Module 4 Topics
Module 4 Topics
Overview of Encryption Algorithms Encryption is the process of converting plaintext into ciphertext to
protect data from unauthorized access. Common encryption algorithms include:
AES (Advanced Encryption Standard): A symmetric encryption standard known for its efficiency
and robustness, supporting key sizes of 128, 192, and 256 bits.
ECC (Elliptic Curve Cryptography): An asymmetric encryption technique that provides high
security with shorter key sizes, making it suitable for devices with limited computational power.
Criteria for Evaluating Encryption Strength Encryption strength is determined by several factors:
Key Size: The length of the key used in the encryption process; larger keys generally provide
greater security.
Computational Power: The amount of resources required to break the encryption through brute
force attacks.
Algorithm Design: The structural soundness of the encryption algorithm and its resistance to
known attacks.
Brute Force Attacks A brute force attack involves systematically trying all possible keys until the correct
one is found. The strength of encryption is measured by how computationally impractical it is to break
using brute force.
Symmetric Encryption: Uses the same key for encryption and decryption. Faster and more
efficient but requires secure key exchange.
Asymmetric Encryption: Uses a pair of keys (public and private). Provides stronger security for
data transmission but is slower due to complex mathematical operations.
2. Vulnerabilities and Countermeasures Against Threat Actors
Hackers: Individuals who exploit system vulnerabilities for various motives, ranging from
curiosity to financial gain.
Hacktivists: Individuals or groups that attack systems to promote political or social agendas.
Cybercriminals: Individuals or groups that exploit systems for financial gain through activities like
phishing, ransomware, and malware distribution.
Typical Vulnerabilities
Ransomware: Malware that encrypts data and demands payment for its release.
Zero-Day Exploits: Exploits targeting previously unknown vulnerabilities before patches are
developed.
Countermeasures
Cybersecurity Policies: Establishing guidelines for data protection, employee training, and
incident response.
Case Studies
Examples of real-world attacks, their impacts, and how effective countermeasures were
employed.
Case Studies: Real-World Attacks, Their Impacts, and Effective Countermeasures
Impact: Affected over 230,000 computers across 150 countries, disrupting businesses,
healthcare systems (particularly the UK’s NHS), and various other industries.
Overview: A sophisticated attack that exploited a third-party vendor’s credentials to gain access
to Target’s network, installing malware on the POS (Point of Sale) systems.
Impact: Compromised 40 million credit and debit card accounts and personal information of
approximately 70 million individuals.
c. Stuxnet (2010)
Impact: Destroyed approximately one-fifth of Iran’s nuclear centrifuges by causing them to spin
out of control, while providing false feedback to operators.
Impact: Compromise of sensitive data, extensive espionage efforts, and significant costs in
remediation and investigation.
Overview: Ransomware attack launched by the DarkSide group targeting Colonial Pipeline’s IT
systems, resulting in a shutdown of fuel distribution across the U.S. East Coast.
Impact: Caused fuel shortages, economic disruptions, and a ransom payment of $4.4 million
(though a portion was later recovered).
Important:
Improved incident response and preparedness are crucial for mitigating damages.
Collaboration between private entities and government agencies can significantly enhance
defense capabilities.
3. Data Privacy Act of 2012 and Cybercrime Law
Scope: The Data Privacy Act of 2012 (Republic Act No. 10173) was enacted to protect all forms of
information, whether private, personal, or sensitive. It applies to all individuals and organizations
that process personal data within the Philippines and those involved in processing personal data
of Filipino citizens.
Principles: The law is built on fundamental principles of transparency, legitimate purpose, and
proportionality.
Data Subject Rights: The law grants individuals the right to be informed, access, rectify, and
object to data processing. They also have the right to data portability, restriction, and erasure.
Coverage: The Cybercrime Prevention Act of 2012 (Republic Act No. 10175) addresses various
cybercrimes such as hacking, illegal access, identity theft, cyber-squatting, child pornography,
libel, and other online offenses.
Legal Implications: Defines penalties for different types of cybercrimes, establishes procedures
for investigation and prosecution, and provides measures for law enforcement agencies to
address cybercrimes.
These laws provide legal frameworks to safeguard personal data and combat cybercrime.
Encourage organizations to adopt best practices in data protection and cybersecurity to ensure
compliance.
Balancing privacy rights with national security and public safety requirements.
Adapting to rapidly evolving cyber threats that may not yet be covered by existing laws.
Comparison with International Standards and Regulations (e.g., GDPR)
The GDPR (General Data Protection Regulation) of the European Union provides a more
comprehensive framework for data protection, including stricter requirements for data
processing, security, and breach notification.
While both the Data Privacy Act and GDPR focus on data protection, the GDPR places more
emphasis on consent, data minimization, and accountability.
The Cybercrime Prevention Act of 2012, while focused on cybercrimes, may lack some of the
broader privacy protections found in GDPR.