Fundamentals of Security
Fundamentals of Security
CIA Triad
Confidentiality: Ensures information is accessible only to
authorized personnel (e.g., encryption)
Integrity: Ensures data remains accurate and unaltered (e.g.,
checksums)
Availability: Ensures information and resources are accessible
when needed (e.g., redundancy measures)
Non-Repudiation
Guarantees that an action or event cannot be denied by the
involved parties (e.g., digital signatures)
CIANA Pentagon
An extension of the CIA triad with the addition of non-repudiation
and authentication
Confidentiality
Confidentiality: Refers to the protection of information from
unauthorized access and disclosure, ensuring that private or
sensitive information is not available or disclosed to unauthorized
individuals, entities, or processes.
o Confidentiality is important for three main reasons: to protect
personal privacy, to maintain a business advantage, and to
achieve regulatory compliance.
o To ensure confidentiality, we use five basic methods:
Encryption: Process of converting data into a code to
prevent unauthorized access.
Access Controls: By setting up strong user
permissions, you ensure that only authorized personnel
can access certain types of data.
Data Masking: Method that involves obscuring specific
data within a database to make it inaccessible for
unauthorized users while retaining the real data's
authenticity and use for authorized users.
Physical Security Measures: Ensure confidentiality
for both physical types of data, such as paper records
stored in a filing cabinet, and for digital information
contained on servers and workstations.
Training and Awareness: Conduct regular training on
the security awareness best practices that employees
can use to protect their organization’s sensitive data.
Integrity
Integrity: Helps ensure that information and data remain accurate
and unchanged from its original state unless intentionally modified
by an authorized individual
o Verifies the accuracy and trustworthiness of data over the
entire lifecycle
o Integrity is important for three main reasons:
To ensure data accuracy
To maintain trust
To ensure system operability
o To help us maintain the integrity of our data, systems, and
networks, we usually utilize five methods:
Hashing: Process of converting data into a fixed-size
value
Digital Signatures: Ensure both integrity and
authenticity
Checksums: Method to verify the integrity of data
during transmission
Access Controls: Ensure that only authorized
individuals can modify data and this reduces the risk of
unintentional or malicious alterations
Regular Audits: Involve systematically reviewing logs
and operations to ensure that only authorized changes
have been made, and any discrepancies are
immediately addressed
Availability
Availability: Ensure that information, systems, and resources are
accessible and operational when needed by authorized users. As
cybersecurity professionals, we value availability since it can help us
with ensuring business continuity, maintaining customer trust, and
upholding an organization's reputation. To overcome the challenges
associated with maintaining availability, the best strategy is to use
redundancy in your systems and network designs.
Redundancy: Duplication of critical components or functions of a
system with the intention of enhancing its reliability.
There are various types of redundancy you need to consider when
designing your systems and networks:
o Server Redundancy: Involves using multiple servers in a
load balanced or failover configuration so that if one is
overloaded or fails, the other servers can take over the load to
continue supporting your end users.
o Data Redundancy: Involves storing data in multiple places.
o Network Redundancy: Ensures that if one network path
fails, the data can travel through another route.
o Power Redundancy: Involves using backup power sources,
like generators and UPS systems.
Non-repudiation
Non-repudiation: Focused on providing undeniable proof in the
world of digital transactions. Security measure that ensures
individuals or entities involved in a communication or transaction
cannot deny their participation or the authenticity of their actions.
o Digital Signatures: Considered to be unique to each user
who is operating within the digital domain. Created by first
hashing a particular message or communication that you want
to digitally sign, and then it encrypts that hash digest with the
user’s private key using asymmetric encryption.
Non-repudiation is important for three main reasons: to confirm the
authenticity of digital transactions, to ensure the integrity of critical
communications, and to provide accountability in digital processes.
Authentication
Authentication: Security measure that ensures individuals or
entities are who they claim to be during a communication or
transaction.
o 5 commonly used authentication methods:
Something you know (Knowledge Factor): Relies on
information that a user can recall.
Something you have (Possession Factor): Relies on
the user presenting a physical item to authenticate
themselves.
Something you are (Inherence Factor): Relies on
the user providing a unique physical or behavioral
characteristic of the person to validate that they are
who they claim to be.
Something you do (Action Factor): Relies on the
user conducting a unique action to prove who they are.
