0% found this document useful (0 votes)
6 views

Cyber_Security_Module_2_3

The document covers key concepts in Cyber Security, focusing on Cryptography and Network Security. It details various cryptographic methods such as symmetric and asymmetric key cryptography, digital signatures, and hashing algorithms, as well as network security measures including firewalls, intrusion detection systems, and DDoS attack prevention. Additionally, it highlights tools used for network analysis and security management.

Uploaded by

abhiyadav2448
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

Cyber_Security_Module_2_3

The document covers key concepts in Cyber Security, focusing on Cryptography and Network Security. It details various cryptographic methods such as symmetric and asymmetric key cryptography, digital signatures, and hashing algorithms, as well as network security measures including firewalls, intrusion detection systems, and DDoS attack prevention. Additionally, it highlights tools used for network analysis and security management.

Uploaded by

abhiyadav2448
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Cyber Security - Module 2 & 3 Notes

Module 2: Cryptography and Cryptanalysis

Cryptography is the practice of securing information and communication using mathematical


techniques.
It ensures confidentiality, integrity, authentication, and non-repudiation of data.

1. Symmetric Key Cryptography:


- Uses the same key for encryption and decryption.
- Example: AES (Advanced Encryption Standard) - Used in secure messaging apps.

2. Asymmetric Key Cryptography:


- Uses a public key for encryption and a private key for decryption.
- Example: RSA (Rivest-Shamir-Adleman) - Used in SSL/TLS certificates.

3. Message Authentication:
- Ensures a message is not altered during transmission.
- Example: HMAC (Hashed Message Authentication Code) - Used in banking transactions.

4. Digital Signatures:
- Verifies authenticity of a digital document.
- Example: DSA (Digital Signature Algorithm) - Used in software distribution.

5. Firewalls & Security Protocols:


- Firewall: Blocks unauthorized access (e.g., Windows Firewall).
- Security Protocols:
- SSL/TLS (Secure Sockets Layer/Transport Layer Security): Encrypts web traffic.
- IPSec: Secures network communications.

6. Hashing Algorithms:
- Converts data into a fixed-length hash value.
- Example: SHA-256 - Used in Bitcoin transactions.

7. Steganography:
- Hides secret messages in images, videos, or text.
- Example: A text message hidden inside an image file.

Module 3: Infrastructure and Network Security

Network security protects systems from unauthorized access, attacks, and disruptions.

1. System & Server Security:


- System Security: Protects OS, applications, and hardware.
- Server Security: Prevents hacking of web and database servers.

2. Network Security & Sniffing:


- Network Security: Protects data flow in networks.
- Packet Sniffing: Intercepts data packets.
- Example: Wireshark - A tool to analyze network traffic.

3. DDoS Attacks:
- Overloads a website/server with excessive requests.
- Example: Botnet attack - Hackers use infected computers to flood a website.

4. Intrusion Detection & Prevention Systems (IDS/IPS):


- IDS: Detects unauthorized activity.
- IPS: Blocks attacks in real time.
- Example: Snort (IDS tool).

5. Security Information Management (SIM):


- Collects and analyzes security logs.
- Example: Splunk - A security log analysis tool.

6. Firewalls & Access Control:


- Firewalls: Block malicious traffic (e.g., iptables in Linux).
- Access Control: Restricts access to resources.

7. Network Security Tools:


- Fail2ban: Blocks brute-force attacks.
- Cain & Abel: Password recovery tool.

You might also like