NOTES
NOTES
NOTES
MODULAR ARITHMETIC:
Modular arithmetic is the branch of arithmetic mathematics related with the “mod”
functionality. Basically, modular arithmetic is related with computation of “mod”
of expressions. Expressions may have digits and computational symbols of
addition, subtraction, multiplication, division or any other. Here we will discuss
briefly about all modular arithmetic operations.
Quotient Remainder Theorem:
It states that, for any pair of integers a and b (b is positive), there exist two unique
integers q and r such that:
a = b x q + r where 0 <= r < b
Example: If a = 20, b = 6 then q = 3, r = 2 20 = 6 x 3 + 2
Modular Addition:
Rule for modular addition is:
(a + b) mod m = ((a mod m) + (b mod m)) mod m
Example:
(15 + 17) % 7
= ((15 % 7) + (17 % 7)) % 7
= (1 + 3) % 7
=4%7
=4
The same rule is to modular subtraction. We don’t require much modular
subtraction but it can also be done in the same way.
Modular Multiplication:
The Rule for modular multiplication is:
(a x b) mod m = ((a mod m) x (b mod m)) mod m
Example:
(12 x 13) % 5
= ((12 % 5) x (13 % 5)) % 5
= (2 x 3) % 5
=6%5
=1
Modular Division:
The modular division is totally different from modular addition, subtraction and
multiplication. It also does not exist always.
(a / b) mod m is not equal to ((a mod m) / (b mod m)) mod m.
This is calculated using the following formula:
(a / b) mod m = (a x (inverse of b if exists)) mod m
Modular Inverse:
The modular inverse of a mod m exists only if a and m are relatively prime i.e.
gcd(a, m) = 1. Hence, for finding the inverse of an under modulo m, if (a x b) mod
m = 1 then b is the modular inverse of a.
Example: a = 5, m = 7 (5 x 3) % 7 = 1 hence, 3 is modulo inverse of 5 under 7.
Modular Exponentiation:
Finding a^b mod m is the modular exponentiation. There are two approaches for
this – recursive and iterative. Example:
a = 5, b = 2, m = 7
(5 ^ 2) % 7 = 25 % 7 = 4
There is often a need to efficiently calculate the value of x n mod m. This can be
done in O(logn) time using the following recursion:
It is important that in the case of an even n, the value of x n/2 is calculated only once.
This guarantees that the time complexity of the algorithm is O(logn) because n is
always halved when it is even.
EUCLIDIAN ALGORITHM:
The Euclidean algorithm is a way to find the greatest common divisor of two
positive integers. GCD of two numbers is the largest number that divides both of
them. A simple way to find GCD is to factorize both numbers and multiply
common prime factors.
The Algorithm
The Euclidean Algorithm for finding GCD(A,B) is as follows:
Proof: Consider the set of positive integers less than p: {1, 2, ......., p - 1} and
multiply each element by a, modulo p, to get the set X = {a mod p, 2a mod
p, ..... , (p - 1)a mod p}. None of the elements of X is equal to zero
because p does not divide a. Furthermore, no two of the integers in X are equal. To s
ee this, assume that ja == ka (mod p)), where 1 <= j < k <= p - 1. Because a is
relatively
prime5 to p, we can eliminate a from both sides of the equation [see Equation (4.3)]
resulting in j === k (mod p). This last equality is impossible, because j and k are both
positive integers less than p. Therefore, we know that the (p - 1) elements of X are
all positive integers with no two elements equal. We can conclude the X consists of
the set of integers {1, 2, . . . . , p - 1} in some order. Multiplying the numbers in both
sets (p and X) and taking the result mod p yields
EULER’S THEOREM:
Euler’s theorem states that for every a and n that are relatively prime:
EXAMPLE:
DISCRETE LOGARITHMS:
Given three integers a, b and m. Find an integer k such that where a and m are
relatively prime. If it is not possible for any k to satisfy this relation, print -1.
