0% found this document useful (0 votes)
27 views16 pages

CIS_4520_Exam_Review_Topics_Summary

The document provides a comprehensive overview of information and network security principles, including confidentiality, integrity, authentication, non-repudiation, and availability. It covers various cryptographic methods, including symmetric and asymmetric key cryptography, hash functions, and key management strategies, while also addressing common threats and attacks. Additionally, it discusses the importance of authentication protocols and the Kerberos authentication system for secure communications.

Uploaded by

daralash417
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views16 pages

CIS_4520_Exam_Review_Topics_Summary

The document provides a comprehensive overview of information and network security principles, including confidentiality, integrity, authentication, non-repudiation, and availability. It covers various cryptographic methods, including symmetric and asymmetric key cryptography, hash functions, and key management strategies, while also addressing common threats and attacks. Additionally, it discusses the importance of authentication protocols and the Kerberos authentication system for secure communications.

Uploaded by

daralash417
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

CIS*4520 - INTRODUCTION TO CRYPTOGRAPHY

FINAL EXAM REVIEW SUMMARY

INTRODUCTION TO INFORMATION AND NETWORK SECURITY

Basic Goals of Information and Network Security

The primary objectives of information and network security are to ensure that data, devices, and
services are protected against unauthorized access and harm. These objectives are
encapsulated in the following principles:

1. Confidentiality: Ensuring that information is accessible only to those authorized to have


access. It protects sensitive information from unauthorized disclosure, aiming to
preserve the privacy of users and data
2. Integrity: Ensuring that information is accurate and complete and that it has not been
tampered with. Integrity protection mechanisms detect unauthorized changes made to
data, either during storage or transmission.
3. Authentication: Verifying the identity of users, devices, or network entities, usually
through credentials, such as passwords, biometrics, or digital certificates. Authentication
confirms that users are who they claim to be.
4. Non-repudiation: Ensuring that a party in a communication cannot deny the authenticity
of their signature on a message or the sending of a message that they originated. This is
typically achieved through digital signatures and audit trails.
5. Availability: Ensuring that information systems are accessible and usable upon demand
by an authorized entity. This involves protecting the system against attacks that could
reduce system availability, such as denial-of-service (DoS) attacks.

Common Threat/Attack Models


Understanding the different types of threats and attacks is crucial for developing effective
security measures. Threats and attacks can generally be classified as either passive or active:

1. Passive Attacks:
● Description: In a passive attack, the attacker intercepts data traveling through
the network but does not alter the content of the data. The goal is typically to
gather information that is being transmitted.
● Examples:
● Eavesdropping or sniffing: Listening to private conversations or reading
confidential data.
● Traffic analysis: Analyzing the flow of packets to predict the nature of
communication, locations, or identities of communicating hosts.
● Violations of Security Services:
● Confidentiality: Since passive attacks primarily involve observation or
data analysis, the main security service violated is confidentiality.
2. Active Attacks:
● Description: In active attacks, the attacker injects or alters data to disrupt normal
operations or to stage more serious attacks such as executing unauthorized
commands.
● Examples:
● Masquerade (Spoofing): Pretending to be another user to gain
unauthorized access.
● Replay Attacks: Re-transmitting valid data repeatedly to disrupt services
or gain unauthorized access.
● Modification of Messages: Altering the actual content of messages sent
from one person to another.
● Denial of Service (DoS): Intentionally overwhelming a network or system
to prevent legitimate use.
● Violations of Security Services:
● Integrity and Availability: These attacks aim to corrupt or obliterate data
and interrupt services, impacting both integrity and availability.
● Authentication and Non-repudiation: By impersonating users or
modifying data, attackers compromise authentication and non-repudiation
measures.

INTRODUCTION TO CRYPTOGRAPHY

Classical Cryptography and Communication Schematic


● Schematic of Secure Communication Over an Insecure Channel: Involves encrypting
data before it is sent over the channel so that even if intercepted, it cannot be
understood without the decryption key. Classical schemes used mechanisms like
substitution or transposition to obscure the original message.

Basic Modular Arithmetic


● Modular Addition, Multiplication, Exponentiation: Operations are performed with a
modulus, meaning the result is the remainder when the absolute result is divided by the
modulus. For instance, in modular addition, a+b mod n is the remainder of a+b divided
by n.
● Euler’s Totient Theorem: Provides a way to determine the number of integers up to a
given integer n that are coprime to n.
● Euclid’s Algorithm: An efficient method for computing the greatest common divisor
(GCD) of two numbers.
● Extended Euclidean Algorithm: Extends Euclid's algorithm to also find integers
● x and y (Bezout coefficients) such that ax + by = GCD(a,b).
Early Ciphers
● Shift Cipher: Each letter in the plaintext is shifted a certain number of places down or up
the alphabet.
● Substitution Cipher: Each letter in the plaintext is mapped to another letter.
● Vigenère Cipher: Uses a keyword to determine the shift for each letter in the plaintext.
● Permutation Cipher: Rearranges the letters of the plaintext according to a defined
system.
● One-time Pad: Uses a random key that is as long as the message, ensuring perfect
secrecy if the key is used only once and kept secure.
● Block vs. Stream Ciphers:
● Block Ciphers: Encrypt data in fixed-size blocks (e.g., 128 or 256 bits) using
deterministic algorithms.
● Stream Ciphers: Encrypt data one byte or bit at a time, often using keystream
generators.

Cryptanalysis: Index of Coincidence


● Index of Coincidence: A statistical measure of text that reflects the probability that two
randomly selected letters in the text are the same. It's used in cryptanalysis to determine
the likely length of the keyword in a Vigenère cipher.

Three Types of Cryptography


● Secret Key Cryptography (Symmetric): Uses the same key for both encryption and
decryption. Aims to ensure confidentiality.
● Public Key Cryptography (Asymmetric): Uses a pair of keys, a public key for
encryption, and a private key for decryption. It facilitates confidentiality, digital signatures,
and key exchange.
● Hash Functions: Produces a fixed-size hash value from variable-sized input data,
typically used for data integrity checks. They provide integrity and authentication when
combined with a key (HMAC).

SHANNON’S APPROACH TO CRYPTOGRAPHY

Basic Probability Calculations


● Essential for determining the likelihood of successful decryption or breaking of
the cipher.

Perfect Secrecy
● Definition: A cryptosystem has perfect secrecy if the ciphertext does not reveal any
information about the plaintext.
● Testing Perfect Secrecy: If the probability distribution of the plaintext is independent of
the distribution of the ciphertext, the system is perfectly secure.

One-time Pad
● Construction: Generated randomly and should be as long as the message needing
encryption.
● XOR Operation: Each bit of the plaintext is XORed with the corresponding bit of the key
to produce the ciphertext.
● Perfect Secrecy: Achieved because the ciphertext is random if the key is truly random
and used only once.
● Pros and Cons:
● Pros: Unbreakable when used correctly.
● Cons: Practical implementation issues such as key distribution and storage,
making it less feasible for general use.

SYMMETRIC KEY CRYPTOGRAPHY

Substitution-Permutation Networks
● General Structure: SPNs are a method of designing block ciphers by combining both
substitution (replacing bits, bytes, or blocks of input with different bits, bytes, or blocks)
and permutation (rearranging the bits or bytes of input). This process usually involves
several rounds of substitution and permutation to enhance security.
● Purpose: The structure provides diffusion and confusion which are essential properties
of secure encryption. Diffusion spreads the influence of a single plaintext bit over many
ciphertext bits to hide statistical properties of the plaintext. Confusion makes the
relationship between the ciphertext and the symmetric key as complex as possible.

DES (Data Encryption Standard)


● Feistel Structure: A method used in many block cipher designs including DES. It
divides the text to be encrypted into two halves, processing one half with a round
function and then XORing the output with the other half. The halves are then swapped.
This process repeats for multiple rounds.
● Round Function (S-Boxes and Permutation): In DES, the round function includes
expansion, substitution using S-Boxes that provide non-linearity, and permutation to
provide diffusion.
● Key Length: DES uses a 56-bit key, which by modern standards is considered too short
and susceptible to brute-force attacks.
● Enhancing Security with Triple DES: Uses three iterations of DES with two or three
different keys, in a pattern of encrypt-decrypt-encrypt (EDE). This increases the effective
key length and security.
● Meet-in-the-Middle Attack: An attack that exploits the vulnerability in using two stages
of encryption (double DES) by analyzing the middle stage. It is ineffective against Triple
DES due to its three stages of encryption.

