Information System
Information System
Information Security
Information security refers to the protection of information and information systems from
unauthorized access, use, disclosure, disruption, modification, or destruction. It aims to
protect the confidentiality, integrity, and availability of information and information
systems.
There are several different security measures that organizations can implement to
protect their information systems, such as:
Intrusion detection systems: These systems are used to detect and alert
organizations to potential security breaches.
Access controls: Access controls are used to restrict access to information and
information systems to authorized individuals only.
Security policies: Organizations can implement security policies to ensure that their
employees understand their security responsibilities and adhere to them.
Security Auditing: Regularly monitoring the system for possible malicious activities
and vulnerabilities.
Information Security is not only about securing information from unauthorized access.
Information Security is basically the practice of preventing unauthorized access and use.
We use information security to protect valuable information assets from a wide range of
threats, including theft and cybercrime. Here are some key reasons why information
security is important:
Confidentiality – The goals of confidentiality is that only the sender and the
predetermined recipient is able to access a message. Confidentiality is equivalent to
privacy and avoids the unauthorized disclosure of information. It involves the
protection of data, providing access for those who are allowed to see it. It prevents
essential information from reaching the wrong people. Data encryption, Access
Control, Authentication, Authorization, and physical security are the tools to ensure
confidentiality.
Integrity: Integrity refers to the methods for ensuring that data is real, accurate and
safeguarded from unauthorized user modification. It is the property that
information has not be altered in an unauthorized way, and that source of the
information is genuine. Data backup, Check Sums, Data Correcting Codes are the
best tools for integrity.
Availability: The main goals of information security is availability. It is that resources
must be available to authorized parties at all times, even during failures (with
minimal or no disruption). It is the guarantee of reliable and constant access to our
sensitive data by authorized people. Physical Protection and Computational
Redundancies are the best tools for Availability
Apart from this there is one more principle that governs information security programs.
This is Non repudiation.
Cyber Threat
Cyber threats are acts performed by individuals with harmful intent, whose goal is to steal
data, cause damage to or disrupt computing systems. Common categories of cyber threats
include malware, social engineering, man in the middle (MitM) attacks, denial of service
(DoS), and injection attacks.
Cyber threats can originate from a variety of sources, from terrorist groups, to individual
hackers, to trusted individuals like employees or contractors, who abuse their privileges to
perform malicious acts. Some common types of cyber threats are explained below.
A. Malware
Almost every modern cyberattack involves some type of malware. Threat actors use
malware attacks to gain unauthorized access and render infected systems inoperable,
destroying data, stealing sensitive information and even wiping files critical to the
operating system.
Ransomware locks a victim’s data or device and threatens to keep it locked, or leak it
publicly, unless the victim pays a ransom to the attacker. According to the IBM Security X-
Force Threat Intelligence Index 2024, ransomware attacks represented 17 percent of all
cyberattacks in 2022.
A Trojan horse is malicious code that tricks people into downloading it by appearing to be
a useful program or hiding within legitimate software. Examples include remote access
Trojans (RATs), which create a secret backdoor on the victim’s device, or dropper Trojans,
which install additional malware once they gain a foothold on the target system or network.
Spyware is a highly secretive malware that gathers sensitive information, like usernames,
passwords, credit card numbers and other personal data, and transmits it back to the
attacker without the victim knowing.
Worms are self-replicating programs that automatically spread to apps and devices
without human interaction.
Phishing is the best-known and most general form of social engineering. Phishing uses
fraudulent emails, email attachments, text messages or phone calls to trick people into
sharing personal data or login credentials, downloading malware, sending money to
cybercriminals or taking other actions that might expose them to cybercrimes.
Another common social engineering scam is domain name spoofing (also called DNS
spoofing), in which cybercriminals use a fake website or domain name that impersonates a
real one—for example, ‘‘applesupport.com’’ for support.apple.com—to trick people into
entering sensitive information. Phishing emails often use spoofed sender domain names to
make the email seem more credible and legitimate.
