Linux
Networks
Cryptography
Security Basics
Information
secuirty
100

I am used to navigate directories in Linux

cd

100

It's a unique identification label assigned to a device connected to a network. It helps locate and communicate with specific devices on the internet.

IP address

100


The reverse process  of transforming plain text into ciphertext

 Decryption 

100

I am lengthy, complex , unique and I make your life hard if you foget me

Password

100

I am a triangle but I'm important  in information security?


  • Confidentiality
  • Integrity
  • Availability


200

Tux!

The mascot of the Linux kernel

200


Tests basic connectivity by sending echo requests and measuring response times

ping tests basic connectivity by sending echo requests and measuring response times

200

I can be shared easily or I can be mathematically linked.

Symmetric Key Cryptography (Shared Secret Key)

  • Both the sender and receiver use the same secret key for both encryption and decryption.
  • Advantages:
    • Faster encryption and decryption due to simpler algorithms.
    • Efficient for bulk data encryption.
  • Disadvantages:
    • Key distribution is a major challenge. Sharing the same key securely with all authorized recipients can be difficult.
    • Compromising a single key exposes all encrypted data protected by that key.

Asymmetric Key Cryptography (Public Key and Private Key)

  • Uses a pair of mathematically linked keys - a public key and a private key. The public key is widely distributed, while the private key is kept strictly confidential by the owner.
  • Encryption: Data is encrypted with the receiver's public key, and only the corresponding private key can decrypt it. 
  • Decryption: Encrypted messages can only be decrypted using the corresponding private key.

Advantages:

  • Secure key distribution: Public keys can be freely shared without compromising the security of the system.
  • Digital Signatures: Enables secure verification of message authenticity and origin.

Disadvantages:

  • Slower encryption and decryption: Due to the more complex mathematical operations involved compared to symmetric key systems.
200

An attack that preys on human emotions and trust to trick them into giving away personal information or clicking malicious links.

Social engineering attacks 

Be a Human Firewall:

  • Slow down and Verify
  • Question Everything

Be Wary of Tactics:

  • Recognize common tricks
  • Don't share sensitive information
200

What are these?

  • Develop a disaster recovery plan
  • Educate employees
  • Perform regular backups 
  • Consider MFA
  • Enforce strong passwords 
  • Encrypt data at rest and in transit 
  • Implement access controls( principle of least privilege )


  Data security best practices


300

I require you to enter your own user password to gain root access.

sudo 

300

It is like a neighborhood street network. It connects houses (devices) within a close proximity and allows them to communicate efficiently.

LAN

300

The art and science of breaking ciphers

Cryptanalysis 

300

Acts like a security guard for your computer network. It monitors incoming and outgoing traffic, deciding what gets in and what gets blocked. This helps shield your device from various cyber threats.

A firewall 

300

A crucial process that helps organizations identify, analyze, and prioritize potential threats and vulnerabilities to their information systems and data.

Risk assessment 

400

I change file permissions for user, group, and others and my twin changes file ownership


  • chmod 
  • chown



400

I'm a connection-oriented, reliable protocol with guaranteed delivery and error checking, suited for data transfer where order and accuracy are critical

TCP

400

It states that the security of a cryptosystem should rely solely on the secrecy of the key, not on the secrecy of the algorithm itself.

Kerckhoffs's Principle

400
  • Deceptive people can use information you share online to target you. They might pretend to be someone you know, exploit your interests, or use personal details to craft a believable con.

Social Engineering Scams

500

I  connect the standard output of one command to the standard input of another. 


Pipes (|)

500

A conceptual framework that divides network communication processes into seven distinct layers.

The OSI model:

  • Application
  • Presentation
  • Session
  • Transport
  • Network
  • Data Link
  • Physical


500

Crack the following message: "phvvdjh phdqv wr wkh dqgdwlf"

"hello world this is a secret" Cesar