Examples:
BLOCK CIPHER:
Encryption algorithms are divided into two categories based on the input type, as
a block cipher and stream cipher. Block cipher is an encryption algorithm that
takes a fixed size of input say b bits and produces a ciphertext of b bits again. If
the input is larger than b bits it can be divided further. For different applications
and uses, there are several modes of operations for a block cipher.
Electronic Code Book (ECB) –
Electronic code book is the easiest block cipher mode of functioning. It is easier
because of direct encryption of each block of input plaintext and output is in form
of blocks of encrypted ciphertext. Generally, if a message is larger than b bits in
size, it can be broken down into a bunch of blocks and the procedure is repeated.
Procedure of ECB is illustrated below:
What is DES?
Data Encryption Standard (DES) is a block cipher with a 56-bit key length that has
played a significant role in data security. Data encryption standard (DES) has been
found vulnerable to very powerful attacks therefore, the popularity of DES has
been found slightly on the decline. DES is a block cipher and encrypts data in
blocks of size of 64 bits each, which means 64 bits of plain text go as the input to
DES, which produces 64 bits of ciphertext. The same algorithm and key are used
for encryption and decryption, with minor differences. The key length is 56 bits.
Thus, the discarding of every 8th bit of the key produces a 56-bit key from the
original 64-bit key.
DES is based on the two fundamental attributes of cryptography: substitution
(also called confusion) and transposition (also called diffusion). DES consists of
16 steps, each of which is called a round. Each round performs the steps of
substitution and transposition. Let us now discuss the broad-level steps in DES.
• In the first step, the 64-bit plain text block is handed over to an
initial Permutation (IP) function.
• The initial permutation is performed on plain text.
• Next, the initial permutation (IP) produces two halves of the permuted
block; saying Left Plain Text (LPT) and Right Plain Text (RPT).
• Now each LPT and RPT go through 16 rounds of the encryption
process.
• In the end, LPT and RPT are rejoined and a Final Permutation (FP) is
performed on the combined block
• The result of this process produces 64-bit ciphertext.
[ b0 | b4 | b8 | b12 |
| b1 | b5 | b9 | b13 |
| b2 | b6 | b10| b14 |
| b3 | b7 | b11| b15]
Mix Columns:
This step is basically a matrix multiplication. Each column is multiplied with a
specific matrix and thus the position of each byte in the column is changed as a
result.
This step is skipped in the last round.
[ c0 ] [ 2 3 1 1 ] [ b0 ]
| c1 | = | 1 2 3 1 | | b1 |
| c2 | | 1 1 2 3 | | b2 |
[ c3 ] [ 3 1 1 2 ] [ b3 ]
ELGAMAL
ElGamal encryption is a public-key cryptosystem. It uses asymmetric key
encryption for communicating between two parties and encrypting the
message. This cryptosystem is based on the difficulty of finding discrete
logarithm in a cyclic group that is even if we know g a and gk, it is extremely
difficult to compute gak.
Idea of ElGamal cryptosystem:
Suppose Alice wants to communicate with Bob.
In cryptography, it is a very tedious task to distribute the public and private keys
between sender and receiver. If the key is known to the third party
(forger/eavesdropper) then the whole security mechanism becomes worthless. So,
there comes the need to secure the exchange of keys.
There are two aspects for Key Management:
1. Distribution of public keys.
2. Use of public-key encryption to distribute secrets.
Distribution of Public Key:
The public key can be distributed in four ways:
1. Public announcement
2. Publicly available directory
3. Public-key authority
4. Public-key certificates.
These are explained as following below:
1. Public Announcement: Here the public key is broadcasted to everyone. The
major weakness of this method is a forgery. Anyone can create a key claiming to
be someone else and broadcast it. Until forgery is discovered can masquerade as
claimed user.
