Cyber
Cyber
Block Cipher encrypts data in fixed-size blocks usually 64 or 128 bits at a time. Block Cipher vs Stream Cipher: 1.Block Cipher Converts the plain text into cipher text
The encryption algorithm processes each block of data separately using by taking plain text’s block at a time. Stream Cipher Converts the plain text into cipher
the cryptographic key to transform the plaintext into the ciphertext. Block text by taking 1 bit plain text at a time. 2.Block cipher uses either 64 bits or more than
ciphers function on complex mathematical computation and permutation to 64 bits. While stream cipher uses 8 bits. 3.The complexity of block cipher is simple.
ensure that the data encrypted is safe. The choice of block size does not While stream cipher is more complex. 4. Block cipher uses confusion as well as
directly affect the strength of the encryption scheme. The strength of the diffusion. While stream cipher uses only confusion. 5.In block cipher, reverse encrypted
cipher depends upon the key length. However, any size of the block is text is hard. While in-stream cipher, reverse encrypted text is easy. 6.The algorithm
acceptable. The following aspects can be kept in mind while selecting the size modes which are used in block cipher are ECB (Electronic Code Book) and CBC (Cipher
of a block: Avoid very small block sizes, Do not have very large block sizes, and Block Chaining).The algorithm modes which are used in stream cipher are CFB (Cipher
Multiples of 8-bit. Features: •Fixed Block Size: The Data is encrypted Feedback) and OFB (Output Feedback). 7. Block cipher works on transposition
in a fixed-size block. •Complex techniques like rail-fence technique, columnar transposition technique, etc. While
Operations: In blockciphers, substitution combined with permutation forms t stream cipher works on substitution techniques like Caesar cipher, polygram
he operation to achieve encryption. •Modes of Operation: Block ciphers substitution cipher, etc. 8. Block cipher is slow as compared to a stream cipher. While
employ several modes such as ECB (Electronic Codebook) and CBC (Cipher stream cipher is fast in comparison to block cipher.
Block Chaining) for enhanced security. Eg: AES (Advanced Encryption Feistel Cipher model is a structure or a design used to develop many block ciphers such
Standard), DES (Data Encryption Standard) and Blowfish. as DES. Feistel cipher may have invertible, non-invertible and self invertible
Stream Cipher encrypts data one bit or one byte at a time rather than in components in its design. Same encryption as well as decryption algorithm is used. A
fixed-size blocks. It generates a keystream that is combined with the plaintext separate key is used for each round. However same round keys are used for encryption
to the produce ciphertext. Stream ciphers are made for the scenarios where as well as decryption. Algorithm: •Create a list of all the Plain Text characters. •Convert
data needs to be encrypted in the continuous stream making them suitable the Plain Text to Ascii and then 8-bit binary format. •Divide the binary Plain Text string
for the real-time applications. It can be categorized into the synchronous, self- into two halves: left half (L1)and right half (R1). •Generate a random binary keys (K1
synchronizing and one-time pad types. The Synchronous encryption requires and K2) of length equal to the half the length of the Plain Text for the two rounds. First
independently generated keystream from both the plaintext and the Round of Encryption: a.Generate function f1 using R1 and K1 as follows: f1= xor(R1,
ciphertext. They have to be in the same state, with the same key, in order to K1); b.Now the new left half(L2) and right half(R2) after round 1 are as follows: R2=
decode the data properly. Features: •Continuous Encryption: The data is xor(f1, L1); L2=R1; Second Round of Encryption: a.Generate function f2 using R2 and
encrypted in a stream that runs continuously, a bit or byte at a time. K2 as follows: f2= xor(R2, K2); b.Now the new left half(L3) and right half(R3) after round
•Keystream Generation: To create encryption keys, the Stream ciphers use a 2 are as follows: R3= xor(f2, L2); L3=R2; c.Concatenation of R3 to L3 is the Cipher Text
pseudorandom keystream generator. •Efficiency: Stream ciphers are d.Same algorithm is used for decryption to retrieve the Plain Text from the Cipher Text.
generally more efficient for encrypting data of variable length and in the
streaming applications. Eg: RC4, Salsa20, and ChaCha20.