C. Man-in-the-Middle attack
D. Denial-of-Service attack
F. Password attack
As the name suggests, these attacks involve cybercriminals trying to guess or steal the
password or login credentials to a user’s account. Many password attacks use social
engineering to trick victims into unknowing sharing this sensitive data. However, hackers
can also use brute force attacks to steal passwords, repeatedly trying different password
combinations until one is successful.
A botnet is a network of infected computers that work together to carry out an attacker's
goals.
H. Injection attacks
In these attacks, hackers inject malicious code into a program or download malware to
execute remote commands, enabling them to read or modify a database or change website
data.
There are several types of injection attacks. Two of the most common include:
SQL injection attacks: when hackers exploit the SQL syntax to spoof identity; expose,
tamper, destroy or make existing data unavailable; or become the database server
administrator.
Cross-site scripting (XSS): these types of attacks are similar to SQL injection attacks,
except instead of extracting data from a database, they typically infect users who
visit a website.
Cyber Crime
Cybercrime refers to a wide range of criminal activities that are carried out using
digital devices and/or networks. Most cybercrime is committed by cybercriminals or
hackers who want to make money. However, occasionally cybercrime aims to
damage computers or networks for reasons other than profit. These could be
political or personal.
Cybercrime can be carried out by individuals or organizations. Some cybercriminals
are organized, use advanced techniques and are highly technically skilled.
For example, firewalls filter incoming and outgoing traffic, acting as a first line of
defense by identifying familiar attack types, suspicious activity, or unauthorized
access attempts based on pre-defined rules. The idea is that firewalls already know
what to expect and have the capability to block these threats before they can cause
harm.
Information Security
Information security, or InfoSec, is the practice of protecting information. It refers to
the tools and processes for preventing, detecting, and remediating threats to
sensitive information, whether digitized or not.
Cloud Security
Cloud security refers to the technologies, policies, and procedures that protect data,
applications, and services hosted in private and public cloud environments. It
ensures sensitive information is safe from data breaches and other vulnerabilities,
whether stored in public, private, or hybrid clouds. Cloud security solutions are
often versions of on-premises solutions that are specifically for the cloud. As such,
cloud security can be a seamless extension of an organization's network security.
Endpoint Security
Endpoint security focuses on protecting the devices that serve as access points to an
organization’s network, such as laptops, desktops, smartphones, and tablets. These
devices, or endpoints, expand the attack surface, providing potential entry points for
cybercriminals to exploit vulnerabilities and infiltrate the broader infrastructure.
To reduce risk, organizations must apply the right security solutions to each
endpoint, ensuring protection is tailored to the specific device and its role in the
network. For example, laptops used by remote workers may require antivirus
software and multi-factor authentication to prevent malware attacks or
unauthorized access.
Application Security
Application security refers to the technologies, policies, and procedures at the
application level that prevent cybercriminals from exploiting application
vulnerabilities. It involves a combination of mitigation strategies during application
development and after deployment.
For instance, a web application firewall (WAF) monitors and filters traffic between
applications and the outside world, blocking malicious activity like code injections
or cross-site scripting attacks. With robust application security, organizations can
ensure their software remains protected against threats that target the app and the
sensitive data it processes and stores.
1. Use frequent, periodic data backups: Organizations should regularly back up data
to ensure that, if an attack occurs, they can quickly restore systems without
significant loss.
2. Implement multi-factor authentication: MFA adds an extra layer of security by
requiring users to verify their identity through a combination of “who they are” —
username and password — with something they know such as a one-time code. This
reduces the risk of unauthorized access. MFA is one of the most effective defenses
against credential theft.
3. Provide ongoing cybersecurity training: Ongoing cybersecurity awareness
training helps staff recognize and respond to suspicious activity, minimizing human
vulnerability.
4. Use proper password hygiene: Strong password policies should require long,
complex passwords, changed regularly, rather than short, easily guessed ones.
Organizations must also advocate against reusing passwords across platforms to
prevent lateral movement and data exfiltration.