Somewhere you are (Location Factor): Relies on the
user being in a certain geographic location before
access is granted.
o Multi-Factor Authentication System (MFA): Security
process that requires users to provide multiple methods of
identification to verify their identity.
Authentication is critical to understand because of the following: to
prevent unauthorized access, to protect user data and privacy, and
to ensure that resources are accessed by valid users only.
Authorization
Authorization: Pertains to the permissions and privileges granted
to users or entities after they have been authenticated.
Authorization mechanisms are important to help us with protecting
sensitive data, maintain system integrity in our organizations, and
create a more streamlined user experience.
Accounting
Accounting: Security measure that ensures all user activities
during a communication or transaction are properly tracked and
recorded. Your organization should use a robust accounting system
so that you can create an audit trail, maintain regulatory
compliance, conduct forensic analysis, perform resource
optimization, and achieve user accountability.
o To perform accounting, we usually use different technologies
like the following:
Syslog Servers: Used to aggregate logs from various
network devices and systems so that system
administrators can analyze them to detect patterns or
anomalies in the organization’s systems.
Network Analysis Tools: Used to capture and analyze
network traffic so that network administrators can gain
detailed insights into all the data moving within a
network.
Security Information and Event Management
(SIEM) Systems: Provides us with real-time analysis of
security alerts generated by various hardware and
software infrastructure in an organization.
Gap Analysis
Gap Analysis: Process of evaluating the differences between an
organization's current performance and its desired performance.
Conducting a gap analysis can be a valuable tool for organizations
looking to improve their operations, processes, performance, or
overall security posture. There are several steps involved in
conducting a gap analysis: Define the scope of the analysis, Gather
data on the current state of the organization, Analyze the data to
identify any areas where the organization's current performance
falls short of its desired performance, Develop a plan to bridge the
gap.
2 Basic Types of Gap Analysis:
i. Technical Gap Analysis: Involves evaluating an organization's
current technical infrastructure, identifying any areas where it
falls short of the technical capabilities required to fully utilize
their security solutions.
ii. Business Gap Analysis: Involves evaluating an organization's
current business processes, identifying any areas where they
fall short of the capabilities required to fully utilize cloud-
based solutions.
Plan of Action and Milestones (POA&M):
Zero Trust
Zero Trust: Demands verification for every device, user, and
transaction within the network, regardless of its origin. To create a
zero trust architecture, we need to use two different planes:
i. Control Plane: Refers to the overarching framework and set of
components responsible for defining, managing, and enforcing
the policies related to user and system access within an
organization. It typically encompasses several key elements:
Adaptive Identity (Relies on real-time validation that takes into
account the user's behavior, device, location, and more).
ii. Data Plane:
Threat Scope Reduction: Limits the users’ access to
only what they need for their work tasks because this
reduces the network’s potential attack surface. Focused
on minimizing the "blast radius" that could occur in the
event of a breach.
Policy-Driven Access Control: Entails developing,
managing, and enforcing user access policies based on
their roles and responsibilities.
Secured Zones: Isolated environments within a
network that are designed to house sensitive data.
Ensures the policies are properly executed.
Unskilled Attackers
Unskilled Attacker(Script Kiddie): Individual who lacks the
technical knowledge to develop their own hacking tools or exploits
o These low-skilled threat actors need to rely on scripts and
programs that have been developed by others
How do these unskilled attackers cause damage?
