cover photo

COURSEWORK

Shariq's CL-CY-001 course work. Lv 1

Shariq KhanAUTHORACTIVE
This Report is yet to be approved by a Coordinator.

14 / 9 / 2023


Task 1 - Javascript

Learn the basics of javascript and create a small webpage which takes the names and marks of ten students and calculates the

  • Percentage of each student
  • Class average
  • Rankings of the students

By learning the concepts of java script I developed a website which will perform the given task

Git hub link for the source code

 Images of the website

Interface of the website

WhatsApp Image 2023-08-29 at 22 12 25

Entering the value

Screenshot 2023-08-29 220052

Output of the website

Screenshot 2023-08-29 220116

Task 2 - Async JS

Learn about asynchronous javascript and implement a small callback based program that displays the steps of a food recipe (consisting of at least 10 steps).

Git hub link for the source code

 Images of the website

Screenshot 2023-08-29 223205 Screenshot 2023-08-29 223229 Screenshot 2023-08-29 223422

Task 3 - Promises

Implement the above recipe program with promises and list the potential benefits and improvements of using the same.

Github link for the source code Screenshot 2023-08-29 224015

TASK 4: Get familiar with the command line on ubuntu:

Ubuntu is a linux based operating system used in computers . As I have seen it is more responsive than windows, and as it all the compatibility of linux commands it is more efficient than windows.

I have used the following commands to carry out this task:

1. Creating a folder named test : mkdir test.
2. Change directory: cd.
3. Knowing the current directory: pwd.
4. To create empty folder : touch file name.
5. For creating 2600 folders:  mkdir M{1..2600}.
6. Concatinating 2 files _file1.txt_ _file2.txt_ and displaying contents in another file 
    _output.txt_ :  cat file1.txt file2.txt>output.txt
7. Displaying the concatenated contents Command : cat output.txt

WhatsApp Image 2023-04-23 at 13 15 56 WhatsApp Image 2023-04-23 at 13 21 50

TASK 5: VI

Learn the basics of vi and create a markdown file in vi illustrating the various features of vi that you found to be fascinating.

Vi is a powerful text editor included with most Linux systems, even embedded ones

Commands in VI:
  • To open an existing file : vi /path/to/file. If we don't have an file VI will create a new
  • To edit a system file : sudo vi /etc/fstab
Once you open a file in VI you will enter in Command Mode

Writing anything in command mode results in unexpected behaviour.

  • Use x key to delete a character.
  • Use dd to delete an entire line.
  • To copy and paste , select the text and press v key and then press y to copy selected text. Then to paste press p key.
 Insert mode:
Insert mode allows to enter text in VI
  • To enter into insert mode : 'i' key

Once you entered the text entered is written in file rather than treating it as a command.

  • To come back to command mode press : Escape
  • Type :wq and press enter to write the file to disk and quit vi.

Task 6 - Linux Continued

Learn the basics of regex and piping in Linux.

Regular Expressions (Regex):

Definition: Regular expressions are patterns that define a set of strings. They are used for searching, matching, and manipulating text based on patterns rather than specific characters.

Piping 

Definition:Piping is a method in Linux that allows you to take the output of one command and use it as the input for another command. It connects multiple commands together to create a sequence of operations.

grep
  • grep is a Linux command-line utility that searches for patterns in text files using regular expressions

Task 7 - Introduction to Cloud Computing

  • Cloud computing refers to data and application being stored and run on rater than our pc's.
  • The organization which provides and manages cloud services is called cloud provider.

There are two models of Cloud computing

1. Service model

We have three types of Service Models

Screenshot 2023-09-14 225232

a. SAAS - Software as a service

  • Here the cloud provider manages all hardware, software , networking , operating system and storage.
  • For example we have google docs where we can access all the files, videos or photos without actually having it on our pc.

b. PAAS - Platform as a service

  • Here the cloud provider provides platform ie storage , operating system , networking etc, but we have manage the application and its data.
  • Microsoft Azure , AWS provides platform cloud for carrying out various projects.

c. IAAS - Infrastructure as a service

  • Here the cloud provider only provides and manage storage , virtualization and networking portion. We should manage all the software part that is application, data , operating system and runtime.
  • For example backup services like idrive, google photos provies Iaas.