5. Leverage encryption software: Sensitive data must be protected both at rest and in
transit. Encryption helps safeguard confidential information by obfuscating its
contents and rendering it unreadable to unauthorized parties, even if it’s intercepted
or stolen.
6. Regularly update software: Outdated systems often contain vulnerabilities that
cybercriminals can exploit. Regularly updating applications and patching security
flaws ensures they have the latest protections. An endpoint protection agent can
monitor operating systems and applications and notify the user of needed updates.
7. Limit user privileges: The zero trust model advocates for the principle of least-
privileged access. This means users only have access to the resources necessary for
their roles, thus minimizing the potential damage if their accounts are compromised.
8. Develop an incident response plan: A clear and tested plan is critical during an
active security threat. It should include steps for containment, mitigation,
communication, and recovery, ensuring the organization can quickly address and
respond to an attack.
9. Segment the network: Segmentation is a strategy that divides the larger network
into smaller isolated pieces. This ensures the impact of a breach is limited in scope,
preventing bad actors from moving laterally to harvest more data.
10. Conduct regular security audits: Businesses should periodically review their
cybersecurity measures to identify weaknesses and gaps. Proactively testing
defenses can help uncover vulnerabilities before attackers exploit them, allowing
teams to strengthen the overall security posture.
Security Attack
What Is a VPN
A VPN (Virtual Private Network) is a technology that creates a secure, encrypted
connection between your device and the internet. It essentially acts as a private
tunnel for your internet traffic, preventing hackers, ISPs, and even governments
from monitoring your activities. When using a VPN, your IP address is masked, and
your online actions are routed through a remote server, making it harder to track
your online activity.
How Does a VPN Work
A VPN works by creating an encrypted tunnel between your device and a remote
server. Here's the process simplified:
1. Connection Establishment: When you activate a VPN on your device, it connects to
a server operated by the VPN provider.
2. Encryption: The VPN encrypts your data (information, files, web traffic) so that
it’s unreadable to anyone trying to intercept it, whether it's a hacker on the same
Wi-Fi network or an entity trying to monitor your browsing.
3. Traffic Redirection: Your device’s internet traffic is routed through the VPN server,
which can be located in any country. This makes it appear as though you’re browsing
from the server’s location, masking your actual IP address.
4. Decryption: Once your data reaches the VPN server, it is decrypted and sent to the
destination (such as a website, app, or service). Any response from the server is
then sent back to you through the encrypted tunnel.
This end-to-end encryption ensures that your sensitive data stays private and your
location remains anonymous.
Encryption
Encryption is the process of converting a normal message (plain text) into a
meaningless message (ciphertext). Decryption is the process of converting a
meaningless message (ciphertext) into its original form (plaintext). The major
distinction between secret writing and associated secret writing is the conversion of
a message into an unintelligible kind that's undecipherable unless decrypted.
whereas secret writing is the recovery of the first message from the encrypted
information.
Encryption Decryption
Its major task is to convert the While its main task is to convert
plain text into cipher text. the cipher text into plain text,.
o Purpose: Ensures that network protocols, like HTTPS and FTP, function
correctly and flags suspicious behavior.
It analyzes the data flowing through the network to look for patterns and signs of
abnormal behavior.
The IDS compares the network activity to a set of predefined rules and patterns
to identify any activity that might indicate an attack or intrusion.
If the IDS detects something that matches one of these rules or patterns, it sends
an alert to the system administrator.
The system administrator can then investigate the alert and take action to
prevent any damage or further intrusion.
Working of IPS
An IPS works by analyzing network traffic in real-time and comparing it against known
attack patterns and signatures. When the system detects suspicious traffic, it blocks it
from entering the network.
Types of IPS
Malicious programs are called malware. Malicious programs are harmful because of
various software they include such as virus, trojan, worms, spyware etc. They can break
security, steal data or disrupt the operation of the system.