Modes of Encryption
● ECB (Electronic Codebook)
● Pros: Simple, parallelizable.
● Cons: Identical plaintext blocks are encrypted into identical ciphertext blocks; not
suitable for data longer than one block.
● CBC (Cipher Block Chaining)
● Pros: Each block of plaintext is XORed with the previous ciphertext block before
being encrypted.
● Cons: Not parallelizable; an error in one block affects subsequent blocks.
● CFB (Cipher Feedback)
● Pros: Turns a block cipher into a stream cipher; errors do not propagate.
● Cons: Slightly more complex; sequential operations hinder parallelization.
● OFB (Output Feedback)
● Pros: Turns a block cipher into a stream cipher; errors do not propagate.
● Cons: Requires synchronization of feedback operation between sender and
receiver.
● CTR (Counter)
● Pros: Encrypts counters rather than plaintext or ciphertext, allowing for
parallelization.
● Cons: Requires a secure counter value that should never be reused.
● Protecting Message Integrity with MACs: A MAC is used to verify the integrity and
authenticity of a message. It is attached to the message and verified at the receiver
using the same secret key to detect any changes or tampering.

HASHES AND MESSAGE DIGEST

Properties of Cryptographic Hash Functions


● One-way Property: It should be computationally infeasible to find any input that maps to
a given output.
● Collision Resistance: It should be hard to find two different inputs that produce the
same output.
● Randomness: Output should appear random and uniformly distributed.

Keyed Hash Function


● Construction: Combines a secret key with the hash of the message. It can be
constructed by prefixing, postfixing, or enveloping the message with the key before
hashing.
Applications
● Integrity Checks: Ensures data has not been altered.
● Authentication: Verifies identity when combined with a known secret.
● Commitment Protocols: Securely commits to a chosen value while keeping it hidden.
● Combining Hash with Encryption: For confidentiality and authentication/integrity,
encrypt the message and then generate a MAC or hash the encrypted message and
send both.

PUBLIC KEY CRYPTOGRAPHY

Basic Concepts
● Public Key Encryption: Uses a public key for encryption and a private key for
decryption.
● Digital Signatures: Uses a private key to sign and a public key to verify.

RSA Cryptosystem
● Key Generation: Large prime numbers are selected and multiplied to form a modulus
for both keys. The public key exponent is chosen, and the private key exponent is
computed to be the modular inverse of the public key exponent.
● Encryption/Decryption: Messages are raised to the power of the public or private
exponent modulo the large prime product.
● Vulnerabilities: Textbook RSA is vulnerable to a range of attacks, including chosen
plaintext attacks if padding schemes are not used.

Digital Signature Schemes


● Security Requirements: Non-repudiation, integrity, and authenticity.
● Hash and Sign: The message is first hashed, and then the hash is encrypted (signed)
using a private key. The recipient can verify the hash with the signer's public key.
● Applications: Ensuring the integrity and authenticity of a message, and securely
combining signatures with encryption involves using a combination of both cryptographic
methods to achieve confidentiality and integrity/authenticity.

KEY MANAGEMENT

Key Pre-distribution: KDCs and CAs


Why KDCs and CAs are Needed:
● Key Distribution Center (KDC) is crucial in environments where symmetric key
cryptography is used. It manages the secure distribution of secret keys to parties in a
communication network.
● Certificate Authorities (CAs) play a fundamental role in public key infrastructure (PKI),
as they issue digital certificates to verify the ownership of a public key by the named
subject of the certificate. This helps prevent impersonation and other forms of online
identity fraud.

Key Distribution/Management with KDCs or CAs:

● KDCs distribute session keys to parties that have shared secret keys established during
an initial registration phase with the KDC. For instance, in Kerberos, the KDC provides
tickets that include session keys for secure communication.
● CAs distribute public keys embedded in digital certificates. They validate the identity of
the certificate requester before issuing a certificate. This ensures that the public key
belongs to the entity it claims to represent.