2. Publicly Available Directory: In this type, the public key is stored in a public
directory. Directories are trusted here, with properties like Participant
Registration, access and allow to modify values at any time, contains entries like
{name, public-key}. Directories can be accessed electronically still vulnerable to
forgery or tampering.
3. Public Key Authority: It is similar to the directory but, improves security by
tightening control over the distribution of keys from the directory. It requires
users to know the public key for the directory. Whenever the keys are needed,
real-time access to the directory is made by the user to obtain any desired public
key securely.
4. Public Certification: This time authority provides a certificate (which binds
an identity to the public key) to allow key exchange without real-time access to
the public authority each time. The certificate is accompanied by some other info
such as period of validity, rights of use, etc. All of this content is signed by the
private key of the certificate authority and it can be verified by anyone possessing
the authority’s public key.
First sender and receiver both request CA for a certificate which contains a public
key and other information and then they can exchange these certificates and can
start communication.
Hash functions:
There are many hash functions that use numeric or alphanumeric keys. This
article focuses on discussing different hash functions:
1. Division Method.
2. Mid Square Method.
3. Folding Method.
4. Multiplication Method.
Let’s begin discussing these methods in detail.
1. Division Method:
This is the most simple and easiest method to generate a hash value. The hash
function divides the value k by M and then uses the remainder obtained.
Formula:
h(K) = k mod M
Here,
k is the key value, and
M is the size of the hash table.
It is best suited that M is a prime number as that can make sure the keys are more
uniformly distributed. The hash function is dependent upon the remainder of a
division.
Example:
k = 12345
M = 95
h(12345) = 12345 mod 95
= 90
k = 1276
M = 11
h(1276) = 1276 mod 11
=0
Pros:
1. This method is quite good for any value of M.
2. The division method is very fast since it requires only a single division
operation.
Cons:
1. This method leads to poor performance since consecutive keys map to
consecutive hash values in the hash table.
2. Sometimes extra care should be taken to choose the value of M.
2. Mid Square Method:
The mid-square method is a very good hashing method. It involves two steps to
compute the hash value-
1. Square the value of the key k i.e. k2
2. Extract the middle r digits as the hash value.
Formula:
h(K) = h(k x k)
Here,
k is the key value.
The value of r can be decided based on the size of the table.
Example:
Suppose the hash table has 100 memory locations. So r = 2 because two digits are
required to map the key to the memory location.
k = 60
k x k = 60 x 60
= 3600
h(60) = 60
The hash value obtained is 60
Pros:
1. The performance of this method is good as most or all digits of the key
value contribute to the result. This is because all digits in the key
contribute to generating the middle digits of the squared result.
2. The result is not dominated by the distribution of the top digit or bottom
digit of the original key value.
Cons:
1. The size of the key is one of the limitations of this method, as the key is
of big size then its square will double the number of digits.
2. Another disadvantage is that there will be collisions but we can try to
reduce collisions.
3. Digit Folding Method:
This method involves two steps:
1. Divide the key-value k into a number of parts i.e. k1, k2, k3,….,kn,
where each part has the same number of digits except for the last part
that can have lesser digits than the other parts.
2. Add the individual parts. The hash value is obtained by ignoring the last
carry if any.
Formula:
k = k1, k2, k3, k4, ….., kn
s = k1+ k2 + k3 + k4 +….+ kn
h(K)= s
Here,
s is obtained by adding the parts of the key k
Example:
k = 12345
k1 = 12, k2 = 34, k3 = 5
s = k1 + k2 + k3
= 12 + 34 + 5
= 51
h(K) = 51
Note:
The number of digits in each part varies depending upon the size of the hash
table. Suppose for example the size of the hash table is 100, then each part must
have two digits except for the last part which can have a lesser number of digits.
4. Multiplication Method
This method involves the following steps:
1. Choose a constant value A such that 0 < A < 1.
2. Multiply the key value with A.
3. Extract the fractional part of kA.
4. Multiply the result of the above step by the size of the hash table i.e. M.
5. The resulting hash value is obtained by taking the floor of the result
obtained in step 4.
