Assigenment Information Security 1 -1
Assigenment Information Security 1 -1
Assignment
Assignment No 1 (A)
b. What is Cryptography
g. Encryption Vs Hashing
s. What are the latest tools and frameworks for Cyber Security?
a. Definitions:
Virus: A malicious software program that can replicate itself and spread to other
computers. It attaches itself to legitimate software, and when that software is executed,
the virus is activated.
Malware: Short for "malicious software," it refers to any software intentionally designed
to cause damage or disruption to a computer system. This includes viruses, worms,
trojans, ransomware, and more.
Ransomware: A type of malware that encrypts the victim's data and demands payment
(ransom) for the decryption key. It holds the victim's files hostage until payment is made.
b. Cryptography: Cryptography is the practice of securing communication and data through the
use of codes and ciphers. It involves creating algorithms to protect data confidentiality, integrity,
authentication, and non-repudiation.
Firewalls: A network security system that monitors and controls incoming and outgoing
traffic.
Encryption: Encrypting data to protect it during transmission or storage.
Multi-Factor Authentication (MFA): Using more than one method to verify a user's
identity.
Intrusion Detection Systems (IDS): Detecting unauthorized access attempts.
Virtual Private Networks (VPNs): Ensuring secure remote access to a network.
Access Control: Limiting access to sensitive resources based on user roles.
d. Differences:
Symmetric encryption uses the same key for both encryption and decryption. Example:
AES (Advanced Encryption Standard).
Asymmetric encryption uses a pair of keys: a public key for encryption and a private
key for decryption. Example: RSA (Rivest-Shamir-Adleman).
f. CIA Triad: The CIA Triad refers to the three core principles of information security:
Encryption: Converts data into a coded format that can be reversed back to its original
form using a key.
Hashing: Converts data into a fixed-length value or hash, which cannot be reversed back
to the original data.
Increased reliance on technology: More devices and systems are connected to the
internet.
Anonymity: Cyber criminals can operate anonymously online.
Financial gain: Cybercrime can be lucrative, especially with activities like ransomware
and identity theft.
Lack of cybersecurity awareness: Many individuals and businesses are still unaware of
security risks and best practices.
i. Firewall: A firewall is a network security system designed to monitor and control incoming
and outgoing network traffic based on predetermined security rules. It is used to block
unauthorized access and protect against cyber threats.
j. SSL Encryption: Secure Sockets Layer (SSL) is a cryptographic protocol used to secure
communication over a computer network, ensuring that data transferred between a web server
and a browser remains private and integral. SSL has been replaced by TLS (Transport Layer
Security), but the term SSL is still widely used.
Active Cyber Attack: The attacker attempts to alter system resources or affect the
system's functionality. Examples include DoS (Denial of Service) attacks, man-in-the-
middle attacks.
Passive Cyber Attack: The attacker intercepts or eavesdrops on communications without
modifying the system or data. Examples include packet sniffing or traffic analysis.
m. Common Cyberattacks:
Brute Force Attack: An attack method where an attacker tries all possible combinations
to guess a password or encryption key.
Prevention: Use strong, complex passwords, implement account lockout mechanisms
after failed attempts, and employ multi-factor authentication.
p. Public Key Infrastructure (PKI): PKI is a framework that manages digital keys and
certificates to enable secure communications and authentication. It involves a combination of
hardware, software, policies, and standards to ensure secure exchanges.
Wireshark: A network protocol analyzer used for network troubleshooting and analysis.
Metasploit: A penetration testing framework for identifying vulnerabilities.
Nmap: A tool for network discovery and vulnerability scanning.
Kali Linux: A Linux distribution specifically designed for penetration testing.
SIEM (Security Information and Event Management): Tools like Splunk and ELK
stack that aggregate and analyze security data for real-time threat detection.
Endpoint Protection Platforms (EPP): Tools like CrowdStrike and Sophos that protect
endpoints from threats.