Cyber Security[Cyber security]
This chapter informs us about the world of cyber security.
Quiz 1- Cybersecurity: The world of experts and criminals.It informs us about:
Different type of hacker and their characteristics
Different terms used in the cyber world and their brief description
Helps the user to understand the NIST/NICE Cybrer Security speciality expert areas.
Quiz 2- The Cybersecurity CubeThis chapter involves:
Principals of cybersecurity
State of data for a given technology
ISO/IEC 27000 Domains and Controls
Quiz 3- Threats, Vulnerabilities and AttacksThis chapter involves:
Different type of malicious code
Different email and browser attacks
Social Engineering principal and threats
Different type of cyber attacks
Types of application and Web attack.
Symmetric/Asymmetric AnalysisSymmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.
Examples include: 3DES, IDEA and AES In Asymmetric Algorithm public key is used to encrypt plaintext into ciphertext whereas a private key is used to decrypt a ciphertext.
Examples include: RFA, Diffie Hallman
Ceaser CypherIt is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet.
The pros include that there isn't any complex programming required.
The cons might include that there are only 26 possible key shifts available.
Vigenere initial cipherIt is a method of encrypting alphabetic text by using a series of interwoven Caesar ciphers, based on the letters of a keyword.
It uses a plain key to develop a cyphertext.
It has the alphabet written out 26 times in different rows, each alphabet shifted cyclically to the left compared to the previous alphabet, corresponding to the 26 possible Caesar ciphers.