Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
94 views
16 pages
Iss Notes
Uploaded by
Rushikesh Dhete
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save iss notes (1) (2) For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
0 ratings
0% found this document useful (0 votes)
94 views
16 pages
Iss Notes
Uploaded by
Rushikesh Dhete
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save iss notes (1) (2) For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save iss notes (1) (2) For Later
You are on page 1
/ 16
Search
Fullscreen
= ee. 2B loslanze cael L Any dence thal 4 oe Any « is _ol\t h shore, Pre and dissemioate he snfenalion 97> reaton o> dats \s called inbrmabion syste —sehscalns [dln shoe) sande Infos mghin Seah Ls ems, r wa he a a beading) i2hiog-besloed ut rie device) EIGER Eira rite St cree) Whot i Susie, $e li a) ak Atel ae Unit 227 Vulnerability Analyse Active and Passive Footpinboy Peatrcol Aoalyss Yort Scanners Unit_A File ros (NTFS Dd ‘ding 0) Secur ___| rf git S$ - Seuse operating Systems? : RGAE), Reference Manitor $Etinux (Sea iy, tobed owe) | _Truskeh Qs. ___-__ nit Bt Malicious wes (Malware), Taotan Horse, Computer Vicu APT Ronsommuase . keylogger, Legic bombs RAT (Remate Recess Trojans) ,Woxm deletion. __ File Systeco _Pinaliysis _ Rewess Combes) Mechant sens (DAC. MAC. — —~“Eamiin+ [Gomponmh of Tebornalin fyi | J Hosdwsare = CPU, Mocihe, (Solid Stede Hybid Qevces) : ‘ Fe GA S5D(For OS) | HD =e * Sher fo “user de «dale (on k Hop) Frcter. Sinnge Divas. HOD, se5 son fe {Protec Hon of inbamation (dats from sunauthorigeh access, use - frm unauthorized access , disclosure, distuphon, enoditieation, deshnuikion I Selaematon Sysher Neem Seeusity i t= Reakechay the cafornalin Gyshe Sen) aad ‘abewaten [dae Be unauthasized aceess, dis closuve, disne ~snodi ‘Feakion, destruchoa * fee. by 4_Suney,-60-bilan fice e_tooactd fp inlet: sos Come 5 tohynal threat. $600 billing ore lost due to ates spore whith 9 apgme 1, ght 60F—Hes chy ated as$ i= a "Ty pal dake breather xovutting in _loss_sh coil os inks ook! 7 ee i “i se foc Bian atid Seg Bae. -oveid oeccusk Wijodktag. ee 7oe | + - a - = —— roe 2 Te eyed -cecoumnt=htmeing * Mealtth Trsurence Tortatality sod Accountability Ret Gezzma (axe) Is Ss nauk) “oI, Ahak sequines healtheare snpsicalina. ius privacy Security Contvals ienglemrented fo. conbs|_gatent priwaiy. ¥ Gramm” Leah Gil act (Gus ee SITs ts enacded fo 199 tah oysces all pe A financed tnshbsto to_prokert personal financel teformatise dh the customness__ - + - Bll the _guesoment _sscbsites By Gadian Geet o¥ Sas bhations andes sf gosemment Should comply to 1GrG.2 Las ([eucdeline for ‘Tdion_Goveenment | “taxbsites] They. should also fulfil [WU Lborl totke toch Compliance’ | + — _|cess = 3H [radian Computer Emergency Response Team). [uoche Loeb Content Recessiity, Guilelin | zl Ths act wos parsed by Us 2090 and _updabrh io Jou public “scheab and [Sbroxtea fo wre inkunel par sokeby aternet should be vestracked ___ 7 [Ass requice. policies, te all emigoss\ acces. ty i - ss [Fayest Goud Tokwiry Dale Seeusity SHandand CPCED$9) += : “Tes, glabal elandond fa _prection consumer's private data sith i pmper_Secunity contiol. Aill_payment gateromys “should be Pet Oss —___. —jeomaliant a _(oR. we at) ra) _ Tytrrmadio Jecuaty (Gye frinsipln oh CTA A Conbidentiality » Integrity. fivailabi lihy ; \ i vino th on vey ote om et | acces - | a dtsdasne fo unauthorized