2. Deployment Model

a.Public cloud

The cloud infrasture is made available to general public over internet and is owned by a cloud provider Example: AWS , Alibaba , GCS

b.Private cloud

The cloud infrastructure is exclusively operated by a single organization. It can be managed by the organization or a third party. Example : AWS, VMware

c.Hybrid Cloud

It consists of functionalities of both public and private cloud Example : Companies opt for private cloud when sensitive information is involved and they use public cloud to share datasets with general public.

Setting up a local file sharing solution and accessing shared files from different devices.

Setting up a local file sharing solution can be useful for sharing files between devices within your home or office network.

These are steps to set up a network share on computer

Step 1: Choose the Host Computer

You need to select the computer that will serve as the host for sharing files. This computer should be connected to the same local network as the other devices you want to share files with.

Step 2: Enable File and Printer Sharing
  • Open the Control Panel on the host computer.
  • Navigate to etwork and Sharing Center" or "Network and Interne " depending on your Windows version.
  • Click on "Change advanced sharing settings" on the left sidebar.
  • Under the Private network profile section, ensure that "Turn on network discovery" and "Turn on file and printer sharing" are selected.
  • Click "Save changes." Screenshot 2023-09-15 000316
Step 3: Share a Folder
  • Navigate to the folder you want to share on the host computer.
  • Right-click on the folder and select "Properties."
  • Go to the "Sharing" tab.
  • Click on "Share..."
  • Choose the users or devices you want to share the folder with. You can also set their permissions (read-only or read/write).
  • Click "Share." Screenshot 2023-09-15 001258
Step 4: Access Shared Files from Another Device

Now, you can access the shared folder from another device on the same network.

  • Open File Explorer.
  • In the address bar, type \\hostname (replace "hostname" with the name of the host computer).
  • Press Enter.
  • You should see the shared folder. Double-click to access it. Screenshot 2023-09-15 000432

Task 8 - Introduction to Cybersecurity

Basics of cybersecurity: confidentiality, integrity, availability (CIA)

Here I learnt the basics of cyber security, ie CIA

  • Confidentiality : Ensuring that date is private and accessible to authorized users only.
  • Integrity : This means data is available to users but ensuring that it is remains unaltered and reliable throughout its lifecycle.
  • Availability : This means ensuring that data and systems are accessible whenever required.
Common types of cyber threats: malware, phishing, social engineering
  • Malware : Its consists of programs designed to harm , infiltrate and gain unauthorized access to other data and systems.
  • Phishing : Its a technique where attackers pretend to trusted people and try to take personal details of the users.
  • Social Engineering : In this the attackers manipulate human psychology to gain access to confidential information, systems, or physical locations.
Overview of cybersecurity frameworks and standards

Cybersecurity frameworks and standards are like guidelines or rules that organizations follow to keep their digital information safe from hackers and other threats. They help organizations figure out how to protect their computers, networks, and data.

Cryptography and various ciphers

Cryptography is a method of securing information by transforming it into unreadable format , and transformed back back to original whenever required.

Converting the text "Cybersecurity in Marvel" into :

1. Caesar Cipher (Shift of 3): "Fbvehvfxwphlv lq Phduvo."

2. Pigpen Cipher : Screenshot 2023-09-15 204512

3. Morse Code: "-.-. -.-- -... . .-. ... -.-. ..-. .. -.-- . -. / .. -. / -- .- .-. ...- . .- .-.."

4. Rail Fence Cipher (2 Rails): "CeeeyeiMeabtvrcyrfnnl."

5. Polybius Cipher : " 13 54 12 15 42 43 15 13 45 42 24 44 54 24 33 32 11 42 51 15 31".

6. Playfair Cipher : "DXYDYKMCWYI LY BGNSCK."

Detailed review on Cyber Security

Link for resource article

"

UVCE,
K. R Circle,
Bengaluru 01