Cryptanalysis is the process of transforming or decoding communications from non-
2. Transposition Ciphers are those forms of ciphers that work on the principle readable to readable format without having access to the real key. Cryptanalysis
of shifting the positions of the characters of the plaintext to create the frequently comprises a direct evaluation of the cryptosystem in use, which is essentially
ciphertext. While in substitution ciphers the actual letters are replaced, in an advanced concentrated mathematical attempt at decryption utilizing knowledge
transposition ciphers the letters’ positions are changed instead. ●Rail Fence about the encryption scheme that is already available. They can employ intercepted
Cipher: The plaintext is arranged in a manner of a zigzag pattern on the encrypted messages (ciphertext), intercepted complete, partial, likely, or similar
number of ‘rails’ and then read column wise. ●Columnar Transposition original messages (plaintext), or information (encrypted or original) that is known to be
Cipher: The plaintext is written into rows under a certain key. The columns used adaptively in subsequent trials. To determine the weak points of a cryptographic
are then arranged in order of the key names by using the sort function. system, it is important to attack the system. This attacks are called Cryptanalytic
3.Modern ciphers are far more sophisticated and are intended to offer better attacks.
Types of attacks include ciphertext-only attacks, where only encrypted messages are
security as compared to the traditional ciphers. These are of two types, available, known-plaintext attacks, where both plaintext and ciphertext are known,
the symmetric key ciphers and the asymmetric or public key ciphers. and chosen-plaintext/ciphertext attacks, where the attacker can encrypt or decrypt
specific data to expose the encryption scheme.
Intrusion Detection Systems: Intrusion detection systems help computer system ….Besides this cryptographic checksum can also be used for verification of data.
prepare for and deal with attacks. They collect information from a variety of vantage Eg: Implementation of measures to verify that e-mail content was not modified
points within computer systems and networks and analyze this information for in transit. This can be achieved by using cryptography which will ensure that
symptoms of security problems. Vulnerability assessment systems check systems and intended user receives correct and accurate information. 3. Availability - It
networks for system problems and configuration errors that represent security guarantees reliable and constant access to sensitive data only by authorized
vulnerabilities ● Monitoring and analysis of user and system activity ● Auditing of users. It involves measures to sustain access to data in spite of system failures
system configurations and vulnerabilities ●Assessing the integrity of critical system and and sources of interference. To ensure availability of corrupted data must be
data files ✓ Recognition of activity patterns reflecting known attacks ● Statistical eliminated, recovery time must be speed up and physical infrastructure must
analysis of abnormal activity patterns. Firewall Security Systems, Storage area be improved. Eg: Accessing and throughput of e-mail service. 4. Authentication
network security systems: SANs are a relatively new methodology for attaching - It is security service that is designed to establish validity of transmission of
storage, whereby a separate network (separate from the traditional LAN connects all message by verification of individual's identity to receive specific category of
storage and servers. This network would be a high-performance implementation, such information. To ensure availability of various single factors and multi-factor
as a fiber channel, that encapsulates protocols such as a small computer system authentication methods are used. A single factor authentication method uses
interface (SCSI). These are more efficient at transferring data blocks from storage and single parameter to verify user’s identity, whereas two-factor authentication
uses multiple factors to verify user’s identity. Eg: Entering username and
have hardware implementations offering buffering and delivery guarantees. This is not password when we log in to website is example of authentication. Entering
available using TCP/IP. The SAN development areas have not yet been realized, but correct login information lets website verify our identity and ensures that only
there is great potential with regard to centralized storage SAN management and we access sensitive information. 5.Non-Repudiation - It is mechanism to ensure
storage abstraction. Storage abstraction refers to an indirect representation of storage sender or receiver cannot deny fact that they are part of data transmission.
