25 lines
No EOL
1.8 KiB
TeX
25 lines
No EOL
1.8 KiB
TeX
\documentclass[12pt]{scrartcl}
|
|
\usepackage[T1]{fontenc}
|
|
\usepackage[letterpaper]{geometry}
|
|
\usepackage{scrlayer-scrpage}
|
|
|
|
\clearpairofpagestyles
|
|
|
|
\lohead{F25IEC\_Lab2\_Greene\_Isaac}
|
|
\lofoot{No AI used. <ig7.us/ai>.\\Work available under the Esoteric Common License. <ig7.us/license>}
|
|
\ohead*{\pagemark}
|
|
|
|
\begin{document}
|
|
\part*{CIS258 Lab 2}
|
|
\section{Importance of strong cryptographic solutions}
|
|
Using modern cryptography, including post-quantum solutions, can help ensure that communications stay secure. Several factors that can affect which specific method of cryptography is used include the method the information is sent (like choosing QUIC if you only support modern HTTP devices, TLS for more general HTTP content, or SSL if you need to support old devices even though it's insecure, or something like steganography if you need to store information in some alternate format) and ability of the client to decrypt the information. If you need to broadcast secret information, you would need to figure out the method beforehand and disseminate the information in a way that only the recipient knows what it means. This could be something like secret languages or codes, or even clues left behind.
|
|
|
|
\section{Updating MAC address}
|
|
Because I did not actually do this and have not learned how, I will be answering this section as if I did.
|
|
\subsection{Trying to access restricted network}
|
|
If I needed to gain access to a network that requires a specific MAC address, if I didn't have the correct address, I would hopefully be blocked.
|
|
|
|
\subsection{Accessing a network with a spoofed authorized MAC address}
|
|
To test the security of a network that requires a specific MAC address, I would spoof my MAC address. I'd imagine that there are other checks that can be performed, hopefully those would happen and access would be blocked.
|
|
|
|
\end{document} |