Pretending to be a DNS name resolver. Feed your computer the wrong IP address for a given website, and your browser now goes to a false website.
Distributed Denial of Service attack. Spam a web server with so many requests so close together that it crashes. Sometimes spitting out valuable information as it crashes.
Protocols for encrypting/decrypting information. Most cybersecurity breaches happen due to human error, not software bugs.
Identity theft, stealing money, stealing private information, controlling private computers.
Public key encryption is a type of asymmetric key encryption. There’s one key that encrypts the information and there is a different key that decrypts the information.
Confirms the identity and authenticity of a website.