that has also been called virtualisation. Together with potential enhancements, SANs When sender sends data to receiver, it receives delivery confirmation. When
should be able to generate greater functionality than has been possible previously. receiver receives message it has all information attached within message
Network Forensics is the process of capturing, recording and conducting analysis of the regarding sender. Security Counter measures: 1. People - People are heart of
various network events in order to identify the origin of the security attacks and other information system. Administrators and users of information systems must
problems. This helps in figuring out the unauthorized access to the computer system follow policies and practice for designing good system. They must be informed
and conducts search for the evidence in such occurrences. Network Forensics has the regularly regarding information system and ready to act appropriately to
capability to conduct investigation at a network level as well as the events that take safeguard system. 2. Policy & Practice - Every organization has some set of rules
place across an IT system. Three parts of Network Forensics are Intrusion detection, defined in form of policies that must be followed by every individual working in
logging and Correlating intrusion detection and logging. The main aim of this network organization. These policies must be practiced in order to properly handle
forensics is to make available the sufficient evidence in order to impose punishment on sensitive information whenever system gets compromised. 3. Technology -
the criminal offenders. Network Forensics is applied in the major areas of hacking, Appropriate technology such as firewalls, routers, and intrusion detection must
fraud, insurance companies, theft of data, defamation, obscene publication, credit card be used in order to defend system from vulnerabilities, threats. The technology
cloning, software piracy, etc. used must facilitate quick response whenever information security gets
compromised.
Cybersec Laws: Information Technology Act, 2000: The Indian cyber laws are governed DIGITAL FORENSICS LIFECYCLE: Collection: The first step in the forensic process
by the Information Technology Act, penned down back in 2000. The principal impetus is to identify potential sources of data and acquire data from them.
of this Act is to offer reliable legal inclusiveness to eCommerce, facilitating registration Examination: After data has been collected, the next phase is to examine the
of real-time records with the Government. But with the cyber attackers getting data, which involves assessing and extracting the relevant pieces of information
sneakier, topped by the human tendency to misuse technology, a series of amendments from the collected data. This phase may also involve bypassing or mitigating OS
followed. The ITA, enacted by the Parliament of India, highlights the grievous or application features that obscure data and code, such as data compression,
punishments and penalties safeguarding the e-governance, e-banking, and e-commerce encryption, and access control mechanisms. Analysis: Once the relevant
sectors. Now, the scope of ITA has been enhanced to encompass all the latest information has been extracted, the analyst should study and analyze the data
communication devices. The IT Act is the salient one, guiding the entire Indian to draw conclusions from it. The foundation of forensics is using a methodical
legislation to govern cybercrimes rigorously: Section 43 - Applicable to people who approach to reach appropriate conclusions based on the available data or
damage the computer systems without permission from the owner. The owner can fully determine that no conclusion can yet be drawn. Reporting: The process of
claim compensation for the entire damage in such cases. Section 66 - Applicable in case preparing and presenting the information resulting from the analysis phase.
a person is found to dishonestly or fraudulently committing any act referred to in Many factors affect reporting, including the following: a. Alternative
section 43. The imprisonment term in such instances can mount up to three years or a Explanations: When the information regarding an event is incomplete, it may
fine of up to Rs. 5 lakh. Section 66B - Incorporates the punishments for fraudulently not be possible to arrive at a definitive explanation of what happened. When
receiving stolen communication devices or computers, which confirms a probable three an event has two or more plausible explanations, each should be given due
years imprisonment. This term can also be topped by Rs. 1 lakh fine, depending upon consideration in the reporting process. Analysts should use a methodical
the severity. Section 66C - This section scrutinizes the identity thefts related to imposter approach to attempt to prove or disprove each possible explanation that is
digital signatures, hacking passwords, or other distinctive identification features. If proposed. b. Audience Consideration. Knowing the audience to which the data
proven guilty, imprisonment of three years might also be backed by Rs.1 lakh fine. or information will be shown is important. c. Actionable Information. Reporting
Section 66 D - This section was inserted on-demand, focusing on punishing cheaters also includes identifying actionable information gained from data that may
doing impersonation using computer resources. National Cyber Security Policy is a allow an analyst to collect new sources of information.
