Saturday, September 28, 2024

Man-in-the-middle (MITM) Attacks

 


Man-in-the-middle (MITM) Attacks

What is MITM Attack

A MITM attack is a form of cyber-attack where a user is introduced with some kind of meeting between the two parties by a malicious individual, manipulates both parties and achieves access to the data that the two people were trying to deliver to each other. A man-in-the-middle attack also helps a malicious attacker, without any kind of participant recognizing till it's too late, to hack the transmission of data intended for someone else and not supposed to be sent at all. In certain aspects, like MITM, MitM, MiM or MIM, MITM attacks can be referred.

Blowfish Algorithm in Cryptography

 Blowfish is a symmetric, 64-bit block cipher with changeable length. As a "general-purpose algorithm," it was created by Bruce Schneier in 1993 as a quick, cost-free replacement for the venerable Data Encryption Standard (DES) and International Data Encryption Algorithm (IDEA) encryption techniques.

Types of Cyber Attacks



 A cyber-attack is an exploitation of computer systems and networks. It uses malicious code to alter computer code, logic or data and lead to cybercrimes, such as information and identity theft.

We are living in a digital era. Now a day, most of the people use computer and internet. Due to the dependency on digital things, the illegal computer activity is growing and changing like any type of crime.

Cyber-attacks can be classified into the following categories:

Public Key Encryption

 


Public key cryptography provides a secure way to exchange information and authenticate users by using pairs of keys. The public key is used for encryption and signature verification, while the private key is used for decryption and signing. When the two parties communicate with each other to transfer the intelligible or sensible message, referred to as plaintext, is converted into apparently random unreadable for security purposes referred to as ciphertext

Block Cipher Design Principles

 Block ciphers are built in the Feistel cipher structure. Block cipher has a specific number of rounds and keys for generating ciphertext.Block cipher is a type of encryption algorithm that processes fixed-size blocks of data, usually 64 or 128 bits, to produce ciphertext. The design of a block cipher involves several important principles to ensure the security and efficiency of the algorithm. Some of these principles are:

What is Proxy Server?


 A proxy server refers to a server that acts as an intermediary between the request made by clients, and a particular server for some services or requests for some resources. There are different types of proxy servers available that are put into use according to the purpose of a request made by the clients to the servers. The basic purpose of Proxy servers is to protect the direct connection of Internet clients and Internet resources. There are many Proxy providers in the market that provide services to both individuals and businesses.

Friday, September 27, 2024

Cyber Security Firewalls

 

Firewalls

Firewalls are a central architectural element to any network. They are designed to keep out all network traffic, except traffic which we allow. Firewalls operate on Layer 4, typically controlling TCP and UDP access to internal assets. Next-Generation Firewalls operate on all the layers of the OSI model, including Layer 7.

Traffic entering a network, e.g. through a Firewall, is called ingress traffic. Traffic leaving is called egress.

Cyber Security Wi-Fi Attacks

 A potent and important area to computer security is WIFI. Devices and systems are no longer required to be interconnected via physical cables, but can instead be reached by anyone within signal radius. WIFI enables many new devices to be capable of networking.

Penetration Testing & Social Engineering

 

Penetration Testing & Social Engineering

Penetration testing serves as a pro-active measure to try identify vulnerabilities in services and organizations before other attackers can.

Cyber Security Network Mapping & Port Scanning

 If we are to defend, we first need to know what to defend. Asset Management often relies on Network Mapping to identify which systems are live on a network.

Asset management and knowing what you expose on the network, including which services are hosted is very important for anyone looking to defend their network.

Cyber Security - Risk Analysis

 Now that we have already studied the principles, policies and standards of cybersecurity systems, we move forward to Risk Analysis in cybersecurity. With increasing number of attacks and crimes against computer systems and networks, there is also an urgent need for firms to perform regular Risk Analysis of their cybersecurity systems for better coverage and long-term solutions to cybercrimes.

VPN in Cyber Security



 Virtual Private Network, more commonly known as VPN, describes a software application that provides a secure route for a network node to connect to the internet. In this chapter, we will discuss in detail the functioning and characteristics of VPN services. So, let’s start our chapter on this note.

Cyber Security - Dark Web




 The Dark Web, also known as Darknet, is a part of the world wide web where most of the illegal activities take place on the internet. From phishing to scams and much more, these attacks are very harmful, and most cyber experts are trying to figure out a way to solve this problem.

Types of Cyberattacks

 Cyberattacks are growing in numbers, and there is an urgent need of more robust cybersecurity measures to counter these attacks. We as programmers and IT professionals must be aware of the most common types of cyberattacks that occur in top organizations over the course.

Basics of Cyber Technology




 The rise of cyber technology and the invention of the Internet are very important incidents in the modern technology era. With the rise of these entities, there is also an increase in cybercrimes and attacks.

Before we reach these subjects on a wider scale, we must discuss the background concepts which form the basic structure of Cyber Technology. These include topics like networking, the OSI Model, Internet, Networking protocols and some other concepts.

History of Cyber Security



 Today, cyber security finds a place in almost all major companies and stakeholders’ hindsight. But in the early days, the concept of cyber security was very vague.

It was not until many years later that the development of cyber security was taken seriously due to the frequent occurrence of cyber-attacks and threats from dangerous entities. The development of these measures became the evolution of cyber security.

Cyber Security Tutorial

Cybersecurity is one of the most sought-after skills in the modern era. With such a large information pool, and an even larger network of nodes, Cybersecurity has gained a lot of importance nowadays.

This cybersecurity tutorial is designed for beginners as well as professionals. In this tutorial, you will learn all essential skills, tools, and strategies regarding cybersecurity. This cybersecurity tutorial covers the topics from basic concepts to advanced techniques.

Linux Admin - Backup and Recovery

 Before exploring methods particular to CentOS for deploying a standard backup plan, let's first discuss typical considerations for a standard level backup policy. The first thing we want to get accustomed to is the 3-2-1 backup rule.

Linux Admin - Shell Scripting

 

Introduction to Bash Shell

Like flavors of GNU Linux, shells come in many varieties and vary in compatibility. The default shell in CentOS is known as the Bash or Bourne Again Shell. The Bash shell is a modern day, modified version of Bourne Shell developed by Stephen Bourne. Bash was the direct replacement to the original Thompson Shell on the Unix operating system developed at Bell Labs by Ken Thompson and Dennis Ritchie (Stephen Bourne was also employed by Bell Labs)

JavaScript - Comments

 

JavaScript Comments

JavaScript comments are used to explain the purpose of the code. The comments are not executed as a part of program and these are solely meant for human developers to understand the code better.