Assignment No.1
Assignment No.1
1
Subject: Information Security
Submitted By:
Muhammad Muzaib
Roll Number:
Bsf2204232
Submitted To:
Sir Irfan Anwar
Practical Example
Symmetric Key Encryption:
Process: Alice uses a secret key to encrypt the document using AES. She sends the
encrypted document to Bob. Bob uses the same secret key to decrypt and read the
document.
b) Given the plaintext "HELLO", encrypt it using the Caesar Cipher with a shift
of 3. Show all steps clearly.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
H→K
E→H
L→O
L→O
O→R
KHOOR
✅ Final Answer:
The plaintext "HELLO" becomes "KHOOR" after applying the Caesar Cipher with a shift of 3.
Definition: Attackers trick users into revealing sensitive information (e.g., passwords, credit card
details) by pretending to be a trusted entity via emails, messages, or fake websites.
Example: The 2017 Google Docs phishing attack stole over 1 million users' credentials by
mimicking a Google login page.
2. Ransomware:
Definition: Malware that encrypts files or locks systems, demanding a ransom (often in
cryptocurrency) to restore access.
Example: The 2017 WannaCry attack encrypted data on 200,000+ computers globally, including
NHS systems, demanding Bitcoin payments.
Example: The 2018 GitHub DDoS attack hit 1.35 terabits per second, disrupting services briefly
before being mitigated.
Employee Training and Awareness: Conduct regular training sessions to help employees
identify phishing emails and suspicious links.
Email Filtering Systems: Use advanced spam filters and email security solutions to block
phishing attempts.
Multi-Factor Authentication (MFA): Implement MFA to add an extra layer of security,
even if login credentials are compromised.
Regular Data Backups: Maintain secure, offline backups to restore data in case of an
attack.
Endpoint Protection and Antivirus Software: Install advanced antivirus and anti-malware
solutions to detect and block ransomware.
Access Control: Limit user access to sensitive data and systems, and use the principle of
least privilege (PoLP).
Network Traffic Monitoring: Use intrusion detection systems (IDS) and firewalls to
monitor and filter malicious traffic.
Load Balancers and Content Delivery Networks (CDN): Distribute traffic across multiple
servers to prevent overload.
Rate Limiting and Throttling: Limit the number of requests a user or IP address can send
in a given time period to prevent flooding.