What’s a server?
Server is a computer which is responsible for managing computer access to the service via network.
How does communicaton over internet work?
When user writes messages from one computer device such as PC/phone/tablet or laptop he sends
data. To make sure that the data cannot be seen by other people the data is encrypted with a secret
key which either both users have or a server and user have thus making it harder for
hacker/malicious user to read the same data.
What’s compromised key atack?
Compromised key atack is when an atacker
manages in any way to
determine/predict/steal the secret key used
to encrypt data between two or more devices
which makes the encrypton useless as he can
read all the data that is sent between those
devices without anybody knowing except the
malicious user.
How does atack afect our Green Frog
Accountng company?
This type of atack can potentally lead to:
Potental leak of confdental
documents. As well as insider
informaton.
Potental loss of customers/sales due to damaged company’s reputaton.
Potental risk of further security breaches based on this type of atack.
So, what can we do to deal with this type of atack?
We can deal with type of atack by changing the encrypton algorithms we use. For example using
SHA256 rather than SHA1 would make our company less susceptble for those type of atack as SHA1
is regarded as out of date type encrypton due to google managing to break it in 2017. More about it
here: htps://security.googleblog.com/2017/02/announcingffrstfsha1fcollision.html while SHA256 is
current industry standard.
Server is a computer which is responsible for managing computer access to the service via network.
How does communicaton over internet work?
When user writes messages from one computer device such as PC/phone/tablet or laptop he sends
data. To make sure that the data cannot be seen by other people the data is encrypted with a secret
key which either both users have or a server and user have thus making it harder for
hacker/malicious user to read the same data.
What’s compromised key atack?
Compromised key atack is when an atacker
manages in any way to
determine/predict/steal the secret key used
to encrypt data between two or more devices
which makes the encrypton useless as he can
read all the data that is sent between those
devices without anybody knowing except the
malicious user.
How does atack afect our Green Frog
Accountng company?
This type of atack can potentally lead to:
Potental leak of confdental
documents. As well as insider
informaton.
Potental loss of customers/sales due to damaged company’s reputaton.
Potental risk of further security breaches based on this type of atack.
So, what can we do to deal with this type of atack?
We can deal with type of atack by changing the encrypton algorithms we use. For example using
SHA256 rather than SHA1 would make our company less susceptble for those type of atack as SHA1
is regarded as out of date type encrypton due to google managing to break it in 2017. More about it
here: htps://security.googleblog.com/2017/02/announcingffrstfsha1fcollision.html while SHA256 is
current industry standard.