July 11, 2023, 11:51 a.m. | Yahya sghiouri

System Weakness - Medium systemweakness.com

Locks

Cryptography is the practice of securing communication in the presence of adversaries. It encompasses various techniques and algorithms used to encrypt and decrypt information, ensuring its confidentiality, integrity, and authenticity. Before delving deeper into the subject, it’s helpful to gain an understanding of some cryptographic concepts. Feel free to skip this section if necessary, although comprehending these concepts is beneficial since SSH keys serves various purposes beyond just GitHub.

I- Overview on some cryptographic concepts

The need for cryptography …

adversaries algorithms communication concepts confidentiality cryptography decrypt encrypt encryption free git information integrity key management keys practice presence security ssh ssh keys techniques understanding

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

SITEC- Systems Security Administrator- Camp HM Smith

@ Peraton | Camp H.M. Smith, HI, United States

Cyberspace Intelligence Analyst

@ Peraton | Fort Meade, MD, United States

General Manager, Cybersecurity, Google Public Sector

@ Google | Virginia, USA; United States

Cyber Security Advisor

@ H&M Group | Stockholm, Sweden

Engineering Team Manager – Security Controls

@ H&M Group | Stockholm, Sweden