CSF Reading Material With Ans
CSF Reading Material With Ans
Symmetric key encryption uses the same key for both encryption and decryption. It's efficient
but requires secure key exchange. Examples include AES (Advanced Encryption Standard) and
DES (Data Encryption Standard).
Asymmetric key encryption involves a pair of keys: a public key and a private key. The public
key is widely distributed and used for encryption, while the private key is kept secret and used
for decryption. Examples include RSA and Elliptic Curve Cryptography (ECC).
**Hash Function:**
A hash function is a mathematical function that takes an input (or "message") and returns a
fixed-size string of bytes. The output, known as a hash value or hash code, is typically a
hexadecimal number. Hash functions are used in various cryptographic applications, such as
digital signatures, password hashing, and data integrity verification.
A Message Authentication Code (MAC) is a cryptographic technique used to verify the integrity
and authenticity of a message. It is generated using a secret key and appended to the
message. The recipient can verify the MAC using the same key, ensuring that the message has
not been tampered with during transmission.
Block ciphers encrypt plaintext in fixed-size blocks, typically 64 or 128 bits, using a key.
Examples include AES and DES.
Stream ciphers encrypt plaintext bit by bit or byte by byte, typically by combining the plaintext
with a pseudorandom stream of bits generated by the key. Examples include RC4 and
ChaCha20.
**Information Security:**
Information security involves protecting information and systems from unauthorized access,
disclosure, disruption, modification, or destruction. It encompasses various measures, including
cybersecurity, data protection, access control, and risk management, to safeguard sensitive
information and ensure the continuity of operations.
**Malicious Spyware:**
Malicious spyware refers to software designed to gather sensitive information from a user's
computer without their consent. This may include keystroke logging, capturing screenshots,
stealing passwords, or tracking browsing habits. It compromises user privacy and can lead to
identity theft or financial loss.
**Adware:**
Adware is software that automatically displays or downloads advertisements, often in the form
of pop-up ads, banners, or redirects. While not inherently malicious, adware can be intrusive
and disruptive to the user experience. In some cases, it may also collect user data for targeted
advertising purposes.
**Phishing:**
Phishing is a cyber-attack where attackers attempt to deceive users into providing sensitive
information, such as usernames, passwords, or financial details, by masquerading as a
trustworthy entity in electronic communication. This is often done via email, instant messaging,
or fake websites designed to mimic legitimate ones.
**Botnet:**
**Trojan Horse:**
A Trojan horse is a type of malware disguised as legitimate software or files to trick users into
downloading and executing them. Once installed, Trojan horses can perform various malicious
actions, such as stealing sensitive information, corrupting files, or granting remote access to the
attacker.
Failure to patch an operating system can leave it vulnerable to exploitation by cyber attackers.
Unpatched systems may be susceptible to various security vulnerabilities, which can be
exploited to gain unauthorized access, steal sensitive data, or disrupt operations. Additionally,
malware targeting known vulnerabilities can easily infect unpatched systems, leading to
potential compromise and compromise of the entire network.
Patched operating systems are crucial for maintaining the security and integrity of computer
systems and networks. Regularly applying patches and updates helps to address known
security vulnerabilities, fix bugs, and improve system stability. By keeping the operating system
up-to-date, organizations can mitigate the risk of cyber attacks, protect sensitive data, and
ensure the smooth functioning of their IT infrastructure.
MCQ
**Security Threat That Masquerades as Legitimate Program but Performs Malicious Actions:**
d) Trojan horse
3. Access control lists (ACLs) and permissions are examples of methods used to protect
objects in an operating system.
- True
4. Trojan horses are harmless software applications that do not pose any security threats.
- False
5. Malware refers exclusively to software designed to enhance the security of a computer
system.
- False
7. Trojan horse is a type of malware that disguises itself as legitimate software but
performs malicious actions when executed.
- True
**Blank Fill:**
- In block cipher encryption, various modes are used to determine how plaintext is transformed
into ciphertext.
- Public Key Infrastructure (PKI) is a cryptographic system that uses a pair of keys: a public
key and a private key.
- Secure Sockets Layer/Transport Layer Security (SSL/TLS) is a framework that provides for
the secure transmission of data over potentially insecure networks.
- RSA is an asymmetric cryptographic algorithm used for secure data transmission.
- Certificate Authority (CA) is a method for securely storing and managing digital certificates.
- Digital signatures and Message Authentication Codes (MACs) are cryptographic
techniques used to ensure the integrity and authenticity of data.
- **Denial-of-Service (DoS) Attack:** This attack floods a network or server with excessive
traffic, rendering it inaccessible to legitimate users. An example is a SYN flood attack.
- **Man-in-the-Middle (MitM) Attack:** In this attack, an attacker intercepts and possibly alters
communication between two parties without their knowledge. For instance, intercepting
unencrypted Wi-Fi communications.
- **Phishing Attack:** Phishing attacks use deceptive emails, messages, or websites to trick
users into revealing sensitive information, such as login credentials or financial details. An
example is a fake banking website designed to steal login credentials.
Antivirus software helps detect, prevent, and remove malicious software (malware) from
computer systems. It achieves this by scanning files and programs for known patterns of
malicious code, blocking suspicious activities, and quarantining or deleting infected files.
Additionally, modern antivirus solutions may incorporate features such as behavior analysis and
real-time protection to defend against emerging threats.
Encryption transforms plaintext into ciphertext using cryptographic algorithms and keys,
A Trojan horse operates by disguising itself as legitimate software or files to deceive users into
executing them. Once executed, the Trojan horse may perform various malicious actions, such
as stealing sensitive information, installing backdoors, or facilitating remote access for attackers.
To deceive users, Trojan horses often use enticing filenames, icons, or descriptions to appear
harmless or desirable.
- **Trojan Horse:** Malware disguised as legitimate software to deceive users into executing it,
enabling attackers to gain unauthorized access or perform malicious actions.
- **Phishing:** Cyber-attack where attackers attempt to deceive users into providing sensitive
information by posing as a trustworthy entity in electronic communication.
- **Stack and Buffer Overflow:** Programming errors that occur when a program attempts to
store more data in a memory buffer than it can hold, potentially leading to crashes or
exploitation by attackers.
Phishing is a type of cyber-attack that relies on social engineering techniques to deceive users
into revealing sensitive information or performing actions that compromise security. Unlike other
cyber-attacks that may exploit technical vulnerabilities, phishing targets human psychology and
trust relationships. Examples of phishing techniques include email spoofing, deceptive websites,
and pretexting.
Encryption transforms data into an unintelligible format using cryptographic algorithms and keys,
allowing it to be securely transmitted or stored and later decrypted to its original form. Hashing,
on the other hand, converts data into a fixed-size string of bytes using a one-way mathematical
function, producing a unique hash value that represents the input data. Unlike encryption,
hashing is irreversible and primarily used for data integrity verification, password hashing, and
digital signatures.
Operating systems provide a platform for running applications and managing hardware
resources, facilitating communication between users, software, and hardware components.
They also enforce security policies, manage access control, and provide essential services such
as file management, networking, and process scheduling.
Regular updates and patches are essential for addressing security vulnerabilities, fixing bugs,
and improving the performance and stability of operating systems. By applying patches
promptly, organizations can reduce the risk of exploitation by cyber attackers and ensure the
security and integrity of their IT infrastructure.
The CIA triad is a foundational concept in information security that represents three primary
goals:
- **Confidentiality:** Ensuring that data is only accessible to authorized users and remains
private from unauthorized access.
- **Integrity:** Guaranteeing the accuracy and reliability of data by preventing unauthorized
modification, deletion, or corruption.
- **Availability:** Ensuring that data and resources are accessible and usable when needed by
authorized users, without disruption or denial of service.
These goals help organizations prioritize security measures and design comprehensive security
strategies to protect their information assets.
The Caesar cipher is a substitution cipher where each letter in the plaintext is shifted a certain
number of positions down or up the alphabet. For example, with a shift of 3, "A" becomes "D,"
"B" becomes "E," and so on. The recipient decrypts the ciphertext by shifting the letters back by
the same number of positions. While simple, the Caesar cipher is easily broken using frequency
analysis.
Attackers create botnets by infecting a large number of computers with malicious software,
turning them into "bots" or "zombies" under the attacker's control. These compromised
computers can then be remotely commanded to perform various malicious activities, such as
launching DDoS attacks, distributing spam or malware, stealing sensitive information, or mining
cryptocurrencies. Botnets provide attackers with a powerful infrastructure to carry out
large-scale attacks and profit from illicit activities while masking their identity and location.