Information in Tickets/Certificates:

● Ticket (Kerberos): Includes the client's ID, network address, ticket validity period, and a
session key, all encrypted with the server's secret key.
● Certificate (CA): Includes the public key, certificate owner’s name, the CA’s name, the
digital signature of the CA, and the certificate's period of validity.

Session Key Establishment: Diffie-Hellman Key Agreement


How It Works:
Diffie-Hellman key agreement allows two parties to establish a shared secret over an insecure
channel. This secret can then be used as a key for symmetric cryptography. Each party
generates a public/private key pair, exchanges the public key, and uses its private key with the
received public key to compute the shared secret.

Security Against Eavesdroppers:

Diffie-Hellman relies on the difficulty of solving the discrete logarithm problem to secure the key
exchange against eavesdroppers. An eavesdropper would need to determine the private key
from the public key and shared parameters, which is computationally infeasible with sufficiently
large key sizes.

Vulnerability to Man-in-the-Middle Attacks:

If an attacker can intercept and alter public keys sent between the communicating parties, they
can insert their own keys, masquerade as both sender and receiver, and decrypt or manipulate
messages.
Mitigation Strategies:

To protect against man-in-the-middle attacks, parties should authenticate each other's public
keys. This can be achieved through digital signatures and certificates issued by trusted CAs.

Public Key Infrastructure and Certificate Chains


Finding a Chain of Trust:
In PKI, a certificate chain leads from a trusted root CA down to the presented certificate via
intermediate CAs. Each certificate in the chain is signed by the next, up to the root CA which is
self-signed and trusted implicitly.

● To validate a certificate chain, each certificate’s issuer's public key is used to verify the
digital signature of the next certificate, ensuring all certificates in the chain are valid and
trusted.

AUTHENTICATION

Challenges and Strategies


● Phishing/Social Engineering: Educate users on the dangers of phishing and
implement multi-factor authentication.
● Password Attacks: Use strong, complex passwords, and consider implementing
account lockout policies after several failed attempts.

Information Used in Authentication


● What You Know: Something only the user knows (e.g., password, PIN).
● What You Have: Something only the user possesses (e.g., smartphone, hardware
token).
● What You Are: Something unique about the user (e.g., fingerprints, facial recognition).

Authentication Protocol Design Principles


● One-Way Authentication: Only one party proves their identity to another.
● Mutual Authentication: Both parties prove their identity to each other.

Common Attacks and Defenses:

● Replay Attack: An attacker captures a valid data transmission and retransmits it.
Defense: Use timestamps and nonce values that are checked for freshness.
● Man-in-the-Middle Attack: An attacker intercepts messages between two parties
without their knowledge. Defense: Employ end-to-end encryption and validate public
keys through trusted CAs.
KERBEROS V4/V5

Function and Security Services Provided by Kerberos:


Kerberos is a network authentication protocol designed to provide strong authentication for
client/server applications using secret-key cryptography. Key security services provided include:

● Authentication: Ensures that users are who they claim to be.


● Authorization Data: Transmits authorization data that contains information about user
permissions.
● Confidentiality and Integrity: By using secret keys during sessions to encrypt and hash
communications.

Basic System Configuration and Authentication Mechanisms:

● Key Distribution Center (KDC): Central authority that provides temporary session keys
and tickets to users. It has two parts: the Authentication Server (AS) and the Ticket
Granting Server (TGS).
● Long-term Authentication Key: Derived from the user's password and stored on both
the client machine and the KDC.
● Session Key: Temporary key issued by the KDC, used to encrypt communications
during a login session.
● Ticket: A time-stamped, encrypted block of data that proves the user’s identity to other
machines on the network.
● Ticket-Granting Ticket (TGT): Issued by the AS when a user first authenticates, used
to obtain further service-specific tickets from the TGS.
● Authenticator: A piece of data that proves its creator’s identity, typically includes the
client’s ID and timestamp, encrypted with the session key.
● Credential: Includes tickets and associated session keys provided to the client for
accessing various network services securely.