users Protecting tofermation a4 Totepity Only mes amc tbion Prlchng dato ee Eg frst Tebmatisa ‘s “calle le fe audbsised nes nea Fey —apel on a — Fassuoed shred ie C:Wyeas | Systems? aes [sre SAM Setaity Peas 1 ee fy} skin Ceptag vosiale sized Up te Baek Sto ae Jp by vd nm J ——frnttiso calteh hashing, SHAL, MOL, MDS, Blouksh, LM, NTLM +e of the popular hashing algorithm . —-—# [flvalancke fleck t= shen one bil ts chantd Ayer 0° voy tase file, [the eotine output changa. ‘This ts called duabancee feck. To Haue, Password Sila one: gheeb in (etc/shadow % Fike _txindoues Syste uae, _NoLe -abspatnen bas hoya, ne posywerd. and Lous “en vou SHAS 12 te ¥ Saleh Masog ae | Reson > Hay edna Hoshi) Passioond ——> Hoan "| Salted Hashons, a Ls Condom ne ove append a mink qunke along uith the prasooed sa it anak the - ___[hayh_difereat everstime. $e, it becoma more dificult to bod ond ______ retrieve the nanan — oe I Enuinegsing | - Trick tee “user ‘nts _veveab sag wank _ information. Tor_exomole . Scacn calls aces das ben tra 185 cord umber, CW. ch a _ _ {Foe cetorsk _cestisiag Hed toy 7 Tes Pr —harder _ [by ead and monthy the toformabten Enceaghon ae - 2) Mul fort Pudhectization (MEAD + 7 MEA ts on eleteenic authantieal - raed _uaheee user is granted access foo. _toeherte ox _applicodion sly after Successhully veahyas,— foo on crwre pices of evidence. These pice ab eideones are knowa oa a - = ———& Stock fhecans Gooteol erecheninms + Shick Reese cashel Fe | ove ued and data classtheation an be ued fo protec i Hany “Diloeat types of ters (Rains User, 640) hase differ iis same t system. Almiaisbvator (Adio is highest level of hae 7 tien Shondod Ge and gut we 2 Daiiey oF personas = This is. erent Shep oy Prskshay fen {Socal migioeenog attacks They, shoul be made atone ovthesc altars ave spread or eveauted bout fa. ‘via * Sng cmguln_ganqan wich veplata tell by aothca 4 compute progiam.clhich replicate thet wi iag hosts le ashen tt ts_teerabig -can_eality, Se —Pregrans by tnserting th oun code, = = 3 Bacdons* Thar me sel fo baptisms> rn to protect inkegity s- E a > Coughgaghie Masking.» W DOS (Thtrusion. Detechinn System), 6 Using Kile _permtsston., 4? GSlrch Pedra Access Contsol mmechor'sea | | fe 4] Bo yction Matias - oe — ‘ Frage 2 Mwoatthons : T ee eens Syeotins be z examples a _enuayghon Blgritioa= Asp, Des, AEs. BSA contains both public and _pmvate he DEES and BES jhe_cn\y ane oe - 2) Menssags 2 b_ va of ‘ap om taved) :- _ os im _Skoch _occars “gale we can vite os fn ani with their permissions by using the fine m= Cx écute Aner number foe cach Camiin| disk. Some Space of binox 8" Obuabs Deb —Systern, pemitionanh fee ied: xP SPL File System). Bie Syshero Ts needed have veal + reute forte polled), |cheod S74 “abetnt | Tis means» thal fe Boe oe by Group? ue ust have gy Sots fe Mai aay xeoh “per ssiony Sze. wo_disk is _weserwvel Bae noeve space), to velneve the fi a ystero \e ‘foals = disk - Fedora, Cent 0S, Kali Linus, eh- —Bgele Uses APES (Apple fle syster) —t How deletion twovke tn {ele for daeiog he ete + shes fie paiveh MET, file Ten uae “delete the Rina, i le delete te —Now fontaiciag roverwrbe or tha) focahoo Covey os St + | Fea tyon of af 087 and Ke syphes_ coed ured = “tio T ek: Ose, NITES 2.) + a 6 ses Exta fle Systern ceeds MET entry , which ads Phyl tna elt _emove the content. that Men. This means fa) na can _Shece Mer Hh, del AS Ae primary bey in cohol tle needs tobe deletsd - medio, que ” acd metadata information Blename , Sclesize aveildble Fox xThreats to fvasabiiby eee | Y Device / software failure * Suppose we axe fusing _symai on - slane sever. TH 1 Sais, then grail is ok occerstble to 4h YEO Occumence of an ahna)_Svostes x es cece cGimale condifion_moy coure Service. fotlure. abide alfests —gualo bs hy > Notsal Otsarte BEB BO DON (Oem al miele Gene) mean th eee eee eee eee eee rere ore teers ce ee foe eat_of vey a treed fall wate lof filure. This ofterds Hhe_oveilabilidy, wy Measures to _prolect availa hy t= Z Y Sebtion sewers in different deoyraphical toakoos + This means: thal 1 $ to zlwe should have sedundanl corse _in_geomaghteally segarated : ocabions, “This will hele so care ok nahinal disasters, Since it one [seve fails, we hove backup Sewers (Bala Redundanuy) | Barking uy the dale i We should keep backup at the date jut —___a|o ose. Th the Syshem Asoftwore fails. tor usill have the batkup —|dote. so even “f data is lash, we Con eenver it | a e © | Setting up. eben Brewalii= TC onl (are sng bene Some TP olden, the fixes blocks dhe requests, preventing DoS attacks - Fires ac, as TDS ant TPS Jontusien Detabos {System ond “Tntwusion _Preenhan Systemi— —— — - = AON ol Tofyr mation Secunity + Authositabion, Flccountieg - ann > Pathenticabon, De thenti¢akise = Ths 6 Mechanism 4 uhether gi tes ant _ishe they aie to bee isi. Mast wore roelhods : southentealor axe _Wepare and parsword 5 4s feet, . [hoe cor have _@- fucks -aulhenticalion (2 FA) ov enalticfo tent, S Che8) te grhonce the Seustity. Example of PFA is credetg. | (wseroane, password) + 01P. Enampe cf FA ts credentials « -, Brmetvics (Fore [ogupriot). a D futhesizahon t- Tt is the grocers of givieg the USC. poem! js ote 0605 ny, desousce Once the wse_is_outhenticated ae reed te uthorize him. The level of access is based oo 4... = A ue (Admin, Standard User, Guest eke) = |b vtay Permission = SDeesm't have pesmissrn > Becounbiog = This i £ omen . +Hcountiing s This is the process of measurion. resources thal uses ——-Gonsume _dunag _otcess 49 0. nthoark 0% application 5 Logaiog Susser statistics ond user infurmetion like Session dunahon , dale seot and Decewved This is impoctact while Settiog —priciag plans 39 clout -Compation, (you.-as ~You-go) Syste. theoe a Puthentication ee entical ae ———fhutharzaien _ | a 3 Detenmiaw —eshether MAGS oie who §Delnecings chat temic} in ve fa ey Claim te be otces ~ : thes $$ 2tes = — a nee ve thee access is the coedcatals Courster carreun - Se name, parsword , ef) _ Generali Klis one S> Genrali4 Blau omute (ogee kt Tey % [Multfochs Ruthes tention = Ales called Mea : = Taser tae ta Tee fades fe MER. nerker Jou < — grrr § iY Knott Gometiing Het has) 2Uieeace Cote Seats oy sigh TS __ 1 Possession (scenatiag ge have) Poth, seat via teat email, Bcvss Solan 953 3) Tahara. Multifactor — Pathintication ig oe comnpanust of i otk, aod 7 {2.0635 management Frameworkalos wes h —frworlyautthestiale tsith multiple ebetta er opel . ma Ssoltnglesarer a - a Code $50. ingle ga oo) ae cautaeaton enttiad thal — jone_set_sof credentials. for examale eae one - ee : >, fry FTE use dowd hase access ann fog More sete than IFA and 260. - Reduce —Seaavihy rendre by 99%! on paul , alone Cons i= rel_gek OP ne = tts intecet and OTP is. Hindle slosh cx am jin —Sent on _errail, we ‘hos ace. Abe we cannsl AtcersFacies im need (2 ina Sa naan | Factors we need (© fra So T5801 (Tahmabse. Seany