Is Overview
Is Overview
Information Security:
The tools and processes that organizations use to protect the information.
This includes policy settings that prevent unauthorized people from accessing business and personal
information.
Network Security:
Network security refers to any technologies, policies, people, and procedures that defend any
communication infrastructure from cyberattacks, unauthorized access and data loss.
4- Security mechanisms
A mechanism that is designed to detect, prevent or recover from a security attack.
Using algorithms and protocols to secure the data to prevent further attacks.
5- Network Security Model
The structured defensive mechanisms and protocols implemented to protect the integrity,
confidentiality and availability of data transmitted between devices over an interconnected
system of networks.
Types of Attacks
Passive Active
Attack Aim to extract sensitive
Attack
Aim to manipulate system
information from a system
resources or impact their
without affecting its
operation.
resources.
Brute force attack: A brute force attack is a hacking method that uses trial and error to crack passwords,
login credentials, and encryption keys.
Example: Taking advantage of weak passwords and users implementing the same password across other
accounts
This includes
Example:
Firewalls
Access Control
VPN
Data loss Prevention
Email Security
Data encryption
Wireless security
Methods of mapping:
One to many
Many to many
One to one
Classical Cipher Methods
1- Substitution method:
Substitute the alphabet by skipping 2 letters and writing 3rd letter as cipher letter.
A B C D E F G H I J K L
M N O P Q R S T U V W X
Y Z
2- Ceaser Cipher
The Caesar Cipher is one of the simplest and oldest methods of encrypting messages, named
after Julius Caesar, who reportedly used it to protect his military communications.
This technique involves shifting the letters of the alphabet by a fixed number of places.
Disadvantages:
3- Playfair Cipher
The first practical digraph substitution cipher.
The scheme was invented in 1854 by Charles Wheatstone but was named after Lord
Playfair who promoted the use of the cipher.
we encrypt a pair of alphabets(digraphs) instead of a single alphabet.
M O N A R
C H Y B D
E F G I/J K
L P Q S T
U V W X Z
b) Encryption Rules:
1. Make pair/diagram of each letter.
2. For Repeating or single letters use fillers (in this case we use x)
3. Same Column
a. Write immediate |↓| alphabet
b. wrap around (if line is finished)
4. Same Row
a. Write immediate |→| alphabet
b. wrap around (if line is finished)
5. Different Column and Row
a. Create a rectangle around both letters
b. Swap |↔| with the last value of column or row.
c) Example:
Message: A quick brown fox jumps over a lazy dog.
Aq ui ck br ow nf ox ju mp so ve ra la zy do g
Aq ui ck br ow nf ox ju mp so ve ra la zy do gx
d) Advantages:
Brute force attacks do not affect it.
Cryptanalysis is not possible (decode a cipher without knowing the key)
e) Disadvantages:
o The original Playfair comprises of 5*5 grid in which 25 letters can be placed that to of
uppercase so it cannot encrypt lowercase letters, whitespaces, different printable
characters.
o Moreover one letter will be discarded due to 25 squares.