Question

In: Computer Science

State the differences between hardware and software-based encryption. How Wi-Fi Pineapples work?

  1. State the differences between hardware and software-based encryption.
  2. How Wi-Fi Pineapples work?

Solutions

Expert Solution

ANSWER :-

Encryption : "Encryption is the process of encoding information or sensitive data so only authorized parties can access it."

Hardware Encryption :

  • Hardware encryption means the encryption happens within the drive. Hardware encryption uses a devices onboard security to perform encryption and decryption. It is self-contained and doesn't require the help of any additional software. Therefore it is free from the any possibility of malicious code infection or vulnerability.

Software Encryption :

  • Software encryption is the process of protecting your data using a software. The software is installed in  local-computer and encrypts your computer data.
  • Software encryption typically relies on a password, give the right password and your files will be decrypted otherwise they remain locked.

Difference between hardware and software based encryption :-

Hardware Based Encryption

  • Uses dedicated hardware,thus much faster to execute.
  • Store keys and other importent data in a dedicated secure memory location.
  • Not dependent on the operating system. Supported by dedicated software to operate the hardware.
  • In hardware based encryption, special care taken to hide and protect the vital information, such as private key, to make it more difficult to access.

Software Based Encryption

  • Uses shared hardware, thus slower to execute.
  • No dedicated secure memory location available in software based encryption
  • Dependent on the security levels and features of the operating system and supported software.
  • In genral-purpose system where software based encryption is implemented, there are many ways to snoop to and access vital information.  

Wi-Fi Pineapples :-

  • The Wi-Fi Pineapple is a piece of hardware that was originally created for network penetration testing.
  • A WiFi Pineapple is a small, powerful device that can be used to steal data, snoop on unsuspecting users, or compromise your online accounts.

How it works:

  • A Wi-Fi Pineapple sits between the user's laptop and the network, inspecting the data that flows between the two. The Pineapple's controller intercepts the information being transmitted back and forth between the network and the wireless device that's using Wi-Fi.

      


Related Solutions

a) What is the differences between hardware and software revenue recognition? Based on this, what pieces...
a) What is the differences between hardware and software revenue recognition? Based on this, what pieces of information are important for an accountant to know before they can recognize revenue? b) Describe the revenue cycle - from the point in time when a sales person closes a deal, to that becoming revenue, AR and eventually cash on a company's financials.
What is the relationship between Bluetooth and Wi-Fi? What security challenges do Wi-Fi and Bluetooth technology...
What is the relationship between Bluetooth and Wi-Fi? What security challenges do Wi-Fi and Bluetooth technology present for a company?
How has wi-fi changed the landscape of channel technology?
How has wi-fi changed the landscape of channel technology?
In a Wi-Fi network, data packets are transmitted between a laptop computer and the access point....
In a Wi-Fi network, data packets are transmitted between a laptop computer and the access point. Since the transmission is wireless, errors can occur that may render the packet useless, so, when received in error, the packet is discarded. As a protection for errors, an acknowledgement is expected, and if the packet is received in error, it is retransmitted, until correctly received. Consider that the probability that a packet is discarded is p=0.6. (a) What is the probability that the...
Assignment1- Wi-Fi Site Survey Research WiFi site survey software. Download a free or evaluation version of...
Assignment1- Wi-Fi Site Survey Research WiFi site survey software. Download a free or evaluation version of a software and create a heat map of a busy location( college,coffee shop, mall, business center etc.) Analyze the heatmap , explain the findings and answer the following questions : 1. What is site survey, why it is important and what security issues it helps to prevent and why. 2.. Based on the conversation in class - do you see any security issues with...
RESEARCH REPORT -How could you prevent an attacker with Aircrack from getting into your Wi-Fi? -What...
RESEARCH REPORT -How could you prevent an attacker with Aircrack from getting into your Wi-Fi? -What is the recommended way to mitigate telnet risk? -What information can you see when someone uses SSH? -How do you create a hidden file in Linux? -What is the /etc/shadow file? -Explain what each part of this command does: sudo tcpdump tcp -i eth1 -s 0 -C 50 -w Cap.txt -During SFTP what version of cryptographic key exchange was used?
Encryption vs. Encoding/Obfuscation Give a detailed paper discussing the differences between encryption and encoding. Expand upon...
Encryption vs. Encoding/Obfuscation Give a detailed paper discussing the differences between encryption and encoding. Expand upon the use of these in the execution of malware. Discuss the different forms of encryption, their history, and implementations.
Based on the discussion of hardware, Internet, and software technology trends in Chapter 7 "Defining the...
Based on the discussion of hardware, Internet, and software technology trends in Chapter 7 "Defining the System Architecture”, it should be clear to you that the Real-Time Glucose Monitoring (RTGM) system is an interesting combination of older and newer technology. Except for the interface to software and data on mobile phones, the server-side portions of the system are a relatively traditional business-oriented application that can be implemented by using old-fashioned technology. What makes the RTGM system “new” are its client-side...
WHAT ARE THE DIFFERENCES BETWEEN PUBLIC KEYS AND PRIVATE KEYS IN TERMS OF ENCRYPTION METHODS AND...
WHAT ARE THE DIFFERENCES BETWEEN PUBLIC KEYS AND PRIVATE KEYS IN TERMS OF ENCRYPTION METHODS AND BITS WISE UNDERSTANDING?
Why are agile methodologies generally not suitable for hardware-based projects as opposed to software projects?
Why are agile methodologies generally not suitable for hardware-based projects as opposed to software projects?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT