Cybersecurity Concepts: Authentication, Encryption, and Threats

Cybersecurity Fundamentals

2-Second Authentication and CAPTCHAs

A 2-second authentication process alone does not inherently make a system secure because security depends on factors such as password strength, multifactor authentication, and system design. While it might slow down brute-force attacks, attackers could still exploit other vulnerabilities. CAPTCHAs address automated threats by ensuring that actions like login attempts are performed by humans rather than bots. This additional layer of defense protects against automated brute-force attacks.

Least Common Mechanism Principle

Which mechanism violates the “Least Common Mechanism” principle?

Answer: a. Global Variable

Explanation: Global variables are shared across multiple functions, which increases the risk of unintended interactions or data leaks, violating the principle of minimizing shared resources.

Incorrect Login Credentials Output

Which is a bad choice to output for incorrect login credentials?

Answer: d. Your password is incorrect

Explanation: This message reveals whether the username is valid, providing information that attackers could use to focus on cracking the password for valid usernames, increasing vulnerability.

How Websites Detect Adblockers

Websites detect adblockers by monitoring for the absence of ad scripts or elements that should be loaded. They can use JavaScript to check if ad-related requests are blocked or look for missing DOM elements associated with ads. Some websites also use anti-adblock scripts to actively counteract adblocker functionality.

Shor’s Algorithm and RSA Encryption

Shor’s Algorithm is a quantum algorithm that efficiently factors large numbers, the foundational problem underlying RSA encryption. Classical computers cannot factor large numbers quickly, ensuring RSA’s security. However, quantum computers implementing Shor’s algorithm can solve this problem exponentially faster, rendering RSA insecure if sufficiently powerful quantum computers become available. This threat underscores the need for post-quantum cryptographic algorithms.

Fuzz Testing for Vulnerabilities

Fuzz testing, or fuzzing, is a software testing technique that involves providing invalid, unexpected, or random inputs to a program to identify vulnerabilities. By exploring edge cases and uncovering unanticipated scenarios, fuzz testing reveals flaws such as crashes, memory leaks, or buffer overflows. It is especially effective for testing software that processes complex input data.

Trusted Execution Environments (TEEs) vs. TPM

Trusted Execution Environments (TEEs) create isolated areas within a processor where sensitive computations occur, protecting data and execution from unauthorized access or tampering. TPMs, on the other hand, are separate hardware modules designed for secure cryptographic operations and storage of sensitive information like encryption keys. While TEEs focus on securing runtime execution, TPMs are primarily used for data integrity and device authentication.

Cyber Warfare and State-Sponsored Attacks

Cyber warfare refers to the use of cyberattacks by nation-states to disrupt, damage, or gain an advantage over other nations by targeting critical infrastructure, systems, or data.

Examples:

  • Stuxnet: A worm allegedly developed by the U.S. and Israel to disrupt Iran’s nuclear enrichment program by targeting its industrial control systems.
  • NotPetya: A malware attack attributed to Russian actors that caused significant damage to Ukraine’s infrastructure and affected global businesses.

GDPR and Personal Data Management

The General Data Protection Regulation (GDPR) mandates strict rules for collecting, processing, and storing personal data. Organizations must gain explicit consent, ensure transparency in data usage, and allow individuals to access, correct, or delete their data. GDPR enforces accountability through Data Protection Officers, data breach notifications, and severe penalties for non-compliance, promoting privacy and data protection as fundamental rights.

Understanding Google Dorks

Google Dorks refer to advanced search techniques using Google operators to locate sensitive information or vulnerabilities unintentionally exposed online. For example, using specific search queries, attackers can find exposed files, unprotected databases, or misconfigured systems indexed by Google. While useful for security audits, Google Dorks can also be exploited maliciously.