Wednesday, 10 March 2010

Review of secure communications

Last week we summarised with each taking their own notes:
    encryption algorithms - types (RSA, DES, blowfish, RC4 etc)
    digital signatures and certificates - Public Key Infrastructure
    secure sockets - encryption protocols (SSL, TSL)
    proxy servers
    firewalls - hardware (network based) or software (application based)

Then today we had a quiz to check understanding of above - team 'Calvin, Gordon, Calum and Pawel' won; well done!

We also talked about different connection types... what's most suitable for where, speeds,etc.  Calum gave an example of a home network where multiple users caused a noticable difference to access and download speeds.

No comments:

Post a Comment