Formula:
h(K) = floor (M (kA mod 1))
Here,
M is the size of the hash table.
k is the key value.
A is a constant value.
Example:
k = 12345
A = 0.357840
M = 100
h(12345) = floor[ 100 (12345*0.357840 mod 1)]
= floor[ 100 (4417.5348 mod 1) ]
= floor[ 100 (0.5348) ]
= floor[ 53.48 ]
= 53
Pros:
The advantage of the multiplication method is that it can work with any value
between 0 and 1, although there are some values that tend to give better results
than the rest.
Cons:
The multiplication method is generally suitable when the table size is the power
of two, then the whole process of computing the index by the key using
multiplication hashing is very fast.
SECURE HASH ALGORITHM (SHA)MESSAGE
AUTHENTICATION:
SHA Introduction
Secure Hashing Algorithm, or SHA. Data and certificates are hashed with SHA, a
modified version of MD5. By using bitwise operations, modular additions, and
compression functions, a hashing algorithm reduces the input data into a smaller
form that is impossible to comprehend. Can hashing be cracked or decrypted, you
may wonder? The main distinction between hashing and encryption is that hashing
is one-way; once data has been hashed, the resultant hash digest cannot be decrypted
unless a brute force assault is applied. See the illustration below to see how the SHA
algorithm functions.
SHA is designed to provide a different hash even if only one character in the message
changes. As an illustration, consider combining the themes Heaven and Heaven Is
Different. The only difference between a capital and tiny letter, though, is size
The first message is hashed using SHA-1 to get the hash digest
"06b73bd57b3b938786daed820cb9fa4561bf0e8e". The hash digest for the second,
analogous message will look like "66da9f3b8d9d83f34770a14c38276a69433a535b"
if it is hashed with SHA-1. The avalanche effect is what is known for this. This
phenomenon is crucial for cryptography since it implies that even the smallest
alteration to the message being entered entirely alters the output. As a result,
attackers won't be able to decipher what the hash digest initially said or determine
whether the message was altered while in route and inform the message's recipient.
SHAs can aid in identifying any modifications made to an original message. A user
can determine whether even one letter has been altered by consulting the original
hash digest since the hash digests will be entirely different. The fact that SHAs are
deterministic is one of their key features. This implies that any machine or user may
reproduce the hash digest if they know the hash algorithm that was used. Every SSL
certificate on the Internet must have been hashed with the SHA-2 procedure because
of the determinism of SHAs.
Numerous SHA variants are mentioned while discussing SHA forms. There are only
two kinds of SHA-SHA-1 and SHA-2-but they go by several names, such as SHA-
1, SHA-2, SHA-256, SHA-512, SHA-224, and SHA-384. The other higher numbers,
such as SHA-256, are merely SHA-2 variants that include information on the bit
lengths of SHA-2. The first secure hashing algorithm was SHA-1, which produced
a 160-bit hash digest as a result of hashing. Can SHA-2 be cracked like SHA-1, one
may wonder? Yes, it is the solution. SHA-1 is easier to brute force than SHA-2
because to the shorter length of the hash digest, however SHA-2 can also be done.
Due to the limited amount of possible combinations that can be made with 160 bits,
another problem with SHA-1 is that it can provide the same hash digest for two
distinct values. All certificates must utilize SHA-2 since it provides each digest with
a unique value under SHA-2.
SHA-2 can generate hash digests with bit lengths ranging from 256 to 512, giving
each one a fully unique result. When two values have the same hash digest, collisions
happen. Because SHA-1 is prone to collisions, it is simpler for attackers to find two
digests that match and reconstitute the original plaintext. Since 2016, SHA-2, which
is far more secure than SHA-1, has been needed in all digital signatures and
certificates. The most secure hash method is SHA-2 since common assaults like
brute force attacks can take years or even decades to decrypt the hash digest.
