Denial of Service Attacks(DoS) and its types?

What is a Denial of Service attack?

A Denial of Service is a cyber-attack in which the attacker with malicious aim makes the machine or network resource unavailable to its intended users by flooding the target network with heavy traffic.
The DoS attacks typically exploited the security vulnerabilities present in the network or system. The victims of DoS attacks are often high-profile organizations such as banking, commerce, government, and trade organizations.

How does a DoS attack work?

Denial of service is typically achieved by overwhelming or flooding the targeted network with a huge amount of requests with a malicious attempt to overload the system and prevent some legitimate requests from being fulfilled.

What are the 7 layers of the OSI model?

OSI stands for Open Systems Interconnection and is been developed by ISO(International Organization of Standardization) in the year 1984. The OSI reference model is a 7 layer architecture with each layer having its own specific function to perform.
The OSI model is a conceptual framework to better understand the complex interactions that are happening. The layers of the OSI model work collaboratively to transmit data from one person to another across the globe.
The first 4 layers are considered as the lower layers or hardware layers and are responsible for moving data around. The layers from 5-7 are called the upper layers of software layers and contain application-level data.

The 7 layers of the OSI model are:


Inventory Management System using QR code


  An Inventory Management System is a System by which the goods and other resources can be tracked and processed. Inventory management has been useful in many business companies and is extensively studied.
    Our Project deals with developing an Inventory management system for the Airports Authority of India(AAI) and it deals with the management of baggage of passengers that get lost or misplaced at airports and returning it back to the passengers.

Types of Intrusion Detection System(IDS)

What is Intrusion Detection System(IDS)?

An Intrusion Detection System(IDS) is a software application that scans a network or a system for malicious activities or policy violations.
Any malicious activity or violation is reported either to the network administrator or collected using a SIEM system(security information and event management).
A SIEM system combines output from multiple sources and uses alarm filtering techniques to differentiate between malicious activities from false alarms. 

Difference between AES and DES in cryptography

AES and DES are both symmetric-key cryptographic algorithms, in which the sender and receiver both use a single shared key for both encryption and decryption.
AES stands for Advanced Encryption StandardDES stands for Data Encryption Standard
First published in 1998First published in 1976
The key length can be 128-bits, 192-bits, and 256-bitsThe effective key length is 56-bits
In AES, the number of rounds depends on key length: 10(128-bits), 12(192-bits), and 14(256-bits) Uses 16 rounds of Feistel structure
The structure is based on the substitution-permutation networkThe structure is based on Feistel Cipher
The rounds in AES include Byte Substitution(SubBytes), Shift Rows, Mix Columns, Add RoundKeyThe rounds in DES include Expansion, XOR operation with round key, Substitution, and Permutation
AES can encrypt 128-bits of plaintextDES can encrypt 64-bits of plaintext
AES was designed by Vincent Rijmen, Joan DaemenDES was designed by IBM
AES is more secure than DESDES is known to have vulnerabilities. 3DES is the secure variation of DES
AES was derived from the square cipherDES was derived from the Lucifer cipher
No known crypt-analytical attacks against AESKnown attacks against DES include Brute-force, Davies attack, Differential cryptanalysis(DC), and Linear cryptanalysis(LC)

What is Firewall and its Types?

What is a Firewall?

A Firewall is a cybersecurity tool (computer hardware or software) that helps to protect your network by filtering unwanted or blocking specific traffic based on defined security rules. The primary goal of a firewall is to protect the network from malicious traffic requests and allow only authorized traffic through.
The term firewall is originally referred to as a wall, intended for confining fire within a line of adjacent buildings. Firewall generally works at layer 3 and 4 of the OSI (Open Systems Interconnection) model.