ct2 2
ct2 2
Encryption is the process of converting information or data into a code, especially to prevent
unauthorized access. It uses algorithms to transform readable data (plaintext) into an unreadable
format (ciphertext). The main types of encryption are:
1. Symmetric Encryption: Uses the same key for both encryption and decryption.
Examples include AES (Advanced Encryption Standard) and DES (Data Encryption
Standard).
2. Asymmetric Encryption: Uses a pair of keys – a public key for encryption and a private
key for decryption. Examples include RSA (Rivest-Shamir-Adleman) and ECC (Elliptic
Curve Cryptography).
BitLocker
BitLocker is a full-disk encryption feature included with Microsoft Windows (since Windows
Vista). It is designed to protect data by providing encryption for entire volumes. Key features
include:
1. BitLocker Drive Encryption: Encrypts the entire drive on which Windows is installed.
2. BitLocker To Go: Provides encryption for removable drives like USB flash drives.
3. TPM (Trusted Platform Module): A hardware component used to help secure
BitLocker keys.
Group Policies
Group Policies are a feature of Windows Server environments used to control the working
environment of user accounts and computer accounts. They provide centralized management and
configuration of operating systems, applications, and users' settings. Key aspects include:
1. Group Policy Objects (GPOs): Collections of settings created using the Group Policy
Management Console (GPMC).
2. Active Directory: Used to apply group policies in a domain environment.
3. Policy Settings: Include security settings, software installation, scripts, and folder
redirection.
AppLocker
AppLocker is a feature of Windows that helps administrators control which applications and
files users can run. This is particularly useful for ensuring that only approved applications are
used within an organization. Key features include:
Security related problems refer to various issues that can compromise the security of a computer
system. Common problems include:
1. Malware: Malicious software like viruses, worms, trojans, ransomware, and spyware.
2. Phishing: Attempts to obtain sensitive information by pretending to be a trustworthy
entity.
3. Unpatched Software: Vulnerabilities due to outdated software.
4. Unauthorized Access: Gaining access to systems without permission.
5. Data Breaches: Unauthorized access to confidential data.
Cyber Security
Cyber Security is the practice of protecting systems, networks, and programs from digital
attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive
information, extorting money from users, or interrupting normal business processes. Key areas
include:
Additional Notes
Best Practices: Regularly update software, use strong passwords, enable multi-factor
authentication, and educate users about cybersecurity.
Threat Intelligence: Gathering and analyzing information about threats to improve
security measures.
Incident Response: Procedures and actions taken in response to a security breach
Preventing cybersecurity threats involves a combination of best practices, tools, and strategies
to protect systems, networks, and data. Here are some detailed steps and measures to enhance
cybersecurity and protect against threats:
5-Data Encryption
Application Security
Secure Development Practices: Follow secure coding practices and conduct regular
code reviews.
Vulnerability Scanning: Regularly scan applications for vulnerabilities and promptly
address any found.
Physical Security
Secure Premises: Ensure that physical access to critical systems and data centers is
restricted to authorized personnel only.
Access Controls: Use access control systems, such as keycards or biometric scanners, to
secure physical locations.
Malware, short for "malicious software," is any software intentionally designed to cause damage
to a computer, server, client, or computer network. It includes various types of harmful software
that can disrupt, damage, or gain unauthorized access to systems. Here's a detailed explanation of
different types of malware and their characteristics:
Types of Malware
1. Viruses
o Definition: A virus is a type of malware that attaches itself to a legitimate
program or file and spreads from one computer to another as users share infected
files.
o Behavior: Viruses can corrupt or delete data, use system resources, and spread to
other systems.
o Examples: Melissa, ILOVEYOU, and Mydoom.
2. Worms
o Definition: Worms are standalone malware that replicate themselves to spread to
other computers. Unlike viruses, they do not need to attach to a host file.
o Behavior: Worms often exploit vulnerabilities in network protocols to spread.
o Examples: Blaster, Sasser, and Conficker.
3. Trojans
o Definition: Trojans disguise themselves as legitimate software or are hidden
within legitimate software that users download and install.
o Behavior: Once activated, Trojans can create backdoors, steal data, and allow
remote access to the infected system.
o Examples: Zeus, SpyEye, and BackOrifice.
4. Ransomware
o Definition: Ransomware encrypts a victim's files or locks them out of their
system, demanding a ransom payment to restore access.
o Behavior: It often spreads through phishing emails or malicious downloads.
o Examples: WannaCry, Petya, and CryptoLocker.
5. Spyware
o Definition: Spyware secretly monitors and collects user information without their
knowledge.
o Behavior: It can track keystrokes, capture screenshots, and harvest personal data.
o Examples: Keyloggers, Adware, and System Monitors.
6. Adware
o Definition: Adware automatically displays or downloads advertising material
when a user is online.
o Behavior: While not always harmful, adware can be intrusive and degrade system
performance.
o Examples: Fireball, Appearch, and Gator.
7. Rootkits
o Definition: Rootkits are designed to gain unauthorized root or administrative
access to a computer and hide their presence.
o Behavior: They can conceal other malware, making it difficult to detect and
remove them.
o Examples: Sony BMG Rootkit, NTRootkit, and HackerDefender.
8. Botnets
o Definition: A botnet is a network of infected computers (bots) controlled by a
central command. These bots can be used to conduct large-scale attacks.
o Behavior: Botnets are often used for distributed denial-of-service (DDoS) attacks,
spamming, and spreading other malware.
o Examples: Mirai, Storm, and Zeus.
9. Fileless Malware
o Definition: Fileless malware operates in memory without leaving files on the hard
drive, making it harder to detect.
o Behavior: It often exploits legitimate system tools and processes.
o Examples: Astaroth, Kovter, and Poweliks.
Methods of Infection
1. Phishing: Fraudulent emails or messages that trick users into downloading malware or
revealing personal information.
2. Drive-by Downloads: Inadvertent downloading of malware by visiting compromised
websites.
3. Social Engineering: Manipulating individuals into performing actions or divulging
confidential information.
4. Exploiting Vulnerabilities: Taking advantage of security flaws in software to install
malware.
5. Removable Media: Using infected USB drives or other removable media to spread
malware.
1. Antivirus and Anti-malware Software: Regularly update and run antivirus software to
detect and remove malware.
2. Firewalls: Use firewalls to block unauthorized access to networks and systems.
3. Software Updates and Patch Management: Keep all software up to date to protect
against vulnerabilities.
4. User Education: Train users to recognize phishing attempts and avoid downloading
suspicious files.
5. Backup Data: Regularly back up important data to recover in case of a ransomware
attack.
6. Access Control: Implement the principle of least privilege to limit user access to only
necessary systems and data.
7. Network Security: Use network segmentation and monitoring to detect and isolate
infected systems.
Conclusion