About topic
Know About topic
Security
Types of attacks
All About Security
The security of a computer system is a crucial task. It is a process of ensuring the confidentiality and integrity of the OS. A system is said to be secure if its resources are used and accessed as intended under all the circumstances, but no system can guarantee absolute security from several of various malicious threats and unauthorized access.
The security of a system can be threatened via two violations:
- Threat: A program that has the potential to cause serious damage to the system.
- Attack: An attempt to break security and make unauthorized use of an asset.
Security violations affecting the system can be categorized as malicious and accidental. Malicious threats, as the name suggests are a kind of harmful computer code or web script designed to create system vulnerabilities leading to back doors and security breaches. Accidental Threats, on the other hand, are comparatively easier to be protected against. Example: Denial of Service DDoS attack.
Types of threats
- Breach of confidentiality: This type of violation involves the unauthorized reading of data.
- Breach of integrity: This violation involves unauthorized modification of data.
- Breach of availability: It involves unauthorized destruction of data.
- Theft of service: It involves the unauthorized use of resources.
- Denial of service: It involves preventing legitimate use of the system. As mentioned before, such attacks can be accidental in nature.
Security System Goals
- Integrity: The objects in the system mustn't be accessed by any unauthorized user & any user not having sufficient rights should not be allowed to modify the important system files and resources.
- Secrecy: The objects of the system must be accessible only to a limited number of authorized users. Not everyone should be able to view the system files.
- Availability: All the resources of the system must be accessible to all the authorized users i.e only one user/process should not have the right to hog all the system resources. If such kind of situation occurs, denial of service could happen. In this kind of situation, malware might hog the resources for itself & thus preventing the legitimate processes from accessing the system resources.
All About Hashing Simulator
-
Inputs
- Type of hash function to be used
- Input text
-
Output
The output will be a 256-bit hash value which will be a function of the given input. These hashes are typically one-way functions and cannot be reversed. They are used to verify the integrity of data.
All About Socket Programming
-
Inputs
Type of functions calls -
Output
Output will be a visual representation of the communication between the server and the client system.
F.A.Q
Frequently Asked Questions
Questions related to system security
-
What is encryption?
Encryption is the process of using a code to stop other parties from accessing information. Data is encrypted with encryption algorithms, which are also known as ciphers. One of the most important distinctions between encryption and hashing (which we will get to later) is that encryption is designed to go both ways. This means that once something has been encrypted with a key, it can also be decrypted.
-
What is hashing?
Cryptographic hash functions are a special type of one-way calculation. They take a string of data of any size and always give an output of a predetermined length. This output is called the hash, hash value or message digest. Since these functions don't use keys, the result for a given input is always the same.
-
What is salting?
Salting is essentially the addition of random data before it is put through a hash function, and they are most commonly used with passwords. These are added to improve the randomness of the hash and maintain integrity of data.
-
What are hashes used for?
They are a core component of digital signatures, which are an important aspect of verifying authenticity and integrity on the internet. Hash message authentication codes (HMACs) also use hash functions to achieve similar results. Cryptographic hash functions can be used as normal hash functions as well. In these scenarios, they can act as checksums to verify data integrity, as fingerprinting algorithms that eliminate duplicate data, or to create hash tables to index data.