0% found this document useful (0 votes)
13 views9 pages

Is Notes

The document covers various aspects of cybersecurity, including the CIA Triad (Confidentiality, Integrity, Availability) and types of security attacks such as active and passive attacks. It discusses security services, cryptography techniques, and methods for ensuring data integrity and confidentiality. Additionally, it mentions different encryption methods and the importance of access control in cybersecurity.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views9 pages

Is Notes

The document covers various aspects of cybersecurity, including the CIA Triad (Confidentiality, Integrity, Availability) and types of security attacks such as active and passive attacks. It discusses security services, cryptography techniques, and methods for ensuring data integrity and confidentiality. Additionally, it mentions different encryption methods and the importance of access control in cybersecurity.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

internship clkssmate

’ cyber security job Date 9l22024


poYE L darknet
SPLUNG CoUSe CEH Page

oho am I sho ell yous


thred way hand shake websi te

CIA Triad
Confidentiality
27 Integrity send rece ivetnuO) Yo Roeeorgianl
3 Availabitity oipolorg
47 Authorityoliog
6] Access ibility
There are three components of oS I security - s l

1 Secuity attacks secuity corn pro i sesienadiuh E


mechanismaiDaeio d i a t l t
2 Security
3 secuity senvices

securiy attacks Con be done using >


malicious softwqre to breach data
Ran somwae
Emails phishing emails
" Trajen Trqjanhorse CHuman inter vention not needed)
virus ’Human intervention needed
sgL injecton attack to the database of orgonization
"D DoS ttack Dstributed denyal of sevice

Types of SRcuity attackioh


] Active attack
Atackers attack system to get dat as well as
harm the cystem k human paleabibotbgs

2 Pass ive attack


Attack with intention to get data only not to
harm the system R húneq ns.
Types of passive attack
of mess ge contents
) Read inq
2] Traffic analycis analy ze tru ffc in ne twork
20|08l2024
4 Active Atacks aAssAAte o securty mechanism
Date
Replay
Modificotion of message
Page aDigtal signoture ’ code used to authenti cate achie ve
service
confi dentiaity
3 Denial of
4l08|2 024 3 Access control
giving rights to access Qcess to ight people.
Security Services "seting the iviledges
The processing of conmunication service thot is provided by system send = receives
ssisinq to give a specific kind of Protection to syslem 4 pata integity ’
secuMty services implement secuvihy policies f are implemenled
by se cunty mechaniSm Squthen eation exchange ’ ex change of Some ode to k now
identity of sende eceiver
Types of Sevices q Traffic padding ’ Adding extra bits to yous comm unicatíon to
Authentication- set levels of user prevent from attack s R it is done by netwnk yayer.
. feer -Enity authenticotion Cdevice ydevice authen ticatio) servíces achieved y Data irtegit
.Data -origin auther tfeation ( send to that person only whom you're Whats App > I+ is beth synchongus async honouS
serding msg) ohatsApp call messQges
2 Access control set priviledg e level 7 Routing control ’ 1S job of ISP
3 Data confiden tiality ’we can achieve confidentialiy by &l otanzation Lawtul notifica tHOn rrovided by ss L
providing enc ryption
Pervasiye secuity mechonism
Data integity No mbdíication of message
when Send = receive data întegrit is achieved
lTrusted functiona iit
s non- epudiatíon I+ Perceive to be comect wth some c e ia.
repudiotion ’ denging vecdving Rsendin of datu os Packet
2seeurity level > TP FP , TN, FN
3 Evernt detection If something happens then it S event.
AsSAte Date 28 0812 0 2 4 i n p
Dote 21| 08 |202 4 Dote
alAssMAte
O Modular Arith meic
Pane ©Cryptography ’ converting plain text to cipher ext Page
ModuloY integers pher
J Modulor wTOpping
(o
PT Encrypton
algozith ro
Decyrtion
30 3 Cmod 13e) 350 algo
No of wYQPS Pemainjng Congn ence "Too ty pes of eheypton
thread 1 unconditonally secure -’ ohateve data it heeds to be enepBed.eg hats
26 mod t0
1 25 35
35 5 mod lo
comptationaily Secue
15
355s mod Lo irtruder JAlkacker
eornpuHng.
res oue
Data
OPropert es of hodulor amthmetic NJwS Gate keeper
process
1[0 mod n) + (b mod n)hmod n (a+h) mod n func Lnto Suskem
mod n) - (b mad n) modn (a-b) modn O Athacks in cgptanalysis
There
basically tuo types of o ttacks
a mod n) (b mod n) mod n =(a tb) mod n ryptanalysis
Bruteforce
((5 mod 6) t (4 mod 6) | mod 6
(5 t4) nods Cypt analysis
mod 6
Types of attack Knocwn to crypt anlysis
cs mod 6) - (4 mod o) mod 6
G-4) mod & 1. ipher text only "Encryption algorithm
Giphertext
2- Knguon plaintext " EncryptH on alqorithm
C(5 mod c) t(4 mod 6)| mods Ciphertext
fommed with
(Gt 4) nod s " Ohe or more plaintert -ciphe rHext pains
20 nodc secret key
3.Chasen pla intex t .Encyption algoithm
. Ciphestext
. Plain text message chas en by cptanalyst
together ,wth its ci pherkxt gen eratd oiHh
sec ret key
knoon oto CyptanalysIs
of attack
Type Date
ophertext "Encyption alyo Page
4. Chasen
"Gphestent
-Cijphestext chasen by cyptanalyst togeh
oth its Comesponding déeypted plain te
qerero ted with the secret key
Chasen text ploitext chasen
f ciphertert
5. Chasen text