o One way is to launch a DDoS attack
An unskilled attacker can simply enter in the IP address of the
system they want to target, and then click a button to launch an
attacker against that target
Hacktivists
Hacktivists: Individuals or groups that use their technical skills to
promote a cause or drive social change instead of for personal gain
Hacktivism: Activities in which the use of hacking and other cyber
techniques is used to promote or advance a political or social cause
o To accomplish their objectives, hacktivists use a wide range of
techniques to achieve their goals, including:
Website Defacement: Form of electronic graffiti and is
usually treated as an act of vandalism
Distributed Denial of Service (DDoS) Attacks:
Attempting to overwhelm the victim's systems or
networks so that they cannot be accessed by the
organization's legitimate users
Doxing: Involves the public release of private
information about an individual or organization
Leaking of Sensitive Data: Releasing sensitive data
to the public at large over the internet
o Hacktivists are primarily motivated by their ideological beliefs
rather than trying to achieve financial gains
o One of the most well-known hacktivist groups is known as
“Anonymous”, a loosely affiliated collective that has been
involved in numerous high-profile attacks over the years for
targeting organizations that they perceive as acting
unethically or against the public interest at large
Organized Crime
Organized cybercrime groups are groups or syndicates that have
banded together to conduct criminal activities in the digital world
o Sophisticated and well-structured, they use resources and
technical skills for illicit gain
o In terms of their technical capabilities, organized crime groups
possess a very high level of technical capability and they often
employ advanced hacking techniques and tools such as:
Custom Malware, Ransomware, Sophisticated Phishing
Campaigns
o These criminal groups will engage in a variety of illicit
activities to generate revenue for their members, including:
Data Breaches, Identity Theft, Online Fraud,
Ransomware Attacks
o Unlike hacktivists or nation-state actors, organized cybercrime
groups are not typically driven by ideological or political
objectives
These groups may be hired by other entities, including
governments, to conduct cyber operations and attacks
on their behalf
o Money, not other motivations, is the objective of their attacks
even if the attack takes place in the political sphere
Nation-state Actor
Nation-state Actor: Groups or individuals that are sponsored by a
government to conduct cyber operations against other nations,
organizations, or individuals
o Sometimes, these threat actors attempt what is known as a
false flag attack
o False Flag Attack: Attack that is orchestrated in such a way
that it appears to originate from a different source or group
than the actual perpetrators, with the intent to mislead
investigators and attribute the attack to someone else
o Nation-state actors possess advanced technical skills and
extensive resources, and they are capable of conducting
complex, coordinated cyber operations that employ a variety
of techniques such as:
Creating custom malware, Using zero-day exploits,
Becoming an advanced persistent threats
Advanced Persistent Threat (APT)*: Term that used to be used
synonymously with a nation-state actor because of their long-term
persistence and stealth - A prolonged and targeted cyberattack in
which an intruder gains unauthorized access to a network and
remains undetected for an extended period while trying to steal
data or monitor network activities rather than cause immediate
damage - These advanced persistent threats are often sponsored by
a nation-state or its proxies, like organized cybercrime groups
What motivates a nation-state actor? Nation-state actors are
motivated to achieve their long-term strategic goals, and they are
not seeking financial gain
Insider Threats
Insider Threats: Cybersecurity threats that originate from within
the organization. Insider threats can take various forms such as
Data Theft, Sabotage, or Misuse of access privileges.
o Each insider threat is driven by different motivations. Some
are driven by financial gain and they want to profit from the
sale of sensitive organizational data to others.
o Some may be motivated by revenge and are aiming to harm
the organization due to some kind of perceived wrong levied
against the insider. Some may take action as a result of
carelessness or a lack of awareness of cybersecurity best
practices.
o Insider threat refers to the potential risk posed by individuals
within an organization who have access to sensitive
information and systems, and who may misuse this access for
malicious or unintended purposes.
o To mitigate the risk of an insider threat being successful,
organizations should implement the following: Zero-trust
architecture, employ robust access controls, conduct regular
audits, and provide effective employee security awareness
programs.
Shadow IT
Shadow IT: Use of information technology systems, devices,
software, applications, and services without explicit organizational
approval.
o Shadow IT exists because an organization's security posture is
set too high or is too complex for business operations to occur
without being negatively affected.
Bring Your Own Devices (BYOD) involves the use of personal
devices for work purposes.
Physical Security
Measures to protect tangible assets (buildings, equipment, people) from
harm or unauthorized access.
Security Controls
Measures to protect tangible assets (buildings, equipment, people) from
harm or unauthorized access.
Fencing and Bollards
Barriers made of posts and wire or boards to enclose or separate areas.
Surveillance Systems
An organized strategy to observe and report activities. Components: Video
surveillance.
Security Guards
Lighting
Sensors
Access Control Vestibules
o Double-door system electronically controlled to allow only one door
open at a time.
o Prevents piggybacking and tailgating.
Door Locks: Padlocks, Pin and tumbler locks, Numeric locks, Wireless locks,
Biometric locks, Cipher locks, Electronic access control systems
Access Badges
o Use of Radio Frequency Identification (RFID) or Near Field
Communication (NFC) for access.
Fence
Structure that encloses an area using interconnected panels or posts.
