|Black Box Testing
|White Box Testing
|It's a type of software testing in which the program's or software's internal structure is concealed.
|It is a method of software testing in which the tester is familiar with the software's internal structure or code.
|It is not necessary to have any prior experience with implementation.
|It is not necessary to have prior experience with implementation.
|On the basis of the requirement specifications paper, this testing can begin.
|This form of software testing begins once the detailed design document has been completed.
|It takes the least amount of time.
|It takes the most amount of time.
|It is the software's behavior testing.
|It is the software's logic testing.
|It is relevant to higher levels of software testing.
|It is relevant to lower levels of software testing.
|By converting plaintext into ciphertext one block at a time, Block Cipher converts plain text into ciphertext.
|Stream Cipher takes one byte of plain text at a time and converts it to ciphertext.
|Either 64 bits or more than 64 bits are used in block ciphers.
|8 bits are used in stream ciphers.
|The ECB (Electronic Code Book) and CBC (Common Block Cipher) algorithm modes are utilized in block cipher (Cipher Block Chaining).
|CFB (Cipher Feedback) and OFB (Output Feedback) are the two algorithm types utilized in stream cipher (Output Feedback).
|The Caesar cipher, polygram substitution cipher, and other transposition algorithms are used in the block cipher.
|Stream cipher uses substitution techniques such as the rail-fence technique, columnar transposition technique, and others.
|When compared to stream cipher, a block cipher is slower.
|When compared to a block cipher, a stream cipher is slower.
|Helps to group workstations that are not within the same locations into the same broadcast domain
|Related to remote access to the network of a company
|Means to logically segregate networks without physically segregating them with various switches
|Used to connect two points in a secured and encrypted tunnel
|Saves the data from prying eyes while in transit and no one on the net can capture the packets and read the data
|Does not involve any encryption technique but it is only used to slice up your logical network into different sections for the purpose of management and security
|Data Protection in Transit
|Data Protection at Rest
|Data is transmitted across devices or networks
|Data is stored in databases, local hard drives, or USBs
|Protects the data in transit with SSL and TLS
|Protects the data at rest with firewalls, antiviruses, and good security practices
|You must protect the data in transit since it can become vulnerable to MITM attacks, eavesdropping, etc.
|You should protect the data at rest to avoid possible data breaches even when stolen or downloaded