Secure Hashing Algorithms (SHAs), as was already noted, are used for a variety of
purposes and must be included in all digital signatures and certificates for SSL/TLS
connections. SHAs are also used by programs like IPsec, SSH, and S-MIME (Secure
/ Multipurpose Internet Mail Extensions). Additionally, passwords are hashed using
SHAs so that the server only has to remember the hashes and not the actual
passwords. As a result, if a database holding all the hashes were stolen, an attacker
would not only lack direct access to all the plaintext passwords but would also need
to figure out how to break the hashes in order to utilize the passwords. SHAs can
also serve as markers for the consistency of a file.
Now that we are aware of the purposes of SHAs, we must ask ourselves: why would
anyone ever employ a Secure Hashing Algorithm? Their capacity to repel invaders
is a frequent justification. Although some techniques, such as brute force assaults,
can disclose the plaintext of the hash digests, SHAs make these strategies very
challenging. A basic password may deter many attackers since a password encoded
by a SHA-2 algorithm might take years or even decades to crack. The distinctness
of each hash digest is another justification for using SHAs. The hash digest might
be totally altered by changing just one word in a message if SHA-2 is used since
there are likely to be few to no collisions.
The Secure Hashing Algorithm cannot be broken by the attacker since there are few
or no collisions, making it difficult to identify a pattern. These are only a few
explanations for why SHA is employed so frequently.
SHA-2 is now the industry standard for hashing algorithms, although SHA-3 may
eventually overtake it. The NIST, which also developed SHA-1 and SHA-2,
produced SHA-3 in 2015; but, for a variety of reasons, it was not adopted as the
industry standard. Since most businesses were transitioning from SHA-1 to SHA-2
at the time of SHA-3's introduction, it did not make sense to convert to SHA-3
immediately away while SHA-2 was still quite secure. Additionally, SHA-3 was
perceived as being slower than SHA-2, albeit this is not entirely accurate. Although
SHA-3 is slower on the software side than SHA-1 and SHA-2, it is substantially
quicker on the hardware side and gets faster every year.
MAC stands for Message Authentication Code. Here in MAC, sender and
receiver share same key where sender generates a fixed size output called
Cryptographic checksum or Message Authentication code and appends it to the
original message. On receiver’s side, receiver also generates the code and
compares it with what he/she received thus ensuring the originality of the
message. These are components:
• Message
• Key
• MAC algorithm
• MAC value
There are different types of models Of Message Authentication Code (MAC) as
following below:
MAC without encryption –
This model can provide authentication but not confidentiality as anyone can see
the message.
Internal Error Code –
In this model of MAC, sender encrypts the content before sending it through
network for confidentiality. Thus, this model provides confidentiality as well as
authentication.
Limitations of MAC
There are two major limitations of MAC, both due to its symmetric nature of
operation −
• Establishment of Shared Secret.
o It can provide message authentication among pre-decided legitimate
users who have shared key.
o This requires establishment of shared secret prior to use of MAC.
• Inability to Provide Non-Repudiation
o Non-repudiation is the assurance that a message originator cannot deny
any previously sent messages and commitments or actions.
o MAC technique does not provide a non-repudiation service. If the
sender and receiver get involved in a dispute over message origination,
MACs cannot provide a proof that a message was indeed sent by the
sender.
o Though no third party can compute the MAC, still sender could deny
having sent the message and claim that the receiver forged it, as it is
impossible to determine which of the two parties computed the MAC.
o Authentication
o Non-repudiation
o Integrity
Authentication:
Authentication is a process which verifies the identity of a user who wants to access
the system. In the digital signature, authentication helps to authenticate the sources
of messages.
Non-repudiation:
Integrity:
Integrity ensures that the message is real, accurate and safeguards from unauthorized
user modification during the transmission.
The key generation algorithm selects private key randomly from a set of possible
private keys. This algorithm provides the private key and its corresponding public
key.