Risk Manaeenent) 4 st in “Diss axe something Arak oe need fs pated ak acosls mm tinanthe std users and hackes. Example of assels aT jorgarizabon ore _fCx, database, Servers. Susttcher, nehoork firewall , ‘TP camera eh: Taesks = Thacat is malidows aul 0 pman “that can sheaf, damoge __iex i seb. —— 2 Peewee 8 te “tafasbuchios ,-nechosrh 08 __ 4) Security Cootrals + ‘there ave the mechanisms io glace to protect the __ assets - “There ane __3_bypas_ of secusihy conbrels 7 Physical Cenbols D> Techorced Coo! DW Mrnisdrattve Conbals. a Physical control) — TDs, locks. —alanoy systems , security Cards. __# Technical Coateals - uthentication Ke Dccess Contra Lish [Acks) TDS Crtrusion | Detection Syctem) © Administrative Contrals - Policien, Procedures Seusbye Gyoareners toa yt _emeloyes_di sie manag - ‘ov destruction 86 arsels aan o> Risks = Risk. peek a loss, damage Lov dato SO - | — ~ Secasshy tonteal| Camiin_= 5) as Samunssh © — 5 the pocess | Rsk cena! hove sie about _asseh. ¥ iS Achar Are 2138 Slxansfer) ou the or : é combioing tee iafermahre ainesbitikes, Ahreaks and Secasdhy Cont | Se re Rist _ Treatment _ jewln KAT method (Pyerdance, Cota! Becestia, this _of_sub. ‘Gamal yi | Tran ee] is Shining bur den coh fan. of lois eoith another pasty. 1) Degeeding en skill ec there ove vt thse pea ob haehes ® Blauehol —® Greghat | prondu Certibirabions ja Yyoovihelans i Blue hal SyAedhat —plokiat aden Ethical asters tn tothe _inhasteuchaee. Stays ition. tine Leni, zak Hass - EC Coane) Secunty domain Cnet, Threat hunbag, 0 gist Fetese seb.) Whitehat hacktss ore CEH (Ceclified Ethical Hackers) Motizelts Te dp business in Radios Sccuriby loopheles in JET argasitataet2 Blackhot hackers - They ore oso known 09 SGrockers”. ‘These ose maticios hhockes who break tity computer Systems and_nekworts jusithoul authorization 0% permission, «fPabivel + Financtol tse ees a » ; we Greghst odes © Thos Icoenpany, sho _aktwenpt_ Soa hth oem oe ss, tow * doing, se _ __[Motive [> Personal _tn}ayment : oy Bluchat aches = These ore like “Senigt_kiddicn™. Thay do" a : ‘ast — “olfsKakion - | pep a ‘ o— foals available oo toternet “The team. _[Motival == Revenge - ; 3) Redlat hes ae hackers’ = [rke cbite bot DY Red! hackers — axe_koown a “ea A hack in Thacker, redhat hackers alse —aien- a aia beef hackers “tame andes debrrte teacs : [Hotuel | Some : esfas) ashes also known 03 — gnaticivus Atha. 16 05 person o Threat oct, «| pagpsinaton tha intentionally -inhaem ho phys Tea ; bype of threat actors 2° —__— _ FF Sevigh fies _3¥ Organized Gxhererienioals oy Hauke “Ay Rdvanced fasitnt Thses (APT) Y Sevigt kiddies = Bat Hb dy or tools /exoloiks uoritten lo 7 friends and gain coed in bathing Community - - > | Hach seas © Dee tas dy -coutse Tike social change, —sLgelibed_oygadn, trwsisn , ete. (Pativel- Socal, aebgnus pattical couse = DY Orysized Caboininals = C —8_evine_group tsho_onre ea boul ~ ange enteepricer [Motive L- financial gaia - ype eee = Ty we Ky eed od Thera (APT) vehi ——| Groups Fluther ~sthe fended lay nation ox State . 7 eu argel —haperalust ongactalions (By gre hon pyre tines). They use Slename -Masquoadion + Kien | 93 soy coesdaenphay Srronenat | Prani f bb $k tet - T a kdl — a “Gn sealy <
You might also like
Unit 5 Social Network Security
PDF
No ratings yet
Unit 5 Social Network Security
27 pages
SC-900 Resume
PDF
No ratings yet
SC-900 Resume
27 pages
Os Unit - 5
PDF
No ratings yet
Os Unit - 5
12 pages
