Security
Security
Polybius Square
Another Greek method was developed by Polybius In this system, each letter is
represented by a pair of numbers. Each letter is represented by its coordinates in
the grid. For example, "BAT" becomes "12 11 44“
Ceasar Cipher: The Ceasar Cipher is an example of what is called a shift cipher. To
encode a message, letters are replaced with a letter that is a fixed number of
letters beyond the current letter. For example, if you shift by 3, A becomes D, B
becomes E, and so on
Abash cipher: The Abash cipher is a type of substitution cipher used by Hebrew
scholars around 500 to 600 BC. In this cipher, the alphabet is reversed. This means
that A is replaced with Z, B with Y, C with X, and so on.
Example
Plaintext: This is a secret message
Ciphertext: Gsrh rh z hvxivg nvhhztv
Cipher machines
During World War II, mechanical and electromechanical cipher machines were
widely in use. For example, the Enigma machine was widely used by Nazi
Germany.
The Rise of Computer Security (1950s-1970s)
In the 1950s, mainframe computers were introduced by IBM, creating a need for
secure access. In the 1960s, MIT's CTSS MIT’s Compatible Time-Sharing system
introduced passwords to protect user accounts.
The Internet Era and Security Challenges (1980s-1990s)
Rise of Computer Viruses:
In 1971, Bob Thomas at BBN Technologies created the Creeper system, an
experimental self-replicating program to test John von Neumann's theory of self-
replication. Creeper infected DEC PDP-10 computers running the TENEX operating
system via the ARPANET, displaying the message "I'm the creeper, catch me if you
can!" The Reaper program was later developed to delete Creeper.
Firewalls: The first firewalls were developed in the late 1980s and early 1990s to
control and filter network traffic coming in and going out of a system.
In 1986, the Brain boot sector virus was released. It is considered the first virus
for IBM PC compatible computers. The virus was created by 19-year-old Basit
Farooq Alvi and his brother, Amjad Farooq Alvi, from Lahore, Pakistan.
Integrity: means making sure that information is accurate and hasn’t been
changed, and that the source of the information is genuine.
For example, if you run a website that sells products, and an attacker changes the
prices on your site so they can buy items for any price they want, that’s a failure
of integrity. The information on your site has been altered, and it’s no longer
reliable.
Availability means that authorized users can access information whenever they
need it. If attackers are unable to access the information, they may try to launch
attacks like a denial of service (DoS), which can take down the server and make
the website unavailable to real users.
For example, a university website should always be available for students and
teachers to use. If it's down, they can't access important resources.
Data Loss Prevention: People are often the weakest link in security. It's important
to use technologies and processes to make sure employees don't accidentally or
purposely send sensitive data outside the network.
Email Security: Phishing is a common way for attackers to access a network. Email
security tools can block incoming attacks and prevent sending sensitive data
through emails.
Firewalls are one of the most important tools for network security They follow
rules to allow or block traffic between your network and the internet, creating a
barrier between your trusted network and the outside world. While they are
important, they should be part of a larger security strategy.
Intrusion Detection and Prevention: These systems check network traffic to find
and block attacks. They do this by comparing activity with known attack patterns
in their database.
Mobile devices and wireless security: Wireless devices can have the same
security issues as other devices, but they can also connect to any Wi-Fi network.
This makes them more at risk and needing extra care to stay safe.
Network segmentation: This is a way to divide network traffic into different
groups, making it easier to apply security rules. For example, you can create
separate VLANs (Virtual Local Area Networks) for different departments in a
company, so each group has its own secure space
VPN
A VPN is a tool that uses IPsec to helps securely connect a device to a private
network over the internet. It creates a safe, encrypted "tunnel" so that your data
stays private and protected from hackers while traveling across the public
internet.
Some Security Concepts
Threat:
Threat is a possible danger that might breach or break the security system and
cause harm.
Adversary (Threat Agent): The person or group who creates the threat to the
network.
Threat is a possible danger that might breach the security system and cause harm.
Risk: Risk is the chance that something bad could happen to the network, like
losing data or services, because of a threat.