Antimalware software has a database of malicious signatures. They compare the files
and programs with those signatures. When a potential threat is identified, antimalware
software may quarantine the infected file, preventing it from causing harm. Users can
then choose to remove or further investigate the quarantined item. Example of anti-
malware software are:
Antimalware Antivirus
Primarily signature-based
Emphasizes behavior-based detection and blocking
detection
Uses heuristics(analysis code structure, function and pattern Scans files based on predefined
of file) and other methods virus signatures
Security Software
Security software is designed to protect and secure servers, laptops, mobile devices, and
networks from unauthorized access, intrusions, viruses, and other threats. Security
software can help defend data, users, systems, and companies from a wide range of
risks.
Security software can improve both business and information security. Operating
without security software or using outdated solutions, leaves organizations and users
exposed to a wide range of threats, including malicious hackers, spyware, viruses, and
malware.
Traditional software programs that scan for, detect, and remove software viruses and
malicious software like worms and Trojans have become ineffective. Advanced malware
protection software has become the new standard.
Firewall software
Firewall software can prevent unauthorized access to or from private networks.
Firewalls can also be hardware, and firewall software and hardware are often used
together.
This type of software helps to protect the data and workflows related to the various
devices such as laptops, smartphones, and tablets that connect to a corporate network.
Network security software helps businesses detect and stop unauthorized network
access due to phishing, spyware, and more. It can also help to protect data in transit and
at rest.
Browser Security
Browser Security refers to the measures and technologies implemented to protect web
browsers from security threats such as malware, phishing attacks, and data breaches.
A web browser can store information for your convenience, but others may eventually
access the information. Therefore, it provides a large surface area for exposure to email
accounts, usernames, all sorts of passwords, and personal or corporate information.
Attackers often target the web browser to hijack or sniff the web traffic from it. They
may also use it as a means to access the device itself or any files available on it.
There are several ways that hackers can attack web browsers, including the following:
Malicious ads: Hackers can also use malicious ads, also known as “malvertising,”
to attack web browsers. These ads can contain malware or redirect users to
malicious websites.
To protect against these types of attacks, it is important to keep your web browser and
any extensions or plugins that you have installed up to date, use caution when clicking
on links, and use an antivirus program to scan your device for malware. Using a
reputable web browser and enabling security features such as two-factor authentication
and secure browsing (HTTPS) is also a good idea.
Firewall
Firewalls are the first line of defense for your network security. A firewall is a type of
cybersecurity tool used to monitor and filter incoming and outgoing network traffic –
from external sources, internal sources, and even specific applications. The primary goal
of a firewall is to block malicious traffic requests and data packets while letting through
legitimate traffic.
Types of Firewalls
Packet Filters
It is also a type of packet filtering that is used to control how data packets move through
a firewall. It is also called dynamic packet filtering. Stateful inspection firewalls combine
packet inspection technology and TCP handshake verification. These firewalls can
inspect that if the packet belongs to a particular session or not. It only permits
communication if and only if, the session is perfectly established between two
endpoints else it will block the communication.
These firewalls can examine application layer (of OSI model) information like
an HTTP request. If it finds some suspicious application that can be responsible for
harming our network or that is not safe for our network then it gets blocked right away.
Proxy firewalls may also perform deep-layer packet inspections, checking the actual
contents of the information packet to verify that it does not contain malware.
Next-generation Firewalls
Software Firewall
The software firewall is a type of computer software that runs on our computers. It
protects our system from any external attacks such as unauthorized access, malicious
attacks, etc. by notifying us about the danger that can occur if we open a particular mail
or if we try to open a website that is not secure.
Hardware Firewall
Cloud Firewall
Cryptography is the process of hiding or coding information so that only the person a
message was intended for can read it. The art of cryptography has been used to code
messages for thousands of years and continues to be used in bank cards, computer
passwords, and ecommerce. Modern cryptography techniques include algorithms and
ciphers that enable the encryption and decryption of information, such as 128-bit and
256-bit encryption keys. Modern ciphers, such as the Advanced Encryption Standard
(AES), are considered virtually unbreakable.
