Network & Security Flashcards
Revision for the Network and Security Module
7
What is Computer Security?
Correctnes and Efficient algorithms against an Attacker
How can data we send over wifi be intercepted or stolen?
- Data is sent over wifi is transmitted through radiowaves
- Someone with a radio reciever or radio can retrieve and steal and catch this data.
What helps protect your data over the Wifi?
Making sure it is encrytped
What do we safeguard?
Decide on Assests : Information or Infrastructure:
- Sensitive Data
- Control Systems
- Hardware Devices
How do you safegaurd?
- Security goal
- Estimate impacts of attacks
- Design mitigation
- Analyse system
- Spot Vulnerabilities
- Build Protection
Information Security Aims:
- Confidentiality: Attacker should not retrieve any info
- Integrity & Authenticity: Received data is authentic & sender is genuine
- Avaliabilty: Data should be accessible on demand
Information Security
Who are Potential Attackers?
ANYONE & EVERYONE
-Hackers: Potentially learning by running known attacks, exploting vunlnerabilities.
-Criminals: Take control of computers via bugs in software. Phising attacks or Denial of Service (DoS Attacks)
-Governments: Extreme computing powers. control on resources (wiretaps)
-Business House like ISPS Spying to sell your data
What are the Known Attacks?
- Ransomeware
- Phising
Examples of Ransomware:
- Malware: Trojan disguised as legitimate file
- Malware encrypted data on computer and ask for payments in bitcoin
**REAL LIFE **
- Wannacry 2017 move automatically via unpatched vulnerablities in Microsoft Windows
- Widespread impacts, NHS & Nissan among affected
Examples of Phising:
- Emails pretneding to be from Known people
- Emails ask for username & password
- Emails ask for software instillation (includes word macros)
- Install malware to spread within networks and downloads further malware
Unix Commands & Shell Scripts
What are Shell Commands?
Operations on Files
Unix Commands & Shell Scripts
Why do we Utilise OS Commands?
Potenitally Faster
What is Batch Proecessing?
Sequentially Running Programs
Modular Arithmetic
How to do simplify modular arithmetic for large (NON POWER) numbers
- Split it up by adding 2 easier number that make the original number
- Split it up by multiplying 2 easier number that make the original number
Modular Arithmetic
What is the rule for adding 2 easy numbers?
x = (t1)z + r1 => x mod z = r1
y = (t2)x + r2 => y mod z = r2
p = x + y
p mod z =
(x + y) mod z = (r1 + r2) mod z
Modular Arthmetic
Why do you need to do mod z in (r1 + r2) mod z & (r1 * r2) mod z?
-Because r1+r2 can be larger than z
- mod make the remainder smaller than z
Modular Arthimetic
What is the simple rule modular arithmetic for addition?
x + y mod z = (x mod z + y mod z ) mod z
What is the simple rule modular arithmetic for multiplication?
(x * y) mod z = (x mod z * y mod z) mod z
Modular Arithmetic
What is the algorithm for power mod?
where time complexity = n
product = 1 for i = 1 to n product = (prodcut * 2) mod m end for
m is the value you want to mod by
if n = 2^10 it will take 2^10
Modular Arithmetic
What’s a better algorithm where T(n) = 2T(n/2) + 1
find(n) product = 1 product = (find(n/2) * find(n/2)) mod m return product
m is the value you want to mod by
T(n) = 2T(n/2)+ 1 => log n + something
Modular Arithmetic
What algorithm gives Total Complexity of log n?
find(n) product = 1 product = (find(n/2))^2 mod m return product
**IN ORDER TO COMPUTE **
2 ^n mod 57
I need to compute log n many powers
So Total Complexity ceil (log n)
This gets rid of the extra find call as you just get the same num twice
Linux Shell
If you type echo "Hello, welcome to $SHELL"
what is the output, in a Linux Shell?
Hello, welcome to /bin/bash
Shell Commands
How to create a directories?
FORMAT: mkdir directoryname
EXAMPLE CODE:
mkdir folder1
Shell Commands
How to create Multiple Directories?
Only 2 Directories
FORMAT: mkdir directoryname1 direcotryname2
EXAMPLE CODE:
mkdir folder1 folder2