policy framework by Department of Electronics and Information Technology. It aims at Cryptography is a technique of securing communication by converting plain
protecting the public and private infrastructure from cyberattacks. The policy also text into ciphertext. It is a technique of securing information and
intends to safeguard "information, such as personal information (of web users), communications through the use of codes so that only those persons for whom
financial and banking information and sovereign data". To create a secure cyber the information is intended can understand and process it. Thus preventing
ecosystem in the country, generate adequate trust and confidence in IT system and unauthorized access to information. In Cryptography, the techniques that are
transactions in cyberspace and thereby enhance adoption of IT in all sectors of the used to protect information are obtained from mathematical concepts and a
economy. Objectives: • To create an assurance framework for the design of security set of rule-based calculations known as algorithms to convert messages in ways
policies and promotion and enabling actions for compliance to global security standards that make it hard to decode them. These algorithms are used for cryptographic
and best practices by way of conformity assessment (Product, process, technology & key generation, digital signing, and verification to protect data privacy, web
people). • To strengthen the Regulatory Framework for ensuring a SECURE CYBERSPACE browsing on the internet and to protect confidential transactions such as credit
ECOSYSTEM. card and debit card transactions.
Rail Fence Cipher: Encryption: •In the rail fence cipher, the plain-text is written Types Of Cryptography: 1. Symmetric Key Cryptography: It is an encryption
downwards and diagonally on successive rails of an imaginary fence. •When we reach system where the sender and receiver of a message use a single common key
the bottom rail, we traverse upwards moving diagonally, after reaching the top rail, the to encrypt and decrypt messages. Symmetric Key cryptography is faster and
direction is changed again. Thus the alphabets of the message are written in a zig-zag simpler but the problem is that the sender and receiver have to somehow
manner. •After each alphabet has been written, the individual rows are combined to exchange keys securely. The most popular symmetric key cryptography
obtain the cipher-text. systems are Data Encryption Systems (DES) and Advanced Encryption Systems
Eg: Input: GeeksforGeeks; Key = 3; Output : GsGsekfrek eoe Decryption: As we’ve seen (AES). 2. Hash Functions: There is no usage of any key in this algorithm. A
earlier, the number of columns in rail fence cipher remains equal to the length of plain- hash value with a fixed length is calculated as per the plain text which makes
text message. And the key corresponds to the number of rails. •Hence, rail matrix can it impossible for the contents of plain text to be recovered. Many operating
be constructed accordingly. Once we’ve got the matrix we can figure-out the spots systems use hash functions to encrypt passwords.
where texts should be placed (using the same way of moving diagonally up and down 3. Asymmetric Key Cryptography: Here, a pair of keys is used to encrypt and
alternatively ). •Then, we fill the cipher-text row wise. After filling it, we traverse the decrypt information. A sender’s public key is used for encryption and a
receiver’s private key is used for decryption. Public keys and Private keys are
matrix in zig-zag manner to obtain the original text. Columnar Transposition cipher different. Even if the public key is known by everyone the intended receiver
involves writing the plaintext out in rows, and then reading the ciphertext off in columns can only decode it because he alone knows his private key. The most popular
one by one. Encryption: •The message is written out in rows of a fixed length, and then asymmetric key cryptography algorithm is the RSA algorithm.
read out again column by column, and the columns are chosen in some scrambled order. Applications: 1.Computer Passwords: Cryptography secures passwords by
•Width of the rows and the permutation of the columns are usually defined by a hashing and encrypting them, preventing unauthorized access even if the
keyword. •For example, the word HACK is of length 4 (so the rows are of length 4), and database is compromised. 2. Digital Currencies: Cryptography protects
the permutation is defined by the alphabetical order of the letters in the keyword. In transactions and prevents fraud in digital currencies like Bitcoin through
this case, the order would be “3 1 2 4”. •Any spare spaces are filled with nulls or left complex algorithms and cryptographic keys. 3. Secure Web Browsing:
blank or placed by a character (Example: _). •Finally, the message is read off in columns, Protocols like SSL/TLS use public key cryptography to encrypt data, ensuring
in the order specified by the keyword. Eg: Input: Geeks for Geeks; Key = HACK; Order of secure communication between web servers and clients. 4. Electronic
alphabets in HACK=3214; Output: e kefGsGsrekoe_ Decryption: •To decipher it, the Signatures: Digital signatures, created and verified using cryptography,
recipient has to work out the column lengths by dividing the message length by the key authenticate and secure electronic documents. 5. Authentication:
length. •Then, write the message out in columns again, then re-order the columns by Cryptography verifies identities and access rights in scenarios like logging into
reforming the key word. systems or secure networks. 6. Cryptocurrencies: Blockchain networks rely on
cryptographic methods to secure transactions and maintain integrity. 7. End-
to-End Encryption: Used in apps like WhatsApp, it ensures only intended
recipients can access encrypted messages, enhancing privacy and security.
