0% found this document useful (0 votes)
28 views3 pages

Cryptography and Security Simplified Notes

The document provides an overview of cryptography, intrusion detection systems, online banking security, and data destruction and recovery. It covers key concepts such as symmetric and asymmetric encryption, the evolution of IDS, and security measures for online banking and card transactions. Additionally, it emphasizes best practices for data destruction and recovery.

Uploaded by

ind.maverick18
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Topics covered

  • Fraud Prevention,
  • Two-Factor Authentication,
  • Scam Requests,
  • Backup Systems,
  • Cryptography,
  • Mobile Banking Risks,
  • Kali Linux,
  • Historical Cryptography,
  • Encryption,
  • OSSEC
0% found this document useful (0 votes)
28 views3 pages

Cryptography and Security Simplified Notes

The document provides an overview of cryptography, intrusion detection systems, online banking security, and data destruction and recovery. It covers key concepts such as symmetric and asymmetric encryption, the evolution of IDS, and security measures for online banking and card transactions. Additionally, it emphasizes best practices for data destruction and recovery.

Uploaded by

ind.maverick18
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Topics covered

  • Fraud Prevention,
  • Two-Factor Authentication,
  • Scam Requests,
  • Backup Systems,
  • Cryptography,
  • Mobile Banking Risks,
  • Kali Linux,
  • Historical Cryptography,
  • Encryption,
  • OSSEC

Cryptography and Security - Simplified Notes

Unit 1: Cryptography

- 1.1 Cryptography in Practice

Cryptography hides information so only the right people can read it. Used in apps like WhatsApp, bank

websites, and VPNs.

- 1.2 Historical Perspectives

From Caesar Ciphers to WWII's Enigma Machine to modern math-based encryption.

- 1.3 Algorithms

Symmetric: Same key for both ends (e.g., AES). Asymmetric: Public key encrypts, private key decrypts (e.g.,

RSA).

- 1.4 Hashing Functions

One-way function that converts data into a fixed code. Used for passwords and file checks.

- 1.5 Symmetric Encryption

Fast, same key for both sides. Example: AES.

- 1.6 Asymmetric Encryption

Two keys: one public, one private. Example: RSA.

- 1.7 Quantum Cryptography

Uses quantum physics. If someone tries to spy, it's detected.

- 1.8 Uses

Used in emails, blockchain, shopping, banking, and messaging apps.


Cryptography and Security - Simplified Notes

Unit 2: Intrusion Detection Systems (IDS)

- 2.1 History

Started in 1980s, now uses AI to catch threats in real time.

- 2.2 IDS Overview

Watches for suspicious activity. Signature-based or anomaly-based.

- 2.3 Network-Based IDS

Monitors network traffic. Tools: Snort.

- 2.4 Host-Based IDS

Monitors a specific computer. Tools: OSSEC.

- 2.5 IPS

Prevents attacks in real-time. Example: Cisco Firepower.

- 2.6 Honeypots and Honeynets

Fake systems that attract hackers to study them.

- 2.7 IDS Tools

Snort, OSSEC, Suricata, Wireshark, Kali Linux.

Unit 3: Online Banking, Card, and UPI Security

- Online Banking

Risks: phishing, malware. Safety: 2FA, HTTPS, alerts.

- Mobile Banking
Cryptography and Security - Simplified Notes

Risks: fake apps, SIM swaps. Safety: biometric login, trusted stores.

- Card Security

Risks: skimming, fraud. Safety: EMV chip, OTPs.

- UPI Security

Risks: fake apps, scam requests. Safety: UPI PIN, alerts.

Unit 4: Data Destruction and Recovery

- Destruction

Normal delete isn't enough. Use shredding, wiping, degaussing, or physical destruction.

- Recovery

Use tools like Recuva or backup systems to restore lost data.

- Best Practices

Destroy old drives safely. Back up regularly. Use antivirus and monitor your drives.

You might also like