cover photo

BLOG · 14/9/2023

CL-CY Level 1 (overflowed...)

Flooded part of the report

Shriram Rayakar
Shriram Rayakar
OP
CL-CY Level 1 (overflowed...)
This Article is yet to be approved by a Coordinator.

Task 8 - Introduction to Cybersecurity\n\nIt is a field of computer science which deals with the process of preventing the attacks, leaks and unauthorized access to the confidential information.\n\nWhy Cybersecurity?\n- Protection of your business\n- Increased productivity\n- Customer confidence\n- Data security\n\n### CIA: Confidentiality, Integrity, Availability\nThese are the Parameters which define the industry standard for cybersecurity.\n \nConfidentiality: Asserts that Information and functions are accessed only by authorized parties.\n\nIntegrity: Asserts that information and functions are modified, added and removed only by authorized parties.\n\nAvailability: Asserts that systems, functions and data should be available on demand based upon the agreed-upon parameters based on the level of the service.\n\nCyber-crimes:\n1. Computer Assisted \n2. Computer as Target\n3. Computer incidental to crime\n\nTypes of hackers:\nBlack Hat. Grey Hat, White Hat\n\nMost common attacks in CS:\n- DOS- Denial of service\n- Malware\n- Phishing\n- Cross site scripting \n- Password attack\n - SQL injection\n\n\n1. Malware: A malware attack is a common cyberattack where malware (normally malicious software) executes unauthorized actions on the victim’s system. The malicious software (a.k.a. virus) encompasses many specific types of attacks such as ransomware, spyware, command and control, and more. example: https://blog.rapid7.com/2019/05/13/wannacry-two-years-on-current-threat-landscape-forgotten-lessons-and-hope-for-the-future/\n***Types of Malware:\nThere are three main types of malware attack vectors:\n\n- Trojan Horse: This is a program which appears to be one thing (e.g. a game, a useful application, etc.) but is really a delivery mechanism for malware. A trojan horse relies on the user to download it (usually from the internet or via email attachment) and run it on the target.\n- Virus: A virus is a type of self-propagating malware which infects other programs/files (or even parts of the operating system and/or hard drive) of a target via code injection. This behavior of malware propagation through injecting itself into existing software/data is a differentiator between a virus and a trojan horse (which has purposely built malware into one specific application and does not make attempts to infect others).\n- Worm: Malware designed to propagate itself into other systems is a worm. While virus and trojan horse malware are localized to one infected target system, a worm actively works to infect other targets (sometimes without any interaction on the user’s behalf).\n\n2. Phishing: Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually done through email. The goal is to steal sensitive data like credit card and login information, or to install malware on the victim’s machine.\nPhishing starts with a fraudulent email or other communication that is designed to lure a victim. The message is made to look as though it comes from a trusted sender. If it fools the victim, he or she is coaxed into providing confidential information, often on a scam website. Sometimes malware is also downloaded onto the target’s computer.\nTypes of phishing attacks***: Deceptive phishing, Spear phishing, Whaling, Pharming\n\n\n3. Social engineering\nSocial engineering is the term used for a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.\n\nimgur\nTechniques of Social Engineering: Baiting, Scareware, Pretexting\n \n\n\n\n\n### Ciphers:\n\n1. Ceaser Cipher: It is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet.\n\nPlain Text: Cybersecurity in Marvel\n\n\nShift 10: \n🠜10 (🠞16)\t`Milobcomebsdi sx Wkbfov`\n🠞10 (🠜16)\t`Soruhiuskhyjo yd Cqhlub` \n\n\n2. Pigpen Cipher: is a geometric simple substitution cipher, which exchanges letters for symbols which are fragments of a grid.\n\n\n\nEncoded: Imgur\n\n3. Morse Code: Morse code is a method used in telecommunication to encode text characters as standardized sequences of two different signal durations, called dots and dashes, or dits and dahs.[3][4] Morse code is named after Samuel Morse, one of the inventors of the telegraph.\n\n\n\nEncoded: -.-. -.-- -... . .-. ... . -.-. ..- .-. .. - -.-- / .. -. / -- .- .-. ...- . .-..\n\n4. Rail Fence Cipher: The rail fence cipher (also called a zigzag cipher) is a classical type of transposition cipher. It derives its name from the manner in which encryption is performed, in analogy to a fence built with horizontal rails.\n\n\nGrid[rails-3]:\n \nC r u y v \n y e s c r t n M r e \n b e i i a l\n \n\nencoded text: Cruy v yescrt nMre beiial \n\n\n5. Polybius CIpher: It is used for fractionating plaintext characters so that they can be represented by a smaller set of symbols, which is useful for telegraphy, steganography, and cryptography. \n\nGRID: \n\n| \ | 1 | 2 | 3 | 4 | 5 | \n|:-:|:-:|:-:|:-:|:-:|:-:|\n|1 | A | B | C | D | E |\n|2 | F | G | H | I | J |\n|3 | K | L | M | N | O |\n|4 | P | Q | R | S | T |\n|5 | U | V | W | X | Y |\n\n\n\n\nencoded: 135512154344151351432445552434331143521532\n\n6. Playfair Cipher: The Playfair cipher uses a 5×5 grid of letters, and encrypts a message by breaking the text into pairs of letters and swapping them according to their positions in a rectangle within that grid.\n\nRules: \n7. If both letters are the same (or only one letter is left), add an \X" after the first letter. Encrypt the new pair and continue. Some variants of Playfair use "Q" instead of "X", but any letter, itself uncommon as a repeated pair, will do.\n\n8. If the letters appear on the same row of your table, replace them with the letters to t\n9. Heir immediate right respectively (wrapping around to the left side of the row if a letter in the original pair was on the right side of the row).\n\n10. If the letters appear on the same column of your table, replace them with the letters immediately below respectively (wrapping around to the top side of the column if a letter in the original pair was on the bottom side of the column).\n\n11. If the letters are not on the same row or column, replace them with the letters on the same row respectively but at the other pair of corners of the rectangle defined by the original pair. The order is important – the first letter of the encrypted pair is the one that lies on the same row as the first letter of the plaintext pair.\n\ngrid: Playfair square\n| M | A | R\t| V\t| E |\n| -- | -- | -- | -- | -- |\n| L | B\t| C\t| D\t| F |\n| G | H\t| I\t| K\t| N |\n| O | P\t| Q\t| S |\tT |\n| U | W | X\t| Y |\tZ |\n\n\nencrypted: DXFAVQRFXMNQXKGERVEMCU"

UVCE,
K. R Circle,
Bengaluru 01