Forms of Cryptanalysis: 1. Linear Cryptanalysis: Linear cryptanalysis is a general type
of cryptanalysis based on discovering affine approximations to a cipher’s action in A cipher is a technique that is used in transforming the readable data
(plaintext) into coded data (ciphertext) and the other way round. The first step
cryptography. Block and stream ciphers have both been subjected to attacks. Linear in converting regular text into an unrecognizable form is encryption and the
cryptanalysis is one of the two most common attacks against block ciphers, with process of converting the encoded text back into regular text is decryption.
differential cryptanalysis being the other. 2. Differential Cryptanalysis: Differential Ciphers are able to perform these transformation using keys; specific pieces of
cryptanalysis is a sort of cryptanalysis that may be used to decrypt both block and information. It guarantees that only the right person can get to the primary
stream ciphers, as well as cryptographic hash functions. In the widest sense, it is the data. Types: 1. Substitution Ciphers involve replacing each member of the
study of how alterations in information intake might impact the following difference at plaintext with another member which can be of the same set. •Caesar Cipher:
the output. In the context of a block cipher, it refers to a collection of strategies for It is a substitution cipher where each letter in the plaintext is replaced by
tracking differences across a network of transformations, finding where the cipher another letter shifted a fixed number of positions down the alphabet. •Simple
displays non-random behavior, and using such attributes to recover the secret key Substitution Cipher: A simple substitution cipher is a technique in which each
(cryptography key). letter in the plain text is replaced with another letter. The key is the alphabet
but in a random order.
SSL Protocol: •SSL Protocol stands for Secure Sockets Layer protocol, which is an Threat modelling methodologies: DREAD was proposed for threat modeling but due to
encryption-based Internet security protocol that protects confidentiality and inconsistent ratings, it was dropped by Microsoft in 2008. It is currently used by
integrity of data. - SSL is used to ensure the privacy and authenticity of data over OpenStack and many other corporations. It provides a mnemonic for risk rating security
the internet. - SSL is located between the application and transport layers. - At first, threats using five categories. The categories are: Damage Potential: ranks the extent of
SSL contained security flaws and was quickly replaced by the first version of TLS; damage that would occur if a vulnerability is exploited. • Reproducibility: ranks how easy
that’s why SSL is the predecessor of the modern TLS encryption. - TLS/SSL website it is to reproduce an attack. • Exploitability: Assigns a number to the effort required to
has “HTTPS” in its URL rather than “HTTP”. - SSL is divided into three sub-protocols: launch the attack. • Affected Users: A value characterizing how many people will be
the Handshake Protocol, the Record Protocol, and the Alert Protocol. impacted if an exploit becomes widely available. • Discoverability: Measures the
TLS Protocol: • Same as SSL, TLS which stands for Transport Layer Security is widely likelihood of how easy it is to discover the threat. Process for Attack Simulation and
used for the privacy and security of data over the internet. • TLS uses a pseudo- Threat Analysis (PASTA): It is a seven-step, risk-centric methodology. The purpose is to
random algorithm to generate the master secret, which is a key used for the provide a dynamic threat identification, enumeration, and scoring process. Upon
encryption between the protocol client and protocol server. • TLS is basically used completion of the threat model, security subject matter experts develop a detailed
for encrypting communication between online servers, like a web browser loading analysis of the identified threats. Finally, appropriate security controls can be
a web page in the online server. • TLS also has three sub-protocols, the same as the enumerated. This helps developers to develop an asset-centric mitigation strategy by
SSL protocol – Handshake Protocol, Record Protocol, and Alert Protocol. analyzing the attacker-centric view of an application. Trike: The focus is on using threat
Diff: Secure Socket Protocol supports Fortezza Algorithms where Transport layer models as a risk management tool. Threat models are based on the requirement model.
