Some confused concepts in InfoSeC

admin 2025年5月26日13:26:13评论5 views字数 1512阅读5分2秒阅读模式

1. Encryption vs. Encoding

  • Encryption
    : Transforms data into ciphertext using a key to ensure confidentiality. Only authorized parties can decrypt it.
    • Example: AES, RSA
  • Encoding
    : Converts data into a different format (e.g., Base64, URL encoding) without security—easily reversible.

2. Authentication (AuthN) vs. Authorization (AuthZ)

  • Authentication
    : Verifies identity ("Who are you?").
    • Example: Passwords, biometrics
  • Authorization
    : Determines access rights ("What can you do?").
    • Example: Role-based access control (RBAC)

3. Vulnerability vs. Threat vs. Risk

  • Vulnerability
    : A weakness in a system (e.g., software bug).
  • Threat
    : A potential attacker or event that exploits vulnerabilities (e.g., hackers).
  • Risk
    : The potential impact if a threat exploits a vulnerability.

4. Symmetric Encryption vs. Asymmetric Encryption

  • Symmetric
    : Uses a single key (fast, but key distribution is hard).
    • Example: AES
  • Asymmetric
    : Uses public/private key pairs (secure key exchange, but slower).
    • Example: RSA

5. Hashing vs. Encryption

  • Hashing
    : One-way function (e.g., SHA-256) for integrity checks.
  • Encryption
    : Reversible (e.g., AES) for confidentiality.

6. Firewall vs. IDS vs. IPS

  • Firewall
    : Blocks/allows traffic based on rules.
  • IDS (Intrusion Detection System)
    : Monitors and alerts.
  • IPS (Intrusion Prevention System)
    : Detects and blocks attacks.

7. Penetration Testing vs. Vulnerability Scanning

  • Vulnerability Scanning
    : Automated detection of known flaws.
  • Penetration Testing
    : Simulates attacks to test exploitability.

8. Data Masking vs. Data Encryption

  • Data Masking
    : Irreversibly obscures data (e.g., for testing).
  • Data Encryption
    : Reversible protection (requires a key).
以上内容由MCP和o4-mini自动化写作内容,仅测试。

原文始发于微信公众号(信息安全笔记):Some confused concepts in InfoSeC

免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2025年5月26日13:26:13
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   Some confused concepts in InfoSeChttps://cn-sec.com/archives/4095094.html
                  免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉.

发表评论

匿名网友 填写信息