevent tampering or vandalism.

You should also determine whether or not you'll want to record your surveillance. If you're simply making sure your children are safe while playing or monitoring who comes to the front door, a direct video feed with no recorder should be sufficient. But if you wish to see what's happening in a particular area over long periods of time, you should connect a recording system that's compatible with your security cameras. Some people use VCRs to record video, while others run the whole system via a computer and save information digitally.

 To avoid wasting video, some surveillance systems have motion detectors that only begin recording once the device picks up movement within the area.

As you can see, there are many video surveillance options available. Choosing the right one for your personal needs is a matter of knowing how you want it to work for you.

Security Services Definition

Adaptive solutions:  Decision makers should take into account that security is not an out-of-the-self product, and the misconception that ...