2. Signing algorithm
Digital signatures are created and verified by using public key cryptography, also
known as asymmetric cryptography. By the use of a public key algorithm, such as
RSA, one can generate two keys that are mathematically linked- one is a private key,
and another is a public key.
The user who is creating the digital signature uses their own private key to encrypt
the signature-related document. There is only one way to decrypt that document is
with the use of signer's public key.
This technology requires all the parties to trust that the individual who creates the
signature has been able to keep their private key secret. If someone has access the
signer's private key, there is a possibility that they could create fraudulent signatures
in the name of the private key holder.
The certified digital signature documents display a unique blue ribbon across the top
of the document. The certified signature contains the name of the document signer
and the certificate issuer which indicate the authorship and authenticity of the
document.
Approval Signatures
The visible digital signature allows a user to sign a single document digitally. This
signature appears on a document in the same way as signatures are signed on a
physical document.
The invisible digital signatures carry a visual indication of a blue ribbon within a
document in the taskbar. We can use invisible digital signatures when we do not
have or do not want to display our signature but need to provide the authenticity of
the document, its integrity, and its origin.
CLASSIFICATION OF CYBERCRIMES:
Cybercrime or a computer-oriented crime is a crime that includes a computer
and a network. The computer may have been used in the execution of a crime or
it may be the target. Cybercrime is the use of a computer as a weapon for
committing crimes such as committing fraud, identity theft, or breaching privacy.
Cybercrime, especially through the Internet, has grown in importance as the
computer has become central to every field like commerce, entertainment, and
government. Cybercrime may endanger a person or a nation’s security and
financial health. Cybercrime encloses a wide range of activities, but these can
generally be divided into two categories:
1. Crimes that aim at computer networks or devices. These types of crimes
involve different threats (like virus, bugs etc.) and denial-of-service
(DoS) attacks.
2. Crimes that use computer networks to commit other criminal activities.
These types of crimes include cyber stalking, financial fraud or identity
theft.
Classification of Cyber Crime:
1. Cyber Terrorism –
Cyber terrorism is the use of the computer and internet to perform
violent acts that result in loss of life. This may include different type of
activities either by software or hardware for threatening life of citizens.
In general, Cyber terrorism can be defined as an act of terrorism
committed through the use of cyberspace or computer resources.
2. Cyber Extortion –
Cyber extortion occurs when a website, e-mail server or computer
system is subjected to or threatened with repeated denial of service or
other attacks by malicious hackers. These hackers demand huge money
in return for assurance to stop the attacks and to offer protection.
3. Cyber Warfare –
Cyber warfare is the use or targeting in a battle space or warfare context
of computers, online control systems and networks. It involves both
offensive and defensive operations concerning to the threat of cyber-
attacks, espionage and sabotage.
4. Internet Fraud –
Internet fraud is a type of fraud or deceit which makes use of the
Internet and could include hiding of information or providing incorrect
information for the purpose of deceiving victims for money or property.
Internet fraud is not considered a single, distinctive crime but covers a
range of illegal and illicit actions that are committed in cyberspace.
2. Anonymity-
Those who Commit cybercrime are anonymous for us so we cannot do
anything to that person.
PLANNING OF ATTACKS
SOCIAL ENGINEERING:
Hackers try to exploit the user's knowledge. Thanks to technology's speed, many
consumers and employees are not aware of specific threats such as drive-by
downloads. Users cannot realize the value of personal data like phone number.
Many users are unsure of how best to protect themselves and their confidential
information. Social engineering attackers have two goals:
The attack cycle gives the criminals a reliable process to deceive you. The stages of
the social engineering attack cycle are below:
o Prepare by gathering background information on a large group.
o Infiltrate by building trust, establishing a relationship or starting a
conversation.
o Establish the victim once more to confront the attack with confidence and
weakness.
o Once the user takes the desired action, release it.
Many employees and consumers are unaware that certain information can give
hackers access to multiple networks and accounts.