Protocol do not, also the versions of both protocols are very different SSL is version The requirements model establishes the stakeholder-defined “acceptable” level of risk
3.0 and TLS is version 1.0 protocol. The difference between SSL and TLS is that. In assigned to each asset class. Analysis of the requirements model yields a threat model
SSL the Message digest is used to create a master secret and provides the security from which threats are identified and assigned risk values. The completed threat model
services in communication. which are Authentication and confidentiality. While in is used to build a risk model based on assets, roles, actions, and calculated risk exposure.
TLS a randomly generated Pseudo function is used to create a master secret which
provides higher security as compared to SSL.
Types Of Cyber Security Vulnerabilities: Broken Authentication: In order to pose as “Software piracy is the copying and use of software without a proper license from the
the original user, malicious attackers can hack user sessions and identities by developer." Similarly, the simultaneous use of single-user licensed software by
compromising authentication credentials. In the past, multi-factor authentication multiple users, or the installation of single-user licensed software on multiple sites,
was vastly popular, but due to its difficulties in use, password authentication also amounts to software piracy. Using trial version software for commercial gains is
prevailed. Two-factor authentication, on the other hand, is still a widely also considered piracy. Piracy is punishable if you install pirated software, use it for
implemented security process that involves two methods of verification. One your work, and then delete the software from the machine, even if there is enough
method is usually password verification. Frequently used types of authentication evidence to show its prior usage.
technology are username/password, one-time password and biometric Any copyright infringement is the unauthorized use of copyrighted material in a
authentication. Injection: An injection flaw is a vulnerability which allows an manner that violates one of the copyright owner’s exclusive rights, such as the right
attacker to relay malicious code through an application to another system. This can to reproduce or to make derivative works that build upon it. For electronic and audio-
include compromising both backend systems as well as other clients connected to visual media, such unauthorized reproduction and distribution of copyrighted work
the vulnerable applications. Security Misconfiguration: Security misconfiguration are often referred to as piracy (however, there is no legal basis for the term "piracy").
gives attackers a chance to gain unauthorized access to some system data or There are different types of software piracy, such as copying copyrighted materials
functionality. Generally, such flaws evolve into a complete system compromise, The and using multiple copies of the same without a license. Even if a person installs and
business impact depends on the protection needs of the application and data. Poor uses a copy of the material and then removes it from the system, it will still be
Resource Management: Resource management practices include transferring, reported as software piracy. This includes installation on a hard drive or servers and
using, creating and even destroying the resources within a system. When clients with the same version and no license. If a company illegally sells the product of
management of resources is poor or risky, your organization is prone to have another company without their permission or authorization, with or without
vulnerabilities like path traversal, use of potentially dangerous functions, buffer alteration of the original product, it can be considered piracy.
overflow, and much more. Insecure Connection Between Elements: When the
interaction between components of your system and/or network is insecure, your
organization is exposed to many threats including SQL injection, open redirect, cross-
site scripting, and much more. In order to ensure that your organization is free from
such vulnerabilities, it is critical to pay the utmost attention to how data circulates
across your networks and systems. If you can secure the circulation of data, most
aforementioned vulnerabilities and threats can be considered solved. Yet you must
also consider unique vulnerabilities and develop appropriate solutions for each.
VAST: VAST is an acronym for Visual, Agile, and Simple Threat modeling. The The SSL and TLS handshake establishes a system for SSL/TLS clients and servers to
methodology provides actionable outputs for the unique needs of various stakeholders start communication between them in other words it is a negotiation between two
like application architects and developers, cyber security personnel, etc. It provides a parties on a network. Handshake Protocol is used to establish sessions. This protocol
unique application and infrastructure visualization scheme such that the creation and allows the client and server to verify each other by transferring a series of messages
use of threat models do not require specific security subject matter expertise.Attack to each distance. Handshake protocol uses four phases to finalize its
Tree: Attack trees are the conceptual diagram showing how an asset, or target, might circle. Handshake protocol uses four phases to finalize its circle.
