cover photo

RESOURCE · 15/9/2023

Cyber Security

Knowing about the basics of Cyber security

Shariq Khan
Shariq Khan
OP
Cyber Security
This Article is yet to be approved by a Coordinator.

Basics of cybersecurity: confidentiality, integrity, availability (CIA)

  Confidentiality: 

Encryption: Using encryption algorithms to protect sensitive data like personal information, financial records, or confidential documents from being accessed by unauthorized parties.

Access Control: Implementing strict access controls and user authentication mechanisms to ensure that only authorized users can access sensitive systems or data.

Integrity:  

Checksums: Calculating checksums or hash values for files and comparing them before and after transmission to detect any unauthorized changes during transit.

Digital Signatures: Applying digital signatures to documents or software to verify their authenticity and detect any alterations.

Availability:

Redundancy: Setting up redundant servers and systems to ensure that critical services remain accessible even if one system fails.

Distributed Denial of Service (DDoS) Mitigation: Using DDoS mitigation techniques and services to prevent or minimize disruptions caused by large-scale DDoS attacks that can overwhelm systems and networks.

Common types of cyber threats: malware, phishing, social engineering.

Here's an explanation of common types of cyber threats:

Malware (Malicious Software):

Definition: Malware is a broad category of software specifically designed to harm, infiltrate, or gain unauthorized access to computer systems or data.

Examples:

  • Viruses: These are programs that can replicate themselves and spread to other files and systems. They can corrupt or delete data.
  • _ Trojans:_ These appear to be legitimate software but have malicious intent, often providing backdoor access to attackers.
  • Ransomware: Encrypts a victim's files and demands a ransom for decryption. If not paid, the data can be permanently lost.
  • Worms: Self-replicating malware that spreads across networks, often causing network congestion or damage.
Phishing:

Definition: Phishing is a deceptive technique where attackers impersonate trusted entities (e.g., banks, social media, or email providers) to trick individuals into revealing sensitive information or performing actions, such as clicking on malicious links. Examples:

  • Email Phishing: Attackers send fraudulent emails that appear legitimate, encouraging recipients to click on links or download malicious attachments.
  • Spear Phishing: Targets specific individuals or organizations, often using personalized information to increase credibility.
  • Smishing: Similar to email phishing but carried out through SMS or text messages.
Social Engineering:

Definition: Social engineering is a tactic where attackers manipulate human psychology to gain access to confidential information, systems, or physical locations. Examples:

  • Pretexting: Attackers create a fabricated scenario or pretext to extract information. For instance, pretending to be an IT technician requesting login credentials for a system update.
  • Baiting: Leaving a physical device (e.g., infected USB drive) in a location where someone might find and use it, thereby introducing malware to the victim's system.
  • Tailgating: Gaining unauthorized access to a secure area by following an authorized person through a controlled entry point, taking advantage of their access.

Overview of cybersecurity frameworks and standards

Cybersecurity frameworks and standards are like guidelines or rules that organizations follow to keep their digital information safe from hackers and other threats. They help organizations figure out how to protect their computers, networks, and data.

Here are some of the main ones:

NIST Cybersecurity Framework: This framework helps organizations identify what needs protection, how to protect it, and what to do if there's a problem.

ISO/IEC 27001: It's an international standard that helps organizations manage their information security. It shows them how to create a plan to keep information safe and continuously improve it.

CIS Controls: These are a list of security actions that organizations can follow to improve their security. They're organized into groups based on how important they are.

COBIT: This helps organizations make sure their technology and cybersecurity practices are in line with their business goals.

PCI DSS: If a company deals with credit card payments, this standard tells them how to keep credit card information safe.

HIPAA: For healthcare organizations, this standard makes sure patient information is kept private and secure.

Cryptography and various ciphers

Cryptography is the science of securing information by transforming it into an unreadable format and then back into a readable format using a specific method or algorithm. These methods are known as ciphers. Let's explain some common ciphers:

Caesar Cipher:

Description: Named after Julius Caesar, it's a substitution cipher where each letter in the plaintext is shifted a fixed number of positions down or up the alphabet.

Example: With a shift of 3, \HELLO" becomes "KHOOR."

Pigpen Cipher (also known as the Masonic Cipher):

Description: Uses geometric shapes to represent letters. It's often used for simple handwritten codes.

Example: The letter "A" is represented as a dot in the center square of a 3x3 grid.

Morse Code:

Description: A system of dots and dashes (or short and long signals) used to represent letters and numbers. It's commonly used in telecommunications.

Example: "SOS" is represented as "... --- ...".

Rail Fence Cipher:

Description: A type of transposition cipher where the plaintext is written in a zigzag pattern, and then the characters are read off in rows.

Example: With a rail count of 3, "HELLO" becomes "HOLEL."

Polybius Cipher:

Description:Uses a 5x5 grid to assign each letter a pair of coordinates. The coordinates represent the letter's position in the grid.

Example: In the grid, "A" might be at coordinates (1, 1), and "B" at (1, 2).

Playfair Cipher:

Description: Uses a 5x5 grid of letters to encrypt digraphs (pairs of two letters). It involves specific rules for handling duplicate letters.

Example: For "HELL " the encrypted result might be "DDEFS."

These ciphers are historical examples of how cryptography was used to protect information. However, many of them are relatively simple and can be easily deciphered using modern cryptographic techniques. Modern cryptography relies on more complex algorithms and mathematical principles to ensure robust security.

"

UVCE,
K. R Circle,
Bengaluru 01