7115 Cns Manual
PDF
No ratings yet
7115 Cns Manual
81 pages
Invert PDF Colors
PDF
No ratings yet
Invert PDF Colors
13 pages
Cyber Security Essentials Notes
PDF
No ratings yet
Cyber Security Essentials Notes
20 pages
Cyber Security Assignment 1 N 2
PDF
No ratings yet
Cyber Security Assignment 1 N 2
10 pages
ISS Unit 1
PDF
No ratings yet
ISS Unit 1
20 pages
CSDF Unit 2
PDF
No ratings yet
CSDF Unit 2
34 pages
Network Security Classnotes
PDF
No ratings yet
Network Security Classnotes
17 pages
Ethical Hacking Notes PART-A
PDF
No ratings yet
Ethical Hacking Notes PART-A
41 pages
Security Practices Assignment
PDF
No ratings yet
Security Practices Assignment
14 pages
Cyber Safety
PDF
No ratings yet
Cyber Safety
16 pages
CF Assignment 1
PDF
No ratings yet
CF Assignment 1
16 pages
M-Cyber Security Notes
PDF
No ratings yet
M-Cyber Security Notes
24 pages
Module - 1 Notes
PDF
No ratings yet
Module - 1 Notes
23 pages
Cyber Security Assignment No. 1
PDF
No ratings yet
Cyber Security Assignment No. 1
12 pages
Css Notes 2023
PDF
No ratings yet
Css Notes 2023
34 pages
Network Security
PDF
No ratings yet
Network Security
9 pages
CC Unit-5
PDF
No ratings yet
CC Unit-5
19 pages
Cs LAQ
PDF
No ratings yet
Cs LAQ
23 pages
Harsh CL Notes
PDF
No ratings yet
Harsh CL Notes
39 pages
Adobe Scan 16-Dec-2024
PDF
No ratings yet
Adobe Scan 16-Dec-2024
13 pages
Some Viruses
PDF
No ratings yet
Some Viruses
7 pages
Shivansh Vats
PDF
No ratings yet
Shivansh Vats
26 pages
Cyber Security Notes
PDF
No ratings yet
Cyber Security Notes
8 pages
Cyber Security 3 RD Sem
PDF
No ratings yet
Cyber Security 3 RD Sem
14 pages
Linux
PDF
No ratings yet
Linux
23 pages
CNS Unit-1
PDF
No ratings yet
CNS Unit-1
44 pages
INS Assignment 3
PDF
No ratings yet
INS Assignment 3
14 pages
Computer Applications
PDF
No ratings yet
Computer Applications
16 pages
CSS Assignment 1
PDF
No ratings yet
CSS Assignment 1
13 pages
NSC Assignment
PDF
No ratings yet
NSC Assignment
12 pages
IT Act
PDF
No ratings yet
IT Act
46 pages
Cyber Security Notes
PDF
No ratings yet
Cyber Security Notes
20 pages
CF Assignment-3
PDF
No ratings yet
CF Assignment-3
6 pages
Ns Unit 1
PDF
No ratings yet
Ns Unit 1
11 pages
Metric en 1 PDF
PDF
No ratings yet
Metric en 1 PDF
22 pages
Cyber Safety File
PDF
No ratings yet
Cyber Safety File
16 pages
Ethical Hacking
PDF
No ratings yet
Ethical Hacking
70 pages
M S T
PDF
No ratings yet
M S T
8 pages
SecurityClassNotes 5241 4761210968
PDF
No ratings yet
SecurityClassNotes 5241 4761210968
30 pages
Cyber Security U3
PDF
No ratings yet
Cyber Security U3
18 pages
INS Assignment 1
PDF
No ratings yet
INS Assignment 1
14 pages
PGD P Ii
PDF
No ratings yet
PGD P Ii
102 pages
12 Notes
PDF
No ratings yet
12 Notes
10 pages
E Biz Assign
PDF
No ratings yet
E Biz Assign
16 pages
Cyber Crime Notes
PDF
No ratings yet
Cyber Crime Notes
7 pages
NS Assignment
PDF
No ratings yet
NS Assignment
11 pages
Cos 304 by Kenzman
PDF
No ratings yet
Cos 304 by Kenzman
12 pages
Cyber Security Note
PDF
No ratings yet
Cyber Security Note
20 pages
NS Assignment 1
PDF
No ratings yet
NS Assignment 1
7 pages
CND 4
PDF
No ratings yet
CND 4
8 pages
CCSP Quizlete Vocab
PDF
No ratings yet
CCSP Quizlete Vocab
7 pages
Lab Report
PDF
No ratings yet
Lab Report
5 pages
IGNOU-MSEI 025 Page 21-30
PDF
No ratings yet
IGNOU-MSEI 025 Page 21-30
10 pages
Nis Practical
PDF
No ratings yet
Nis Practical
38 pages
IGNOU-MSEI 025 Page 1-10
PDF
No ratings yet
IGNOU-MSEI 025 Page 1-10
10 pages