Cryptography
Protecting data by converting plaintext –> ciphertext so that it cannot be understood without the correct key.
Keep data secure when it is sent over a network.
To prevent unauthorised access, data theft, or modification.
To maintain the three principles of security: Confidentiality, Integrity, Authentication. Cryptography converts readable plaintext into unreadable ciphertext. This allows secure communication even if attackers intercept the data.
File Encryption
Encryption is the process of converting data into an unreadable format using a mathematical algorithm and a key. Only someone with the correct decryption key can revert the ciphertext to its original form.
Symmetric encryption: Same key is used for both encryption and decryption.
Asymmetric encryption: Uses a public key to encrypt and a private key to decrypt.
Caesar Cypher
Caesar Cypher replaces each letter of the alphabet with another letter a fixed distance away from the original letter. To decrypt the message, recipient must know how many places the alphabest has been shifted by, this is known as the key. If the recipient knows the key, they can decrypt the message.
Vernam Cypher
Vernam Cypher offers perfect security if the encryption key is equal to or longer than the plaintext message, if the key is truly random and if the key is used only once and then destroyed.
Biometrics
Measurement and recording of physical characteristics of a person. Uniquely identify that person.
Examples:
Facial recognition data
Fingerprint data
Iris scan data.
Used for authentication, identification, access control, security and convenience.
Objections to Biometrics
Hacking
Black Hat Hacking. Hackers who break into systems illegally. Aim to steal data, cause damage, or make money. Considered criminal activity.
White Hat Hacking. Ethical hackers who have permission to test systems. Aim to find weaknesses so they can be fixed. Work to protect organisations.
Penetration Testing
Penetration Testing is a planned, authorised test to check system security in which testers act like attackers to find vulnerabilities. Helps organisations improve their defences and is often carried out by trained white-hat professionals.
Internal Penetration Test
Test carried out from inside the organisation’s network. Checks what damage an insider or someone who broke in could do.
External Penetration Test
Test carried out from outside the organisation. Checks internet-facing systems.
Network Penetration Test
Tests servers, routers, switches, and network security. Looks for open ports, weak services, misconfigurations. Can be internal or external.
Web Penetration Test
Tests websites, web apps, logins, APIs. Looks for issues like SQL injection, broken authentication. Very common in modern organisations.
Blind Penetration testing
The tester is given minimal information. Often only the organisation’s name or the target domain. No network diagrams, no internal access, no credentials.
The test simulates a real external attacker. Because real attackers don’t get documentation. The tester must discover everything themselves.
It measures two things: How secure the system is. How quickly the organisation detects an attack.
It usually costs more and takes longer because the tester spends a lot of time gathering information.