Cyber Security

  • Period: to

    Cyber Security

    [Cyber security]
    This chapter informs us about the world of cyber security.
  • Quiz 1- Cybersecurity: The world of experts and criminals.

    It informs us about:
    Different type of hacker and their characteristics
    Different terms used in the cyber world and their brief description
    Helps the user to understand the NIST/NICE Cybrer Security speciality expert areas.
  • Quiz 2- The Cybersecurity Cube

    This chapter involves:
    Principals of cybersecurity
    State of data for a given technology
    Countermeasure Category
    ISO/IEC 27000 Domains and Controls
  • Quiz 3- Threats, Vulnerabilities and Attacks

    This chapter involves:
    Different type of malicious code
    Different email and browser attacks
    Social Engineering principal and threats
    Different type of cyber attacks
    Types of application and Web attack.
  • Hashing Lab

  • Symmetric/Asymmetric Analysis

    Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.
    Examples include: 3DES, IDEA and AES In Asymmetric Algorithm public key is used to encrypt plaintext into ciphertext whereas a private key is used to decrypt a ciphertext.
    Examples include: RFA, Diffie Hallman
  • Ceaser Cypher

    It is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet.
    The pros include that there isn't any complex programming required.
    The cons might include that there are only 26 possible key shifts available.
  • Vigenere initial cipher

    It is a method of encrypting alphabetic text by using a series of interwoven Caesar ciphers, based on the letters of a keyword.
    It uses a plain key to develop a cyphertext.
    It has the alphabet written out 26 times in different rows, each alphabet shifted cyclically to the left compared to the previous alphabet, corresponding to the 26 possible Caesar ciphers.