Cyber Security

All information related to cyberattacks, firewalls, protocols, cryptography techniques is covered in this section. All information is posted with the proper survey.


Different types of security breaches?

What is a Security Breach?

A security breach occurs when an unauthorized person gets access to your computer data, applications, networks, or devices. A security breach can lead to things like system damage and data loss and can also damage an organization’s reputation or finances.
A security and data breach is the worst thing that can happen to any organization or its customers. A security breach can also make an organization face reputational loss.

What are the types of Security Breaches?

DoS Attack

Denial of Service Attacks(DoS) and its types?

What is a Denial of Service attack?

A Denial of Service is a cyber-attack in which the attacker with malicious aim makes the machine or network resource unavailable to its intended users by flooding the target network with heavy traffic.
The DoS attacks typically exploited the security vulnerabilities present in the network or system. The victims of DoS attacks are often high-profile organizations such as banking, commerce, government, and trade organizations.

What are the 7 layers of the OSI model?

OSI stands for Open Systems Interconnection and is been developed by ISO(International Organization of Standardization) in the year 1984. The OSI reference model is a 7 layer architecture with each layer having its own specific function to perform.
The OSI model is a conceptual framework to better understand the complex interactions that are happening. The layers of the OSI model work collaboratively to transmit data from one person to another across the globe.
The first 4 layers are considered as the lower layers or hardware layers and are responsible for moving data around. The layers from 5-7 are called the upper layers of software layers and contain application-level data.

The 7 layers of the OSI model are:

Types of Intrusion Detection System(IDS)

What is Intrusion Detection System(IDS)?

An Intrusion Detection System(IDS) is a software application that scans a network or a system for malicious activities or policy violations.
Any malicious activity or violation is reported either to the network administrator or collected using a SIEM system(security information and event management).
A SIEM system combines output from multiple sources and uses alarm filtering techniques to differentiate between malicious activities from false alarms. 

Difference between AES and DES in cryptography

AES and DES are both symmetric-key cryptographic algorithms, in which the sender and receiver both use a single shared key for both encryption and decryption.
AES stands for Advanced Encryption Standard DES stands for Data Encryption Standard
First published in 1998 First published in 1976
The key length can be 128-bits, 192-bits, and 256-bits The effective key length is 56-bits
In AES, the number of rounds depends on key length: 10(128-bits), 12(192-bits), and 14(256-bits)  Uses 16 rounds of Feistel structure
The structure is based on the substitution-permutation network The structure is based on Feistel Cipher
The rounds in AES include Byte Substitution(SubBytes), Shift Rows, Mix Columns, Add RoundKey The rounds in DES include Expansion, XOR operation with round key, Substitution, and Permutation
AES can encrypt 128-bits of plaintext DES can encrypt 64-bits of plaintext
AES was designed by Vincent Rijmen, Joan Daemen DES was designed by IBM
AES is more secure than DES DES is known to have vulnerabilities. 3DES is the secure variation of DES
AES was derived from the square cipher DES was derived from the Lucifer cipher
No known crypt-analytical attacks against AES Known attacks against DES include Brute-force, Davies attack, Differential cryptanalysis(DC), and Linear cryptanalysis(LC)

What is Firewall and its Types?

What is a Firewall?

A Firewall is a cybersecurity tool (computer hardware or software) that helps to protect your network by filtering unwanted or blocking specific traffic based on defined security rules. The primary goal of a firewall is to protect the network from malicious traffic requests and allow only authorized traffic through.
The term firewall is originally referred to as a wall, intended for confining fire within a line of adjacent buildings. Firewall generally works at layer 3 and 4 of the OSI (Open Systems Interconnection) model.