Attack: An attack is any action or method used by an adversary to try to break into
the network and cause harm. It’s an attempt to compromise the network’s security.
Cyberattacks
What is a cyberattack?
4. Extorting Money: Asking for money to fix or stop damage, like unlocking
files that have been locked by hackers.
Types of Cyberattacks
1. Malware
2. Denial-of-Service (DoS) Attacks
3. Phishing
4. Spoofing
5. Identity-based attacks
6. Code Injection Attacks
7. Social Engineering Attacks
8. sAI-Powered Attacks
1.Malware:
Malware is any harmful software or program created to damage or disrupt a
computer, network, or server. It's the most common type of cyberattack and
includes different types like: ransomware, trojans, spyware, viruses, worms,
keyloggers, bots, and any other type that leverages software in a malicious way.
Type Description
Virus A type of malware that attaches to a real file and needs you to
open it. It can mess up files and slow down your computer or
damage the system.
Worms A worm is a type of malware that spreads by itself. It can get into
your system through weaknesses in software or fake messages.
Worms can delete files, add more malware, use up network space,
and make your system crash.
Type Description
Mobile Mobile malware is any type of malware designed to target
Malware mobile devices. Mobile malware is delivered through fake
downloads, weaknesses in the operating system, phishing,
smishing, or using unsecured Wi-Fi.
Scareware Scareware tricks users into thinking their computer has a virus.
You'll usually see a pop-up warning you about an infection. It
tries to convince you to install fake antivirus software to fix the
problem. When you download it, it can actually infect your
computer with malware.
Keylogger Keyloggers are programs that record everything you type on your
device. They can be used for good reasons, but often they're used
to steal information. In an attack, the keylogger sends everything
you type to the hacker.
3. Phishing
Phishing is a type of cyberattack where attackers use email, texts, calls, social
media, and tricks to get people to share sensitive information like passwords or
account numbers, or to download harmful files that can infect their devices with
viruses.
Type Description
Spear Spear phishing is a targeted type of phishing attack where the
Phishing attacker researches their victim and sends personalized messages
that seem relevant to them. These messages look real, making it
difficult to identify the attack because they are carefully designed to
deceive the specific target.
4. Spoofing
Spoofing is when a hacker pretends to be someone you trust, like a friend or a
company. They do this to trick you into giving them access to your devices or
information, with the goal of stealing data, demanding money, or installing
harmful software.
Type Description
Domain Domain spoofing is a type of phishing where a hacker pretends to
spoofing be a trusted business or person by creating a fake website or email.
The domain looks real at first, but if you look closely, you'll notice
small differences that show it's fake.
Email spoofing is when hackers send fake emails that look like they
Email come from someone you trust. People are more likely to open
Spoofing these emails and click on harmful links or attachments.
6.Identity-based attacks
Identity-based attacks are hard to spot because a hacker uses a real user's stolen
login details to pretend to be them. It's tough to tell the difference between the
real user and the hacker using normal security tools.
Type Description
Man-in-the- A Man-in-the-Middle (MITM) attack happens when a hacker secretly
Middle intercepts and possibly changes the communication between two people
(MITM) or systems. The attacker’s goal is to steal sensitive information, change
Attack data, or add harmful content.
Brute Force Brute force is an attack where hackers try many different combinations of
Attacks usernames and passwords until they find the right one. It's a trial-and-
error method to break into accounts or systems.
Type Description
Data Data poisoning is when hackers mess with the data used to train
Poisoning an AI or machine learning model. By changing the data, they can
make the model give wrong results, create weaknesses, or cause
biases in how it predicts things.
8.AI-powered attacks
AI-powered attacks use artificial intelligence (AI) and machine learning (ML) to
help hackers steal information or break into networks. Here are some types:
Adversarial AI/ML: This tricks AI systems by giving them wrong
information, making them malfunction.
Dark AI: This uses AI to find weaknesses in systems, often going unnoticed
until it causes harm.
Deepfake: These are fake images, videos, or audio made by AI that look real
and can be used to damage reputations or mislead people.