DES
DES
until the correct one is found. It’s like guessing a password by trying every possible option one by one. This method can be effective but is often
time-consuming, especially if strong passwords (long, complex, unique) are used.
To counter brute-force attacks, common protections include:
Account lockouts after several failed attempts.
CAPTCHAs to verify human input.
Using strong, complex passwords.
Modern attackers may use automated tools and powerful computers, making the attack faster, especially if the target uses weak or short passwords.
A dictionary attack is a type of brute-force attack where the attacker tries to guess the password by using a list of likely passwords (a "dictionary")
rather than trying every possible combination. The dictionary typically contains common passwords, phrases, and variations like:
Confusion and diffusion are cryptographic principles used to make ciphers secure:
Confusion: It ensures the relationship between the plaintext and ciphertext is complex. The attacker should not be able to find any direct pattern or
connection between the input (plaintext) and the output (ciphertext). Achieved using substitutions in encryption (e.g., replacing characters or bits).
Diffusion: It spreads out the influence of each part of the plaintext over the ciphertext. A change in one bit of the plaintext should result in many
changes in the ciphertext. Achieved using permutations or mixing operations.
Web security refers to the measures and practices taken to protect websites, web applications, and online services from cyber threats and attacks.
It aims to prevent unauthorized access, data breaches, malware, and other malicious activities.
Key components of web security include:
Encryption (e.g., HTTPS) for secure data transmission.
Firewalls and intrusion detection systems to block unauthorized traffic.
Input validation to prevent attacks like SQL injection or cross-site scripting (XSS).
Authentication and access control to ensure only authorized users can access certain data or features.
Web security helps protect user data, maintain trust, and prevent disruptions in online services.
Virus: A virus is a malicious program that attaches itself to a legitimate file and spreads when the file is opened or executed. It can corrupt files,
steal data, or disrupt system performance.
Worms: Worms are self-replicating programs that spread across networks without user interaction. Unlike viruses, worms don’t need to attach to files;
they exploit network vulnerabilities.
Trojan Horse: A Trojan horse is a type of malware disguised as a legitimate program. When executed, it performs malicious actions, like stealing data
or creating a backdoor for attackers, without the user’s knowledge.
Phishing:
Phishing is a cyberattack where attackers impersonate a trusted entity (e.g., a bank or popular website) to trick users into revealing personal information
like passwords or
credit card details. It often occurs through fake emails, websites, or messages designed to look authentic.
JavaScript: JavaScript is a popular programming language used to create interactive and dynamic content on web pages (e.g., forms, animations).
It runs directly in the browser and enhances user experience.
VBScript: VBScript (Visual Basic Script) is a scripting language developed by Microsoft, mainly used for server-side automation and creating dynamic
web content in Internet Explorer. It is now largely outdated.
JScript: JScript is Microsoft’s implementation of JavaScript. It is similar in syntax and function but was specifically designed for use with Microsoft’s Internet Explorer.
Applets: Applets are small Java programs embedded in web pages, designed to run in a web browser. They enhance web functionality but can pose security
risks if they execute malicious code.
ActiveX Controls: ActiveX controls are Microsoft components that add interactive features to web pages and applications (e.g., video players). They have access to
system resources, making them a potential security risk if exploited.