Security Problems Occuring During Online File Transfer
Data can be:
Intercepted
Corrupted
Overwritten by concurrency of transfer
Malware
Encryption Types
Symmetric - Both sender and receiver share a key used to encrypt and decrypt sent data
Asymmetric - Both sender and receiver have two keys each, public and private. If someone sends a message, the message is encrypted with the receiver’s public key and can only be decrypted with their private key.
Biometric Data Collection Complexity
High-quality sensors that can vary by environment
User cooperation
High natural variability in data
Privacy concerns
VQCP
Biometric Data
Physical traits that can be measured and stored in a database and used to uniquely identify the person they belong to
How Is Maximum Accuracy Achieved? (Truncation & Rounding)
All calculations are performed while utilising the maximum possible decimal places available and only the final result is truncated or rounded.
Rounding is always better or as good as truncation.
Penetration Testing Types
Internal testing
External testing
Blind testing
Double blind testing
Malware Vectors
Watering hole
Domain shadowing
Malvertising
SQL injection
Phishing