High emotions: Emotional manipulation gives attackers the upper hand in any
conversation. The below feelings are used equally to explain to you.
o Fear
o excitement
o Curiosity
o Anger
o Crime
o Sadness
1. Technology-based attacks
A technology-based approach tricks a user into believing that he is
interacting with a ‘real’ computer system and convinces him to provide
confidential information. For example, the user will get a popup window informing
him that the computer application has had a problem and needs immediate fixing.
It will tell the user to reauthenticate a computer application to proceed. As the
user proceeds to reauthenticate, the user provides his ID and password on the
popup window itself. Once they enter the necessary credentials for authentication,
the harm is done.
The hacker or the criminal who created the popup window now has access to
the user’s ID and password and can, therefore, access their network and computer
system.
2. Human interaction-based attacks
In a human interaction-based approach, the victim’s unawareness is exploited
to attack the system or network. This is typically accomplished whereby the
attacker pretends to be a person or authority the victim already knows while hiding
their true identity.
3. Hybrid attacks
Hybrid attacks are the most common form of cyberattacks, where the attacker
uses both technology and human interactions as platforms for conducting the social
engineering attack.
UNIT V CYBER THREATS, ATTACKS AND PREVENTION
Phishing, Password cracking, Keyloggers and Spywares, DoS and DDoS attacks,
SQL Injection Identity Theft (ID) : Types of identity theft, Techniques of ID theft-
SECURITY writing security policies, Internet and email security policies,
Compliance and Enforcement of policies.
PHISHING:
Phishing is one type of cyber attack. Phishing got its name from “phish” meaning
fish. It’s a common phenomenon to put bait for the fish to get trapped. Similarly,
phishing works. It is an unethical way to dupe the user or victim to click on harmful
sites. The attacker crafts the harmful site in such a way that the victim feels it to be
an authentic site, thus falling prey to it. The most common mode of phishing is by
sending spam emails that appear to be authentic and thus, taking away all
credentials from the victim. The main motive of the attacker behind phishing is to
gain confidential information like
• Password
• Credit card details
• Social security numbers
• Date of birth
The attacker uses this information to further target the user and impersonate the
user and cause data theft. The most common type of phishing attack happens
through email. Phishing victims are tricked into revealing information that they
think should be kept private. The original logo of the email is used to make the user
believe that it is indeed the original email
PASSWORD CRACKING:
Password cracking is one of the imperative phases of the hacking framework.
Password cracking is a way to recuperate passwords from the information stored
or sent by a PC or mainframe. The motivation behind password cracking is to
assist a client with recuperating a failed authentication or recovering a password,
as a preventive measure by framework chairmen to check for effectively weak
passwords, or an assailant can utilize this cycle to acquire unapproved framework
access.
Types of Password Attacks:
Password cracking is consistently violated regardless of the legal aspects to
secure from unapproved framework access, for instance, recovering a password
the customer had forgotten etc. This hack arrangement depends upon aggressors’
exercises, which are ordinarily one of the four types:
1. Non-Electronic Attacks –
This is most likely the hacker’s first go-to to acquire the target system
password. These sorts of password cracking hacks don’t need any
specialized ability or information about hacking or misuse of
frameworks. Along these lines, this is a non-electronic hack. A few
strategies used for actualizing these sorts of hacks are social
engineering, dumpster diving, shoulder surfing, and so forth.
2. Active Online Attacks –
This is perhaps the most straightforward approach to acquire
unapproved manager-level mainframe access. To crack the passwords, a
hacker needs to have correspondence with the objective machines as it
is obligatory for password access. A few techniques used for actualizing
these sorts of hacks are word reference, brute-forcing, password
speculating, hash infusion, phishing, LLMNR/NBT-NS Poisoning,
utilizing Trojan/spyware/keyloggers, and so forth.
