Week 1
Week 1
Week-1
Information security covers the tools and processes that organizations use to
protect information. Information security protects sensitive information
from unauthorized activities, the goal is to ensure the safety and privacy of
critical data such as customer account details, financial data or intellectual
property.
Confidentiality:
Integrity:
Availability:
Accountability:
According to CIDS, accountability means that people will be held responsible
for their actions and for how they perform their duties. Accountability
involves having control and verification systems in place, and, if necessary,
the ability to arrest, prosecute and convict offenders for illegal, or corrupt
behavior. All personnel must be held accountable under the law regardless
of rank, status or office.
Threats:
Any circumstance or event with the potential to adversely impact
organizational operations (including mission, functions, image, or
reputation), organizational assets, individuals, other organizations, or the
Nation through an information system via unauthorized access, destruction,
disclosure, modification of information, and/or denial of service.
Attack:
An attack is an information security threat that involves an attempt to
obtain, alter, destroy, remove, implant or reveal information without
authorized access or permission
Malware:
Malware, or malicious software, is any program or file that is intentionally
harmful to a computer, network or server.
Virus:
A computer virus is a type of malicious software, or malware, that spreads
between computers and causes damage to data and software.
Worms:
A computer worm is a type of malware that spreads copies of itself from
computer to computer. A worm can replicate itself without any human
interaction, and it does not need to attach itself to a software program in
order to cause damage.
Anti-malware:
An anti-malware is a software that protects the computer from malware
such as spyware, adware, and worms. It scans the system for all types of
malicious software that manage to reach the computer. An anti-malware
program is one of the best tools to keep the computer and personal
information protected.
Hacking:
Hacking is an attempt to exploit a computer system or a private
network inside a computer. Simply put, it is the unauthorized access to
or control over computer network security systems for some illicit
purpose.
Intruders:
Intruders are the attackers who attempt to breach the security of a network.
They attack the network in order to get unauthorized access.
Week-2
Security Basic
Active Attack:
Interception
Interruption
Modification
the attacker uses existing communications, and either replays them to fool
one of the communicating parties, or modifies them to gain an advantage.
Fabrication
Passive Attack:
Week-3
Cryptanalysis
Brute force Attack
Cryptanalytic Attack
Chosen Plain Text
Chosen Cipher Text
Chosen Text
Cipher Text only
Known plain text
Cryptanalysis:
Cryptanalysis is the study of methods for obtaining the meaning of
encrypted information, without access to the secret information that is
typically required to do so. Typically, this involves knowing how the system
works and finding a secret key. Cryptanalysis is also referred to as
codebreaking or cracking the code.
Cryptanalytic attacks:
To determine the weak points of a cryptographic system, it is important to
attack the system. This attacks are called Cryptanalytic attacks. The attacks
rely on nature of the algorithm and also knowledge of the general
characteristics of the plaintext
Week-4
Types of Cryptography
Symmetric Encryption
o Substitution
Ceaser cipher, Mono alphabetic, Play fair, Hill cipher
Poly alphabetic
Vegner cipher
Vernam
o Transposition
o Steganography
Public Key Cryptography
Hash Algorithm
Week-5
Famous Algorithm of Private Key Cryptography (DES & IDEA)
DES (Data Encryption Standard)
Initial & Final Permutation
DES Round
Per-Round Key generation
Mangler function
Week-6
Using Secret/Private Key Cryptography to Encrypt Large Messages
6|Page Information Security
Electronic Code Book
Cipher Block Chaining
Week-7
Modular Mathematics
Method to Encrypt messages
Congruence
Totient function
Week-8
RSA Public Key System
Deffie-Hellman Algorithm
Week-9
Authentication
Password Based
Address Based
Cryptographic Based
Week-10
Hash Algorithm/Message Digest
MD2
MD4
Week-11
Digital Signature
Trusted Intermediaries
Key Distribution Protocol
Week-12
Digital Certificate
Certification Authority
Certificate Revocation List(CRL)
Week-13
Kerberos
Notation
Simple Authentication
Establish Secure Channels
Week-14
Assumption of Kerberos and ticket
Attacks against IP