cover photo

COURSEWORK

Priyanka's CL-CY-001 course work. Lv 3

Priyanka J LAUTHORACTIVE
This Report is yet to be approved by a Coordinator.

2 / 1 / 2025


TASK 01: DOCKER

Docker is a containerization platform that allows developers to package, ship, and run applications in containers.

Docker Architecture

The Docker architecture consists of:

  • Docker Engine: The Docker Engine is the runtime environment for containers. It provides a lightweight and portable way to run containers.
  • Docker Hub: Docker Hub is a registry for Docker images. It provides a centralized location for users to share and manage their images.
  • Docker Images: Docker images are templates for creating containers. They contain the application code, libraries, and dependencies required to run the application.
  • Docker Containers: Docker containers are runtime instances of Docker images. They provide a isolated environment for running applications.

Key Benefits of Docker

Some of the key benefits of Docker include:

  • Lightweight: Containers are much lighter than VMs, making them faster to spin up and down.
  • Portable: Docker containers are highly portable and can run on any system that supports Docker, without requiring a specific environment or dependencies.
  • Isolated: Containers provide a high level of isolation between applications, making it easier to manage and secure them.
  • Efficient: Docker containers can help reduce infrastructure costs by allowing multiple applications to run on the same host, without the need for multiple VMs. alt text alt text

TASK 2: DOCKERFILE SPYWARE

A Dockerfile spyware would be a Dockerfile (a text file containing instructions for building a Docker image) that is designed to create a Docker image that contains spyware.

In other words, it's a recipe for building a Docker container that would secretly monitor and collect sensitive information from the host system or other containers, without the user's knowledge or consent. alt text

TASK 3: HASHING

Hashing is a process that takes input data (like a book title) and generates a unique fixed-length code, called a hash value or digest. This hash value represents the original data.

Here's how it works:

  1. You input data
  2. A hashing algorithm processes the data.
  3. The algorithm generates a unique hash value (a code).
  4. This hash value is stored or used for later reference.

Hashing is useful for:

  • Data integrity: Hash values ensure data isn't tampered with or altered.
  • Data storage: Hash values help quickly identify and retrieve data.
  • Password security: Hash values are used to store passwords securely.
  • Digital signatures: Hash values verify the authenticity of digital documents alt text

TASK 4: NMap

Nmap (Network Mapper) is a free, open-source network scanning and exploration tool used to discover hosts, services, and operating systems on a computer network.

Nmap sends specially crafted packets to target hosts and analyzes the responses to gather information about:

  1. Host discovery: Identifying active hosts on a network.
  2. Port scanning: Detecting open ports and services running on a host.
  3. OS detection: Identifying the operating system and its version.
  4. Service version detection: Identifying the version of services running on a host.

Nmap is commonly used for:

  1. Network inventory and asset management
  2. Vulnerability scanning and assessment
  3. Penetration testing and security auditing
  4. Troubleshooting network connectivity issues

alt text

UVCE,
K. R Circle,
Bengaluru 01