IPSec

Motivation of IPSec:
IPSec is designed to protect communications over IP networks by authenticating and encrypting
each IP packet of a communication session. The primary motivation is to defend against various
IP-level attacks such as:

● IP Spoofing: Falsifying the packet’s source IP address to gain unauthorized access or


to impersonate another sending host.

Two Protocols in IPSec:


● Authentication Header (AH): Provides source authentication and data integrity but not
encryption. AH ensures that the packet has not been tampered with in transit.
● Encapsulating Security Payload (ESP): Provides confidentiality, source authentication,
and data integrity. ESP encrypts the payload data of packets.

Operation Modes:

● Transport Mode: Encrypts only the payload of the IP packet, not the header. Suitable
for end-to-end communications between a client and server.
● Tunnel Mode: Encrypts both the payload and the header. Used for network-to-network
communications (e.g., between gateways) or from end-to-host communications, such as
remote user access to a corporate network.

Process Applied to Packets:

● AH: Adds a new header between the IP header and the payload, providing integrity and
authentication but leaves some parts of the IP header unprotected.
● ESP: Encapsulates the original packet, encrypts it, and adds a new header and trailer to
the packet for handling security processing.

SSL/TLS

Security Services Provided by SSL/TLS:

● Authentication: Ensures that parties are who they claim to be.


● Confidentiality: Encrypts data to keep it confidential between the communicating
parties.
● Integrity: Maintains data integrity during transmission.

Mechanisms Used:

● Server Authentication: Typically involves certificates issued by trusted Certificate


Authorities (CA).
● Client Authentication: Optional feature in SSL/TLS where clients also present
certificates to the server.
● Key Establishment: Negotiated during the handshake process, using asymmetric
encryption to establish a symmetric session key.

Comparison of Kerberos, IPSec, and SSL/TLS:

● Kerberos: Used primarily within trusted domains, such as within a corporate


environment, focusing on authentication and ticketing.
● IPSec: Operates at the network layer, suitable for securing all traffic between two hosts,
networks, or between a host and a network. Provides comprehensive security for IP
traffic.
● SSL/TLS: Operates at the transport layer, designed primarily for securing HTTP traffic
but can secure other types of traffic. Used extensively for secure browsing and other
end-to-end communications between clients and servers.

FIREWALLS

Firewalls serve as a fundamental line of defense in network security, designed to block


unauthorized access while permitting authorized communications. They can be configured to
manage both inbound and outbound traffic based on predetermined security rules. Here’s an
overview of the different types of firewalls and how firewall rules are applied:

Types of Firewalls
1. Stateless Packet Filtering Firewall
● Functionality: This type of firewall examines each incoming packet and decides
whether to allow it through based on a set of established rules. It does this
without regard to the packets that have passed before; each packet is processed
in isolation.
● Advantages: Fast processing as it does not keep track of state information.
● Disadvantages: Less secure compared to stateful firewalls as it does not
recognize packet patterns or data streams associated with known attacks.
2. Stateful Packet Filtering Firewall
● Functionality: Unlike stateless firewalls, stateful firewalls keep track of the state
of network connections (such as TCP streams) and can make decisions based
on the context provided by this state. This allows them to recognize and block
packets that are part of a previously established connection.
● Advantages: Greater security by monitoring the state of active connections and
blocking packets that deviate from expected patterns.
● Disadvantages: Slower processing compared to stateless filtering due to the
overhead of tracking connection states.
3. Application-Level Firewall (also known as a Proxy Firewall)
● Functionality: These firewalls work at the application layer of the OSI model,
inspecting the data being sent and received through applications to ensure it
complies with the protocol standards. They can filter traffic based on specific
application data contained in the packets.
● Advantages: Provides a deep level of inspection and can prevent a wide range
of exploits by understanding the specifics of application protocol logic.
● Disadvantages: Higher latency in network responses and increased complexity
in management. Requires more resources which can affect performance.

Firewall Rules
Firewall rules are the policies that dictate whether traffic should be allowed or blocked based on
specific criteria such as IP addresses, protocol, port numbers, and other packet attributes.
Proper understanding and application of these rules are critical for maintaining network security.