Bollards
Robust, short vertical posts, typically made of steel or concrete, designed
to manage or redirect vehicular traffic.
Surveillance Systems
Surveillance System: Organized strategy or setup designed to observe
and report activities in a given area. Surveillance is often comprised of
four main categories:
Visual Obstruction
Blocking the camera’s line of sight.
Piggybacking
Involves two people working together with one person who has legitimate
access intentionally allows another person who doesn't have proper
authorization to enter a secure area with them.
Tailgating
Occurs whenever an unauthorized person closely follows someone
through the access control vestibule who has legitimate access into the
secure space without their knowledge or consent. The key difference
between Piggybacking and Tailgating:
Door Locks
Door Locks: Critical physical security control measure designed to
restrict and regulate access to specific spaces or properties, preventing
unauthorized intrusions and safeguarding sensitive data and individuals.
Social Engineering
Manipulative strategy exploiting human psychology for unauthorized
access to systems, data, or physical spaces.
Motivational Triggers
Six main types of motivational triggers that social engineers use:
Authority: Most people are willing to comply and do what you tell them to
do if they believe it is coming from somebody who is in a position of
authority to make that request.
Urgency: Compelling sense of immediacy or time-sensitivity that drives
individuals to act swiftly or prioritize certain actions.
Social Proof: Psychological phenomenon where individuals look to the
behaviors and actions of others to determine their own decisions or
actions in similar situations.
Scarcity: Psychological pressure people feel when they believe a product,
opportunity, or resource is limited or in short supply.
Likability: Most people want to interact with people they like, and social
engineers realize this. Can be sexual attraction, pretending to be a friend,
or common interest.
Fear: These types of attacks generally are focused on "if you don't do
what I tell you, then this bad thing is going to happen to you".
Impersonation
Attack where an adversary assumes the identity of another person to gain
unauthorized access to resources or steal sensitive data.
Requires the attacker to collect information about the organization so that
they can more easily earn the trust of their targeted users.
Attackers provide details to help make the lies and the impersonation
more believable to a potential victim.
Consequences:
Unauthorized access, Disruption of services, Complete system takeover
Brand Impersonation:
More specific form of impersonation where an attacker pretends to
represent a legitimate company or brand.
Typosquatting:
Also known as URL hijacking or cybersquatting.
Form of cyber attack where an attacker will register a domain name that is
similar to a popular website but contains some kind of common
typographical errors.
To combat typosquatting, organizations will often do the following:
o Register common misspellings of their own domain names
o Use services that monitor for similar domain registrations
o Conduct user security awareness training to educate users about
the risks of typosquatting.
Pretexting
Gives some amount of information that seems true so that the victim will
give more information.
Mitigation involves training the employees not to fall for pretext and not to
fill in the gaps for people when they are calling.
Phishing Attacks
Phishing: Sending fraudulent emails that appear to be from
reputable sources with the aim of convincing individuals to reveal
personal information, such as passwords and credit card numbers.
Mitigation:
Training
Report suspicious messages to protect your organization from potential
phishing attacks
Analyze the threat
Inform all users about the threat
If the phishing email was opened, conduct a quick investigation and triage
the user’s system
An organization should revise its security measures for every successful
phishing attack.
Identity Fraud and Identity Theft: Involves the use of another person's
personal information without their authorization to commit a crime or to
deceive or defraud that other person or some other third party.
Difference between identity fraud and identity theft:
o In identity fraud, the attacker takes the victim’s credit card number
and charges items to the card.
o In identity theft, the attacker tries to fully assume the identity of
their victim.
Scams:
Fraudulent or deceptive act or operation.
Influence Campaigns
Influence Campaigns: Coordinated efforts to affect public perception or
behavior towards a particular cause, individual, or group.
o Are a powerful tool for shaping public opinion and behavior.
o Foster misinformation and disinformation.
Misinformation: False or inaccurate information shared without harmful
intent.
Disinformation: Involves the deliberate creation and sharing of false
information with the intent to deceive or mislead.
Remember, misinformation and disinformation can have serious
consequences because they can undermine public trust in institutions, fuel
social divisions, and even influence the outcomes of elections.
Malware
Malicious software designed to infiltrate computer systems and potentially
damage them without user consent.
