NotesWhat is notes.io?

Notes brand slogan

Notes - notes.io

types of hacking research
1.political alt.2600,cult of dead,phrack,defcon,cert
2.commercial
3.social
4.financial
5.individual
Rate analysis
Adversary-an entity that attacks,or is a threat to a system
Hack-assault on system security that derives from an intelligent threat;i.e an an intelligent act that is a delivery attempt to evade security services and violet security policy of system.
countermeasure-an action,device procedure or technique that reduces threat,or vulnerability on an attack by preventing or eliminating
risk-An expectation of loss expressed as prob that a particular threat will exploit a certain vulnerability with particular harmful result.
Security policy-set of rules and practices that specify or regulate how a system or org provide security services to protect sensitive and critical system resources
Asset-Data contained in a information system or a service provided by a system,or a system capability.
A threat-is a potential for violation of security which exists when there is a circumstance,capability,action or event that would security and cause harm
Vulnerability-is a flaw or weakness in a system design,implementation or operation and management that could be exploited to violate system security policy
EXAMPLES OF THREATS

Hardware-Stolen or disabled an unencrypted cd-rom is stolen change of H/W configuration
software- deleted programs An unauthorise copy of software is made Working prog is modified to make fail during execution
Data- FILES are deleted an unauthorise read of data, existing files are modified or new file are fabricated
Communication lines-Messages destroyed or deleted. Messages are read, Messages are modified,delayed/duplicated
Security Vulns
Cross site scripting-(xss) occure whenever an application takes user suplied data and sends it to web browser without validating or encoding that data.
Injection Flaws-occure when user supplied is send to an interpreter as command or query
MALICIOUS FILES EXECUTION-code vuln to remote file inclusion allows attackers to include hostile code and data,resulting in diverstating attack,such as total server compromise
information leakage and improper error handling -app can unintentionally leak information about ther configuration,internal workings,or violet privacy through a variety of application problems.Attackers use this to steal sensitive data,or conduct more serious attack.
csrf-forces a logged on victim browser to send a pre-authanticated req to a vuln web app which then forces victi browser to perform a hostile action to the benefit of the attacker,
Broken auth and session management-account credentials and session token are often not properly protected.Attacker compromise passwords,keys,or auth tokens to assume other users identities.
Insecure communication-apps fail to encrypt network traffic
IDENTIFICATION AND AUTHENTICATION (I&A)
at any time a computer must with which other users it is working;to ensure that only legal entities are having access;to enforce authorization;to enforce accountability;
This can done in closed systems where all legal users are known to the system in advance or in open systems,i.e where user is not known to the system before time e.g in e-commerce
In whatever env a unique identity must be linked to a user,thi linking process consits of user offering some id to system and system req or challenging the user to prove that offered id actually belong to the user,this process is known as identification and auth.
purpose-ensure legal or auth users are allowed to access the system
i &a is easier in closed env than open env.
Identification process
1. identificaation of user-user id,can be stolen.proof of ownership
2.Authentication-verifying that user id belongs to the person or entity offering it ;some secrets parameters known only to real owner
Forms of secret parameters
.something user knows;possesses;is or combination
if it is password rules include
kept secret
user db kept confidential
Transfer of passwd between main system and ws must be secure
Protecting password storage
Scrambling of passwd before storage
Passdw file ecryption
Passwd file protected against un-auth access
Protecting passwd during Transmission
Networks can be tapped
passwd encrpted before transmission.
algorithm & shared key
First law of authentication
Keep your password secret at all time.(if your passwd is compromised an imposter can become you)
Choosing passwords
Minimum length
Not directly related to owner
Changed regularly
Should be as random as possible
No group passwds
N/B
Passwds are not secure;mostly widely used form of authentication bcoz they are easy to use,easy procedure
if password is stolen user doesnt know.

     
 
what is notes.io
 

Notes.io is a web-based application for taking notes. You can take your notes and share with others people. If you like taking long notes, notes.io is designed for you. To date, over 8,000,000,000 notes created and continuing...

With notes.io;

  • * You can take a note from anywhere and any device with internet connection.
  • * You can share the notes in social platforms (YouTube, Facebook, Twitter, instagram etc.).
  • * You can quickly share your contents without website, blog and e-mail.
  • * You don't need to create any Account to share a note. As you wish you can use quick, easy and best shortened notes with sms, websites, e-mail, or messaging services (WhatsApp, iMessage, Telegram, Signal).
  • * Notes.io has fabulous infrastructure design for a short link and allows you to share the note as an easy and understandable link.

Fast: Notes.io is built for speed and performance. You can take a notes quickly and browse your archive.

Easy: Notes.io doesn’t require installation. Just write and share note!

Short: Notes.io’s url just 8 character. You’ll get shorten link of your note when you want to share. (Ex: notes.io/q )

Free: Notes.io works for 12 years and has been free since the day it was started.


You immediately create your first note and start sharing with the ones you wish. If you want to contact us, you can use the following communication channels;


Email: [email protected]

Twitter: http://twitter.com/notesio

Instagram: http://instagram.com/notes.io

Facebook: http://facebook.com/notesio



Regards;
Notes.io Team

     
 
Shortened Note Link
 
 
Looding Image
 
     
 
Long File
 
 

For written notes was greater than 18KB Unable to shorten.

To be smaller than 18KB, please organize your notes, or sign in.