3. Passive Online Attacks –
An uninvolved hack is a deliberate attack that doesn’t bring about a
change to the framework in any capacity. In these sorts of hacks, the
hacker doesn’t have to deal with the framework. In light of everything,
he/she idly screens or records the data ignoring the correspondence
channel to and from the mainframe. The attacker then uses the critical
data to break into the system. Techniques used to perform passive
online hacks incorporate replay attacks, wire-sniffing, man-in-the-
middle attack, and so on.
4. Offline Attacks –
Disconnected hacks allude to password attacks where an aggressor
attempts to recuperate clear content passwords from a password hash
dump. These sorts of hacks are habitually dreary yet can be viable, as
password hashes can be changed due to their more modest keyspace and
more restricted length. Aggressors utilize preprocessed hashes from
rainbow tables to perform disconnected and conveyed network hacks.
Some of the best practices protecting against password cracking include:
1. Perform data security reviews to screen and track password assaults.
2. Try not to utilize a similar password during the password change.
3. Try not to share passwords.
4. Do whatever it takes not to use passwords that can be found in a word
reference.
5. Make an effort not to use clear content shows and shows with weak
encryption.
6. Set the password change technique to 30 days.
7. Try not to store passwords in an unstable area.
8. Try not to utilize any mainframes or PC’s default passwords.
9. Unpatched computers can reset passwords during cradle flood or Denial
of Service assaults. Try to refresh the framework.
10.Empower account lockout with a specific number of endeavors, counter
time, and lockout span. One of the best approaches to oversee
passwords in associations is to set a computerized password reset.
11.Ensure that the computer or server’s BIOS is scrambled with a
password, particularly on devices that are unprotected from real perils,
for instance, centralized servers and PCs.
It is unknowingly installing
It is unknowingly attached with
the product when they install
5. free to use software, distributed
some other software or
through pop-up windows.
freeware.
DOS DDOS
In Dos attack single system targets In DDoS multiple systems attacks the
the victim system. victim’s system.
Victim PC is loaded from the packet Victim PC is loaded from the packet of
of data sent from a single location. data sent from Multiple location.
In DOS Attack only single device is In DDoS attack, the volume Bots are
used with DOS Attack tools. used to attack at the same time.
DOS Attacks are Easy to trace. DDOS Attacks are Difficult to trace.
1) It increases efficiency
The best thing about having a policy is being able to increase the level of consistency
which saves time, money and resources. The policy should inform the employees
about their individual duties, and telling them what they can do and what they cannot
do with the organization sensitive information.
When any human mistake will occur, and system security is compromised, then the
security policy of the organization will back up any disciplinary action and also
supporting a case in a court of law. The organization policies act as a contract which
proves that an organization has taken steps to protect its intellectual property, as well
as its customers and clients.
We use security policies to manage our network security. Most types of security
policies are automatically created during the installation. We can also customize
policies to suit our specific environment. There are some important cybersecurity
policies recommendations describe below-
o It helps to detect, removes, and repairs the side effects of viruses and security
risks by using signatures.
o It helps to detect the threats in the files which the users try to download by
using reputation data from Download Insight.
o It helps to detect the applications that exhibit suspicious behavior by using
SONAR heuristics and reputation data.
2. Firewall Policy
o It blocks the unauthorized users from accessing the systems and networks that
connect to the Internet.
o It detects the attacks by cybercriminals.
o It removes the unwanted sources of network traffic.
This policy automatically detects and blocks the network attacks and browser
attacks. It also protects applications from vulnerabilities. It checks the contents of
one or more data packages and detects malware which is coming through legal ways.
This policy can be categorized into two types one is Live Update Content policy,
and another is Live Update Setting Policy. The Live Update policy contains the
setting which determines when and how client computers download the content
updates from Live Update. We can define the computer that clients contact to check
for updates and schedule when and how often client’s computer check for updates.
This policy protects a system's resources from applications and manages the
peripheral devices that can attach to a system. The device control policy applies to
both Windows and Mac computers whereas application control policy can be applied
only to Windows clients.