● Defining Rules: Rules can be as simple as blocking a single IP address from accessing
a network or as complex as only allowing HTTPS traffic during business hours from
specific network segments.
● Order of Rules: Firewall rules are processed in a sequential manner from top to bottom.
This means the first rule that matches a data packet will be applied, and subsequent
rules are ignored. It’s crucial to order the rules correctly to avoid unintended access or
blockages.
● Best Practices:
● Default Deny: Implement a policy where access is denied by default, and only
specified traffic is allowed based on explicit rules. This minimizes the risk of
unintended network access.
● Specificity: Start with more specific rules at the top of the policy and more
general rules at the bottom.
● Regular Updates and Audits: Continually review and update firewall rules to
adapt to new threats, remove obsolete rules, and adjust for any network
changes.

INTRUSION DETECTION SYSTEMS (IDS)

Intrusion Detection Systems are essential tools in the realm of network security, designed to
detect unauthorized access, misuse, or breach of a computer system. IDS can be categorized
based on the detection methods they employ. Here’s an overview of the basic methods:

1. Statistical Anomaly Detection


● How it Works: This method involves creating a baseline of normal activity patterns for
the system and then comparing ongoing activities to this baseline. Any significant
deviation from the baseline is flagged as potentially suspicious. This technique uses
statistical measures to define what is considered normal within a given network or
system.
● Advantages: It can detect previously unknown attacks by noticing changes in behavior.
● Disadvantages: High false-positive rate as it can misinterpret legitimate activity as
malicious if it deviates from what's considered normal.

2. Signature-Based Detection
● How it Works: This method relies on predefined patterns of known threats, like byte
sequences in network traffic, or known malicious instruction sequences used by
malware. When a piece of data matches a signature in the database, an alert is
triggered.
● Advantages: Highly effective at detecting known threats, providing precise and accurate
detection when signatures match.
● Disadvantages: It cannot detect new, unknown viruses or novel attacks that do not have
signatures yet.

3. Rule-Based Intrusion Detection


● How it Works: This method uses a set of predefined rules that help define what
constitutes suspicious behavior. These rules are often based on the policies of the
network or system. For example, a rule might be set to flag any outbound
communication that attempts to send credit card information.
● Advantages: Allows for customization to the specific security needs of an organization.
● Disadvantages: Maintaining and updating rules can be complex and time-consuming.
Additionally, it may not detect attacks that do not violate any of the predefined rules.

The Base-rate Bayesian Fallacy

The Base-rate Bayesian Fallacy in the context of IDS refers to a common statistical error that
can occur when the base rate (i.e., the overall rate of an event occurring within a data set) is
ignored in the calculation of probabilities. In the setting of intrusion detection, this fallacy can
significantly affect the accuracy of threat detection systems.

● Example of the Fallacy: Suppose an IDS has a 99% accuracy rate at detecting a real
attack and a 1% false positive rate. Even with these impressive stats, if the actual
probability of an attack on any given day is very low (say 0.1%), the probability that an
alert indicates a real attack is much lower than 99%. This is because the number of false
positives can overwhelm the number of true positives due to the very low base rate of
actual attacks.
● Impact on IDS: This illustrates why IDS systems that seem highly accurate in testing
can still generate a large number of false alarms in real-world conditions. It underscores
the importance of considering the base rate of attacks when configuring and evaluating
the performance of intrusion detection systems. Balancing sensitivity (detecting real
attacks) and specificity (not mislabeling normal activities as attacks) is crucial to effective
IDS operation.