2Brute force attack


’ possi biliHes of sername 3 pass word
until an inteligable trons ation
’ Try evey possible key
of ciphertext into plaintext is obtained.
Brteforce attacks con be done by guosing
perfoms exaustic key seorch
Tools for b te force attacks
1Ajr crack - NG 2]Cain f Able 3] Crack
4 Hydra 6 Hachtag J Roin bow Crack
Asymmetepivak
tricpublic
Symme (Sender mmetrieasy
Transposition
1Rail7cipher Playfair
Substitution 4
s q Techique
Transposi
tHon Classi
substitution
Technique symmetnc *Cryptography1 o&l2024Dode30] khown to
Row- cipherHil 4TCaesor
(seeretay cipherfen ce
one Mono cal AasymmetSymmet
ric ric
medllum
col Hne alphabehe encyphon
ttanspo5) C
padeling cipher echnique.
pher as
toReceves encySender
Transmss)on ’ Both ’
cipher pt Pivae
Hon cípher ipmotors. enypt
technique &
asksSedcn s decrypt
sender
atta
may ck the Receíver key
atacker - &ecevos at
neic’
private
Symnchic
pubic dela the used
Recener)DE
(servetl
data ereiverend. have
f use
same
send Same
public
their
heis key
key Page Data

publleprivote tu public
classMate

key key key

Graphs O
Povinces
Number of
gueue
FIFO BFS
1
2 ’ =2 1
6 Standqsd
|21 o|2 3475 2
{ 3
4 2

1t0 S6 alg
8
f orithms
yDu 897

go
fom

node 1’2’<474

to
any Page Date

ohe alkssmate

no
de
"Caesar cipher slaccute
imple ntaHon
nent
clasical encrypton technique ’ easy
Steps

’ c a e Sas
cipher onl
80 Logl 24

Diffusion Models Generatve model


ODffusion model
In oI5 ICML 15 eseqsch paper)
Can produce ealisi c e diverse dota su ch as imgges,
StepS ’

1 FoTwnd diffuslon poocess


tuns Îrnage into noise
Revcrse diffusion ppcesS
tums noise into 0mage

Sep +ake Image & qencer e some noise


Step2 ’ Add tkat Aojse to
to destrey diffesion
StepB

"Fonwavd diffusion pncess


mor Ikov chuip that sfayts fom 4he
original
ends at noise sgmple E
erch ines tep t the data is ompkd by
ad sing Gaussian noise to it
Yoise levcl incxases as
the the Finaltep 7
- A fhit comple kely ndom e indepon d'ent ofu
cAssRAte
7
03l0g 12024 Date
Page
key
Date
" shift caesar cipher plain () 22 o17 43 8 18 2 I4 21 4 7
4ext
Hete key value = 2)3 4yS) 6, s 3
cipher (cr) 3 8 11 2 18 10 12 3 13 2 2 8 2
eg
text
CT CS k md n e C T C P T
C= P+ k) mod 26
HE L LO Date. o4 |ogI 2024
4 4 4 4 4 b) Vernam's cipher
15 15 L8
nod 26 mod26 mad6 mod26 mod 26
Cryptographic
atqo
P PS
k
Mono alpha beic cipher encryption
-uses permuttation
ech choracter is eplece d by sqme choTQ tes in Cry ptographic
that file - 25 alQo
3 Poly alphobe ic cipher ki
Peplace character wlth cormbinaton op caeser ciphert
monga\phc be tic ipher.
P;= Cik decnyption
) vigenos e's cipher
EC;F (Pi+ kimodec) mod 2s
p CPf) = (ei-kË mod 26)mod 26
ekample - key i HelloHelloHelloHello
P1 we ane discovered
elkssate
4 Playfair cipher uheat s tone
cipher
Date
Poge
Data
14 ls also knoon as technique Paae
smmetric ercrptionsubsihuton cipher
*Usec manuol
se first ierol diagrom ike at ta
"I mulHple lek ercrPtion cipher SR
. Constcts 5X5 ma trix.
P
L
B
A
C
balloon
G|I J
D E
ba
T
Y
balxl Oon
Ooperations ba
1 Repeating letker - iller letters US pM NA
Some column aurap around Cdown ard)
3 Same 0 toTap aound ( ) ( hoDzonta) Substi
4 Rectangle swop ( Rail feee
lassica! Cncry Te ch Traus
Dae o669|2 024 ROw-Roumy
M A- R
D Ral feeei
G
depth 2
UOaed c 1Oerdso ce
atack
at ta
Dafe
Page

Ro o- Column

-41253
4 5
5 3 3

pINS A F KP &Q LQ EJOTeH MR

You might also like