be attacked. These are multi-level diagrams consisting of one root node, leaves, and Phase-1: Deciding which version of the Protocol to use. The system decides which
children nodes. From bottom to Top, child nodes are conditions that must be satisfied protocol to use. Client and Server exchange hello-packets with each other to
to make the direct parent node true. An attack is considered complete when the root confirm. In this IP session, cipher suite, and Agree on which version of the protocol
is satisfied. Each node may be satisfied only by its direct child nodes. Suppose there is to use. Phase-2: Server sends his certificate and Server-key-exchange. The server
1 grandchild below the root node. In such a case multiple steps must be taken to carry end phase-2 by exchanging the hello packet. Phase-3: Verification, in this phase, the
out an attack first the grandchild’s conditions must be satisfied for the direct parent Client replies to the server by sending his certificate and Client-exchange-key. Phase-
node to be true and then the direct parent node condition must be satisfied to make 4: In this phase, the Change Cipher suite is passed and all the verifications and
the root node true. It also has AND and OR options which represent alternatives and security checks are done after this Handshake Protocol ends.
different steps toward achieving that goal.Common Vulnerability Scoring System
(CVSS): It provides a way to capture the principal characteristics of a vulnerability and
produce a numerical score (ranging from 0-10, with 10 being the most severe) depicting
its severity. The score can then be translated into a qualitative representation (such as
low, medium, high, and critical) to help organizations properly assess and prioritize
their vulnerability management processes.T-MAP: T-MAP is an approach that is used in
Commercial Off The Shelf (COTS) systems to calculate the weights of attack paths. This
model is developed by using UML class diagrams, access class diagrams, vulnerability
class diagrams, target asset class diagrams, and affected Value class diagrams.
Forgery: Offenses of computer forgery and counterfeiting have become rampant, as Types Of Malware: Adware, Spyware, Botnets -Short for "robot network," these
it is very easy to counterfeit a document, such as a birth certificate, and use it to are networks of infected computers under the control of single attacking parties
perpetrate a crime. The authenticity of electronic documents, therefore, needs to be using command-and-control servers. Botnets are highly versatile and adaptable,
safeguarded by explicitly making forgery with the help of computers an offense able to maintain resilience through redundant servers and by using infected
punishable by law. computers to relay traffic. Botnets are often the armies behind today's distributed
When a perpetrator alters documents stored in computerized form, the crime denial-of-service (DDoS) attacks. Cryptojacking is malicious cryptomining (the
committed may constitute forgery. In such instances, computer systems are the
target of criminal activity. However, computers can also be used as instruments to process of using computing power to verify transactions on a blockchain network
commit forgery. A new generation of fraudulent alteration or counterfeiting and earning cryptocurrency for providing that service) that happens when
emerged with the advent of computerized color laser copiers. These copiers are cybercriminals hack into both business and personal computers, laptops, and
capable of high-resolution copying, document modification, and even the creation of mobile devices to install software. Malvertising is a portmanteau of "malware +
false documents without the need for an original. They produce documents of a advertising" describing the practice of online advertising to spread malware. It
quality indistinguishable from authentic ones, except to an expert. typically involves injecting malicious code or malware-laden advertisements into
Such schemes require very little computer knowledge to execute. Counterfeit legitimate online advertising networks and webpages. Ransomware – A criminal
checks, invoices, and stationery can be produced using scanners, color printers, and
graphic design software. These forgeries are difficult for an untrained eye to detect. business model that uses malicious software to hold valuable files, data, or
It is relatively easy to scan a logo into a computer system and proceed from there. information for ransom. Victims of a ransomware attack may have their operations
severely degraded or shut down entirely. Remote Administration Tools (RATs) –
Software that allows a remote operator to control a system. These tools were
originally built for legitimate use but are now used by threat actors. RATs enable
administrative control, allowing an attacker to do almost anything on an infected
computer. They are difficult to detect, as they don’t typically show up in lists of
running programs or tasks, and their actions are often mistaken for the actions of
legitimate programs. Rootkits – Programs that provide privileged (root-level)
access to a computer. Rootkits vary and hide themselves in the operating system.