Types of Cryptography
Symmetric Key Cryptography is an encryption system where the sender and receiver of
a message use a single common key to encrypt and decrypt messages. Symmetric Key
cryptography is faster and simpler but the problem is that the sender and receiver have
to somehow exchange keys securely. The most popular symmetric key cryptography
systems are Data Encryption Systems (DES) and Advanced Encryption Systems (AES).
SHA-256
MD5
MD6
There are two basic building blocks of all encryption techniques: substitution and
transposition.
In Substitution Cipher Technique plain text characters are replaced with other
characters, numbers and symbols. In substitution Cipher Technique, character’s identity
is changed while its position remains unchanged.
Types
Caesar Cipher
The Caesar cipher involves replacing each letter of the alphabet with the letter
standing 3 places further down the alphabet.
For example:
Plain text: PAY MORE MONEY
Cipher text: SDB PRUH PRQHB
Playfair Cipher
The best-known multiple letter encryption cipher is the Playfair, which treats
diagrams in the plaintext as single units and translates these units into cipher
text diagrams. The Playfair algorithm is based on the use of 5x5 matrix of letters
constructed using a keyword.
It was used for tactical purposes by British forces in the Second Boer War and in
World War I and for the same purpose by the Australians during World War II.
Encryption Technique
The algorithm consists of 2 steps:
1. Generate the key Square (5x5):
The key square is a 5×5 grid of alphabets that acts as the key for
encrypting the plaintext. Each of the 25 alphabets must be unique and
one letter of the alphabet (usually J) is omitted from the table (as the table
can hold only 25 alphabets). If the plaintext contains J, then it is replaced
by I.
The initial alphabets in the key square are the unique alphabets.
2. Algorithm to encrypt the plain text: The plaintext is split into pairs of two letters
(digraphs). If there is an odd number of letters, Z is added to the last letter.
If same letter appear in pair, separate same letter by adding Z.
Example
Plain Text: "hello"
After Split: 'he' 'lz' 'lo'
Explanation: Here 'z' is the bogus letter.
Encryption Rules
There are mainly three criteria for encrypting letters within the same pair.
If the two letters in the pair are in the same row, we replace them with the letter
to their right.
For example:
Plain Text: "st"
Encrypted Text: tl
Encryption: s -> t t -> l
If both letters in the pair are found in the same column, we will replace each
letter with the letter below it.
For example:
Plain Text: "me"
Encrypted Text: cl
Encryption: m -> c e -> l
If the letters are in different rows and columns, we form a rectangle with them
and change each letter with the letter in the opposite corner.
For example:
Plain Text: "nt"
Encrypted Text: rq
Encryption: n -> r t -> q
Let's take an easy example to understand this technique. The plaintext "JUMP" will be
turned into "MXPS" using Caesar Cipher.
In cryptography, the one-time pad (OTP) is an encryption technique that cannot be cracked
easily. In this technique, a plaintext is paired with a random secret key (also referred to as a
one-time pad). Then, each character of the plaintext is encrypted by combining it with the
corresponding character from the pad using modular addition.
It is an unbreakable cipher.
The key is exactly same as the length of message which is encrypted.
The key is made up of random alphabets.
As the name suggests, key is used one time only and never used again for any other
message to be encrypted.
Key and plain text calculated as modulo 10/26/2.
The security of the one-time pad entirely depends on the randomness of the key. If
the characters of the key are truly random, then the characters of the cipher text will
be truly random. Thus, there are no patterns or regularities that a cryptanalyst can
Example:
Explanation:
Plain text — H E L L O = 7 4 11 11 14
Key — M O N E Y = 12 14 13 4 24
19 18 24 15 12 (38 %26=12)
Cipher Text = T S Y P M
Transposition cipher is a type of encryption technique where the positions of the letters
in the plaintext message are rearranged to form a cipher text message. In transposition
Cipher Technique, the position of the character is changed but character’s identity is not
changed. This technique does not alter the letters themselves but rather the order in
which they appear.
Types
Rail Fence Transposition
Rail-Fence is a basic Transposition method in which plaintext is written as a
series of diagonals, which is then read row by row to generate the ciphertext.
