Cryptography and Security - Simplified Notes
Unit 1: Cryptography
- 1.1 Cryptography in Practice
Cryptography hides information so only the right people can read it. Used in apps like WhatsApp, bank
websites, and VPNs.
- 1.2 Historical Perspectives
From Caesar Ciphers to WWII's Enigma Machine to modern math-based encryption.
- 1.3 Algorithms
Symmetric: Same key for both ends (e.g., AES). Asymmetric: Public key encrypts, private key decrypts (e.g.,
RSA).
- 1.4 Hashing Functions
One-way function that converts data into a fixed code. Used for passwords and file checks.
- 1.5 Symmetric Encryption
Fast, same key for both sides. Example: AES.
- 1.6 Asymmetric Encryption
Two keys: one public, one private. Example: RSA.
- 1.7 Quantum Cryptography
Uses quantum physics. If someone tries to spy, it's detected.
- 1.8 Uses
Used in emails, blockchain, shopping, banking, and messaging apps.
Cryptography and Security - Simplified Notes
Unit 2: Intrusion Detection Systems (IDS)
- 2.1 History
Started in 1980s, now uses AI to catch threats in real time.
- 2.2 IDS Overview
Watches for suspicious activity. Signature-based or anomaly-based.
- 2.3 Network-Based IDS
Monitors network traffic. Tools: Snort.
- 2.4 Host-Based IDS
Monitors a specific computer. Tools: OSSEC.
- 2.5 IPS
Prevents attacks in real-time. Example: Cisco Firepower.
- 2.6 Honeypots and Honeynets
Fake systems that attract hackers to study them.
- 2.7 IDS Tools
Snort, OSSEC, Suricata, Wireshark, Kali Linux.
Unit 3: Online Banking, Card, and UPI Security
- Online Banking
Risks: phishing, malware. Safety: 2FA, HTTPS, alerts.
- Mobile Banking
Cryptography and Security - Simplified Notes
Risks: fake apps, SIM swaps. Safety: biometric login, trusted stores.
- Card Security
Risks: skimming, fraud. Safety: EMV chip, OTPs.
- UPI Security
Risks: fake apps, scam requests. Safety: UPI PIN, alerts.
Unit 4: Data Destruction and Recovery
- Destruction
Normal delete isn't enough. Use shredding, wiping, degaussing, or physical destruction.
- Recovery
Use tools like Recuva or backup systems to restore lost data.
- Best Practices
Destroy old drives safely. Back up regularly. Use antivirus and monitor your drives.