Categories:
o Viruses
o Worms
o Trojans
o Ransomware
o Spyware
o Rootkits
o Spam
Viruses
Computer Virus: Made up of malicious code that's run on a machine
without the user's knowledge, infecting the computer whenever it's run.
Boot Sector: Stored in the first sector of a hard drive, loaded into
memory during boot.
Macro: Embedded inside another document to execute when opened by
the user.
Program: Infect executables or application files with malicious code.
Multipartite: Combination of a boot sector virus and a program virus.
Encrypted: Hides itself by encrypting its code.
Polymorphic: Changes its code to evade detection.
Metamorphic: Rewrites itself entirely before infecting a file.
Stealth: Prevents detection by antivirus software.
Armored: Has protection layers to confuse analysis.
Hoax: Attempts to scare users into undesirable actions.
Worms
Worm: Malicious software that can replicate itself without user
interaction, spreading throughout a network.
Trojans
Trojan: Disguised as harmless software, it performs malicious activities
when executed.
Protection Measures:
Regular backups
Software updates
Security awareness training
Multi-Factor Authentication (MFA)
Actions if Affected:
Rootkits
Rootkit: Designed to gain administrative-level control over a given
computer system without being detected.
The account with the highest level of permissions is called the
Administrator account.
o Allows the person to install programs, delete programs, open ports,
shut ports, and do whatever they want on that system.
A computer system has several different rings of permissions throughout
the system.
o Ring 3 (Outermost Ring): Where user level permissions are used.
o Ring 0 (Innermost or Highest Permission Levels): Operating in Ring
0 is called “kernel mode”, allows control over device drivers, sound
card, video display, etc.
When a rootkit is installed on a system, it tries to move from Ring 1 to
Ring 0 to hide from other functions of the operating system to avoid
detection.
One technique used by rootkits to gain deeper access is DLL injection.
o DLL Injection: Technique used to run arbitrary code within the
address space of another process by forcing it to load a dynamic-
link library.
o Dynamic Link Library (DLL): Collection of code and data used by
multiple programs simultaneously for code reuse and
modularization.
Shim: A piece of software code placed between two components to
intercept and redirect calls between them.
o Rootkits are powerful and difficult to detect because the operating
system is essentially blinded to them.
o To detect them, boot from an external device and scan the internal
hard drive using a good anti-malware scanning solution from a live
boot Linux distribution.
Logic Bombs:
Malicious code inserted into a program, which executes only when certain
conditions are met.
Keylogger
Keylogger: Software or hardware that records every keystroke made on
a computer or mobile device.
Protection measures:
Can waste storage space, slow down performance, and introduce security
vulnerabilities.
Removal methods: Manual removal, bloatware removal tools, or clean OS
installation.
Out-of-Cycle Logging: If you are noticing that your logs are being
generated at odd hours or during times when no legitimate activities
should be taking place (such as in the middle of the night when no
employees are actively working).
Data Classifications
Types include Sensitive, Confidential, Public, Restricted, Private, Critical
Data States
States include Data at rest, Data in transit, Data in use
Protection Methods:
Disk encryption
Communication tunneling
Data Types
Data Types: Examples include Regulated data, Trade secrets, Intellectual
property, Legal information, Financial information, Human vs non-human
readable data
Data Sovereignty
Information subject to laws and governance structures within the nation it
is collected
Tokenization
Obfuscation
Segmentation
Permission Restriction
Data Ownership
Process of identifying the individual responsible for maintaining the
confidentiality, integrity, availability, and privacy of information assets.
Data States
Data at Rest:
Data stored in databases, file systems, or storage systems, not actively
moving.
Encryption Methods:
SSL (Secure Sockets Layer) and TLS (Transport Layer Security): Secure
communication over networks, widely used in web browsing and email.
VPN (Virtual Private Network): Creates secure connections over less secure
networks like the internet.
IPSec (Internet Protocol Security): Secures IP communications by
authenticating and encrypting IP packets.
Data in Use:
Data actively being created, retrieved, updated, or deleted.
Protection Measures:
Note: Understanding the three data states (data at rest, data in transit,
and data in use) and implementing appropriate security measures for each
is essential for comprehensive data protection.
Data Types
Regulated Data: Controlled by laws, regulations, or industry
standards.
Compliance requirements:
Data Sovereignty
Digital information subject to laws of the country where it's located.
Gained importance with cloud computing's global data storage.