Plaintext: Let us meet Today
Let’s write the sentence in diagonal format.
Ciphertext: LTSETOAEUMETDY
Columnar Transposition Cipher
In columnar transposition cipher, the message is written out in row by row of a fixed
length, and then read out again column by column, and the column. The width of
rows and the permutation of the columns are usually defined by a keyword.
For example, the word HACK is of length 4 (so the rows are of length 4), and the
permutation is defined by the alphabetical order of the letters in the keyword. In
this case, the order would be "3 1 2 4". Any spare spaces are filled with nulls or left
blank or placed by a character (Example: _).
Finally, the message is read off, column by column, in the order specified by the
keyword.
Key : HACK
H A C K
3 1 2 4
M E E T
_ M E _
T O M O
R R O W
Block Cipher and Stream Cipher belongs to the symmetric key cipher. These two
block ciphers and stream cipher are the methods used for converting the plain text
into cipher text. The main difference between a Block cipher and a Stream
cipher is that a block cipher converts the plain text into cipher text by taking plain
text’s block at a time. While stream cipher Converts the plain text into cipher text by
Block Cipher
fixed-size data block using a shared, secret key. A block cipher is a cryptographic
algorithm that encrypts fixed-size data blocks, commonly 128 bits. It operates with a
fixed key and encrypts data groups to ensure maximum confidentiality and security.
With the help of the shared secret key, a block cipher encrypts and decrypts its input
Initially, sensitive, private information was protected using a 56-bit symmetric key
algorithm. DES was later discontinued because of its short length and other security
It is a popular block cipher which encrypts data in blocks of 128 bits and 256
bit symmetric keys. The block cipher uses substitution and transposition techniques
to produce cipher text by shuffling and replacing input data in a sequence of linked
calculations. .
Stream Cipher
A stream cipher is an encryption technique that works bits by bits or byte by byte to
transform plain text into cipher text that is unreadable to anyone without the proper
key. Stream ciphers are fast because they encrypt data bit by bit or byte by byte, which
makes them efficient for encrypting large amounts of data quickly. Stream ciphers
work well for real-time communication, such as video streaming or online gaming,
because they can encrypt and decrypt data as it’s being transmitted.
Plain Text and Keystream produces Cipher Text (Same keystream will be used for
decryption.).
The Plaintext will undergo XOR operation with keystream bit-by-bit and produces
the Cipher Text.
The key typically used with a stream cipher is known as a one-time pad.
Example:
Keystream : 11000011
Steganography
Text Steganography
Image Steganography: Image steganography is a way of hiding data in an image so
that the image remains almost the same, but secret data can be extracted from it.
Audio Steganography
4. Video Steganography
RSA algorithm
RSA is the most common public/asymmetric -key algorithm, named after its inventors
Rivest, Shamir, and Adelman (RSA). Asymmetric actually means that it works on two
different keys i.e. Public Key and Private Key. As the name describes that the Public Key is
given to everyone and the Private Key is kept private.
RSA algorithm
Example
Step 2: Multiply p and q to find n n = p x q, where n is called the modulus for encryption and
decryption. n = 7 x 11 n = 77
Step 3: Choose a number e less that n, such that 'e' is relatively prime to (p - 1) x (q -1). It
means that e and (p - 1) x (q - 1) have no common factor except 1. φ (n) = (p - 1) x (q-1) φ
(n) = (7 - 1) x (11 - 1) φ (n) = 6 x 10 φ (n) = 60.
Let us now choose relative prime 'e' of 60 as 7. Thus the public key is = (7, 77)
Step 4: A plaintext message m is encrypted using public key . Use C = me mod n to find
cipher text from plain text. C = 97 mod 77 C = 37
Step 5: The private key is . To determine the private key, d*e mod φ (n) = 1 7d mod 60 = 1 d
= 43 The private key is = (43, 77)
Step 6: A cipher text message c is decrypted using private key . To calculate plain text m
from the cipher text c following formula is used. m = cd mod n m = 3743 mod 77