SOFTWARE & WEB SECURITY

1. Buffer Overflow
● How it works: This occurs when a program writes more data to a buffer than it
can hold. If the buffer is designed to contain 10 bytes of data but receives 20
bytes, the extra data can overflow into adjacent buffers, corrupting or overwriting
the valid data they contain. This can allow attackers to execute arbitrary code.
● Prevention: Use safe functions that limit the amount of data written to buffers.
For example, use strncpy() instead of strcpy(). Employ modern programming
languages that manage memory more safely (e.g., Java, Python) and use tools
like Address Space Layout Randomization (ASLR) and stack canaries.
2. SQL Injection
● How it works: An attacker manipulates a standard SQL query to exploit
non-validated input vulnerabilities in a database. This can allow the attacker to
view, modify, or delete database information that they should not be able to
access.
● Prevention: Use prepared statements and parameterized queries which ensure
that the input data can't be interpreted as SQL commands. Validate and sanitize
all user inputs.
3. Cross-Site Scripting (XSS)
● How it works: XSS attacks occur when an attacker manages to inject malicious
scripts into content that other users see. When the malicious content is delivered
to users’ browsers, it can execute and access cookies, session tokens, or other
sensitive information retained by the browser, or it can rewrite the content of the
HTML page.
● Prevention: Sanitize and validate all user inputs to ensure that they do not
contain executable content. Use frameworks that automatically escape XSS by
design such as the latest versions of React or Angular.

Malicious Software

1. Trojan Horses
● How they work: Trojans are malicious programs that pretend to be useful
software, but when executed, they can give attackers remote administrative
control over the infected computer.
● Differences from other malware: Unlike viruses, Trojans do not replicate
themselves but they pose as legitimate software.
2. Viruses
● How they work: A virus is a malicious executable code attached to another
executable file which can replicate itself and spread to other systems.
● Differences from other malware: Viruses need a host file to spread and
typically require user interaction to execute.
3. Worms
● How they work: Worms are self-replicating malware that replicate themselves to
spread to other computers over a network, usually causing harm by consuming
bandwidth and possibly carrying payloads.
● Differences from other malware: Unlike viruses, worms do not require a host
file or user interaction to spread.
4. Rootkits
● How they work: Rootkits are designed to hide the existence of certain processes
or programs from normal methods of detection and allow continued privileged
access to a computer.
● Differences from other malware: Rootkits are specifically designed to hide
themselves and other malware in the system.

PRIVACY

Statistical Database Privacy

Concept of Anonymity:

Anonymity in statistical databases ensures that the individuals who are the subjects of the
records cannot be identified. It involves methods and techniques designed to protect personal
data from being linked to specific individuals, thus maintaining their privacy.

Common Privacy Breaches:

● Identity Disclosure: Occurs when an individual can be uniquely identified from a


released dataset.
● Attribute Disclosure: Occurs when new information about an individual is revealed
from the data set, even if the individual is not identified.
● Inference Disclosure: Occurs when sensitive information can be inferred from the
released data, typically through combination with other available data.

Classical Privacy Protection Techniques:

● Data Masking: Altering data so that the privacy of subjects is preserved. This can
involve methods like data shuffling or replacement with artificial data.
● Data Perturbation: Adding noise to the data or modifying the data in a way that the
resulting statistical analysis remains useful but the individual data points cannot be
trusted to be exact.
● Anonymization: Removing personally identifiable information where the data cannot be
associated with a particular individual. Techniques include:
● Generalization: Reducing the granularity of the data, e.g., modifying an exact
age to an age range.
● Suppression: Removing sensitive data altogether.
● k-Anonymity: Ensuring that each individual is indistinguishable from at least k-1
others who share similar attributes in the data set.

Network Anonymity

Onion Routing:

Onion routing is a technique for anonymous communication over a computer network. In an


onion network, messages are encapsulated in layers of encryption, analogous to layers of an
onion. The encrypted data is transmitted through a series of network nodes called onion routers,
each of which "peels" away a single layer, uncovering the data's next destination. When the final
layer is decrypted, the message arrives at its destination. The original sender remains
anonymous because each intermediary knows only the location of the immediately preceding
and following nodes.

Route Establishment in Onion Routing:

● Initialization: A user obtains a list of onion routers from a directory server.


● Path Selection: The sender selects a random path through the network to the
destination. This path is constructed so that each router along the way knows only its
predecessor and successor in the route, but not the complete path.
● Circuit Establishment: The sender initializes a circuit through the selected routers,
using asymmetric cryptography to establish shared symmetric keys with each router on
the path without revealing the sender's identity or the other routers involved.
● Data Transmission: Data is sent along the established path. At each step, a layer of
encryption is removed to reveal the next router in the path. This method prevents any
single router from knowing both the origin and the destination of the data, ensuring the
anonymity of the communication.

You might also like