Access Restrictions:
Securing Data
Geographic Restrictions (Geofencing): Virtual boundaries to
restrict data access based on location. Compliance with data
sovereignty laws. Prevent unauthorized access from high-risk
locations.
Cryptographic Solutions
Cryptography: Practice and study of writing and solving codes.
Encryption to hide information's true meaning.
Data States:
Symmetric Algorithms:
DES
Triple DES
IDEA
AES
Blowfish
Twofish
Rivest Cipher
Asymmetric Algorithms:
Diffie-Hellman
RSA
Elliptic Curve Cryptography
Algorithms
MD5
SHA Family (RIPEMD, HMAC)
Encryption Tools
TPM
HSM
Key Management Systems
Secure Enclave
Obfuscation
Steganography
Tokenization
Data Masking
Cryptographic Attacks
Downgrade Attacks
Collision Attacks
Quantum Computing Threats
Symmetric vs Asymmetric
Symmetric Encryption
Uses a single key for both encryption and decryption. Often referred to as
private key encryption. Requires both sender and receiver to share the
same secret key. Offers confidentiality but lacks non-repudiation.
Challenges with key distribution in large-scale usage.
Asymmetric Encryption
Uses two separate keys:
Often called “Public Key Cryptography”. No need for shared secret keys.
Commonly used algorithms include Diffie-Hellman, RSA, and Elliptic Curve
Cryptography (ECC). Slower compared to symmetric encryption but solves
key distribution challenges.
Hybrid Approach
Combines both symmetric and asymmetric encryption for optimal
benefits. Asymmetric encryption used to encrypt and share a secret key.
Symmetric encryption used for bulk data transfer, leveraging the shared
secret key. Offers security and efficiency.
Stream Cipher
Encrypts data bit-by-bit or byte-by-byte in a continuous stream. Uses a
keystream generator and exclusive XOR function for encryption. Suitable
for real-time communication data streams like audio and video. Often
used in symmetric algorithms.
Block Cipher
Breaks input data into fixed-size blocks before encryption. Usually 64,
128, or 256 bits at a time. Padding added to smaller data blocks to fit the
fixed block size. Advantages include ease of implementation and security.
Can be implemented in software, whereas stream ciphers are often used
in hardware solutions.
Symmetric Algorithms
DES (Data Encryption Standard)
Uses a 64-bit key (56 effective bits due to parity). Encrypts data in 64-bit
blocks through 16 rounds of transposition and substitution. Widely used
from the 1970s to the early 2000s.
Blowfish
A block cipher with key sizes ranging from 32 to 448 bits. Developed as a
DES replacement but not widely adopted.
Twofish
A block cipher supporting 128-bit block size and key sizes of 128, 192, or
256 bits. Open source and available for use.
Classification:
All the mentioned algorithms are symmetric. Most are block ciphers
except for RC4, which is a stream cipher.
Asymmetric Algorithms
Public Key Cryptography
No shared secret key required. Uses a key pair:
Create a hash digest of the message. Encrypt the hash digest with the
sender's private key.
Digital Signature: A hash digest of a message encrypted with the
sender’s private key to let the recipient know the document was created
and sent by the person claiming to have sent it.
Encrypt the message with the receiver's public key. Ensures message
integrity, non-repudiation, and confidentiality.
Hashing
One-way cryptographic function that produces a unique message digest
from an input.
Hash Digest:
Like a digital fingerprint for the original data. Always of the same length
regardless of the input's length.
Digital Signatures:
Uses a hash digest encrypted with a private key. The sender hashes the
message and encrypts the hash with their private key. Recipient decrypts
the digital signature using the sender's public key. Verifies integrity of the
message and ensures non-repudiation.
Birthday Attack
Occurs when two different messages result in the same hash digest
(collision).
Key Stretching
Salting
Security Benefits
Key Escrow
Digital Certificates
Digital Certificates
Wildcard Certificate
Self-Signed Certificates
Third-Party Certificates
Key Concepts:
Blockchain
Blockchain
Public Ledger:
Blockchain Applications:
Smart Contracts:
Encryption Tools
Encryption Tools for Data Security
Secure Enclaves:
Obfuscation
Obfuscation Techniques in Data Security
Steganography:
Tokenization:
Cryptographic Attacks
Downgrade Attacks:
Collision Attacks: