Skip to main content

Posts

How to Protect Your Website from Cyber Attacks?

In today's world of technology everything can be done online and millions of websites are on the internet. But along with it comes the darker sides like hacking, online fraud, phishing, spamming and other cyber-attacks. The trending topic in Information technology field today is Web security. As the web applications increase in number, so does the hackers and the instances of cyber-attacks.
Attackers always try to find the weak points in the website and exploit those flaws to perform any illegitimate or malicious activity. These flaws or weaknesses in the websites are known as vulnerabilities. Anything that can harm the security of the applications and the servers is vulnerability. The basis of web security is based on CIA triangle - Confidentiality, Integrity and Availability. Confidentiality lays stress on protection of data and sensitive information. Integrity involves the accuracy, reliability and consistency of data while availability deals with maintenance of hardware and so…
Recent posts

Protect Information on Public WiFi

How often do you hear cases of social media accounts, bank accounts and other private accounts being hacked? This has become some sort of a common occurrence for internet users especially those with an affinity for public WiFi. It seems like people don’t know the proper ways to protect information on public WiFi. They go around dipping their devices in any network they can find and end up falling victim to cyber crimes.

It is often that you see ladies complaining that their Instagram accounts have been hacked and their private (NSFW) photos doing rounds on social media and pornography websites. Cyber insecurity seems to be the order of the day especially with the new trend of internet memes where people’s photos are being used against their will giving rise to numerous unwanted lawsuits.

Public WiFi has always been the number one medium for cyber crimes. All the disgraced I.T graduates are well aware that that is the best place to land victims and they have taken full advantage. While…

Cyber Security Awareness: for Employees

The insecurity of data and information that exists on the internet and computer networks has been a major issue for a number of businesses, organizations, and institutions; which don't invest on network and internet security training and awareness programs for their employees. Ideally, most employers rush to invest in new and expensive technologies in the name of protecting their companies online, not knowing that in most cases, the safety of a company online largely depends on the cyber security awareness of the employees. Consequently, your company's protection online starts by ensuring that your employees are well equipped with basic network safety practices and policies, so that they can assist in keeping your computers and networks safe from cyber-attacks that come in form of a virus, malware, and cyber-crime.

Different Ways to Create Cyber Security Awareness to Your Employees:
1.Authentication
The most basic network security measure that your employees need to use is a pass…

What are Active and Passive Attacks?

Passive Attacks:
Passive attack is an attack in which the purpose of the attacker is to only monitor or gain information about the system and/or its users i.e. traffic. This is only done to get the information from there without any aim of changing or damaging it. Passive attacks are considered to be attacks on confidentiality since the information present on the victim system is compromised in this type of attack. For example, if the system is of a shopping cart which stores the financial data of its customers such as credit card or bank account then this information is at risk. The attacker monitors the traffic on the network and finds that the user is sending his credit card information and captures that information. Passive attacks are quite difficult to track since the data is not altered by these attacks.
Active Attacks:
In this type of attack, the intension of the attacker is to alter the information from the victim’s system. The attacker makes changes to the data present at the vi…

HCI: How do You Strive for Consistency?

The eight golden rules of interface design by Ben Shneiderman are considered to be bases for user centric design. Among these eight rules striving for consistency is an important one. The rule helps mapping human psychology with software interfaces. Our brain tends to make patterns out of everything it interacts with and by following this rule, our brain will find it easier to use the system. And that is the whole purpose of user centric design – make the software usable for humans.
What is consistency in an interface?
This basically means that the interface must follow a pattern throughout. The dialog boxes in case of software or mobile app, and color of links and buttons in case of website should be same. It seems to be an obvious thing that every UI designer would follow; after all who would have two different colors of links for same web page or software screen. But the rule actually applies to more general things than what are obvious. For example, consider a mobile app for both …

Simplified DES Example: Step by Step

Simplified DES or S-DES is an encryption algorithm which follows feistal cipher structure. In this tutorial, we will take an example of S-DES. Let’s get started.
We need plaintext and key to start with. For this example, let’s consider 01001000 be the 8-bit plaintext and 1110001110 be the 10-bit key.
Key Generation: The first step in S-DES process is key generation. From the 10-bit key that we give as input, it generates 2 1-bit keys called k1 and k2. Following is the process:
1.Pass the 10-bit input key into the P10 table:
3 5 2 7 4 10 1 9 8 6
This gives: 1011001110. (For example, take the 3rd bit from input key which is 1. It becomes the first bit for our new key) 2.Divide the new key into two halves and left shift each half’s bits by one. So by dividing we get 10110 and 01110. We perform left shift so the left most bit becomes the right most bit and remaining each bit is shifted to its left. This gives: 01101 and 11100. Or you can think of it as the left most bit is taken to the righ…