encryption algorithms - types (RSA, DES, blowfish, RC4 etc)
digital signatures and certificates - Public Key Infrastructure
secure sockets - encryption protocols (SSL, TSL)
proxy servers
proxy servers
firewalls - hardware (network based) or software (application based)
Then today we had a quiz to check understanding of above - team 'Calvin, Gordon, Calum and Pawel' won; well done!
We also talked about different connection types... what's most suitable for where, speeds,etc. Calum gave an example of a home network where multiple users caused a noticable difference to access and download speeds.
No comments:
Post a Comment