Skip to content

Commit

Permalink
Added week 10-11 Notes
Browse files Browse the repository at this point in the history
Added week 10-11 Notes
  • Loading branch information
madhurimarawat authored Dec 5, 2024
1 parent a2f4afb commit a702de8
Show file tree
Hide file tree
Showing 18 changed files with 389 additions and 0 deletions.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Original file line number Diff line number Diff line change
@@ -0,0 +1,192 @@
<!--
Author: Madhurima Rawat
Date: 21 November 2024
Brief: This table provides an overview of various cybersecurity protection tools, detailing their definitions,
examples, and key features. The tools listed include antivirus software, firewalls, intrusion detection systems,
and more, each designed to protect users from cyber threats and ensure data privacy and security.
Additional Details:
- Color Palette: The table uses a soft pastel color scheme to visually separate sections, including shades
such as light teal, lavender, and muted pink for a clean and professional design.
- Emoji Usage: Emojis are included to make the content visually engaging. Each protection tool is paired
with a relevant emoji (e.g., 🦠 for Antivirus Software, 🔒 for VPN) to symbolize the purpose or function
of the tool.
- Design: The table is designed to be clear and easy to navigate, with alternating background colors for
each row to improve readability. The headers have a bold and contrasting color to stand out.
- Purpose: The goal of this table is to provide an informative and educational overview of cybersecurity
protection tools that are crucial for securing digital environments. It is intended for anyone seeking to
learn about or implement cybersecurity solutions to safeguard against cyber threats.
-->


<!DOCTYPE html>
<html lang="en">

<head>
<meta charset="UTF-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Cybersecurity Protection Table</title>
<style>
body {
font-family: Arial, sans-serif;
background-color: #f7f7ff;
margin: 20px;
color: #333;
text-align: center;
}

h1 {
color: #FF6347;
}

table {
width: 100%;
border-collapse: collapse;
font-family: Arial, sans-serif;
}

th,
td {
padding: 12px;
border: 1px solid #ccc;
}

th {
background-color: #FF6347;
color: #fff;
}

tr:nth-child(2) th,
tr:nth-child(2) td {
background-color: #ffe4e1;
}

/* Muted pink */
tr:nth-child(3) th,
tr:nth-child(3) td {
background-color: #e6e6fa;
}

/* Lavender */
tr:nth-child(4) th,
tr:nth-child(4) td {
background-color: #e0ffff;
}

/* Cyan */
tr:nth-child(5) th,
tr:nth-child(5) td {
background-color: #ffebcd;
}

/* Lemon */
tr:nth-child(6) th,
tr:nth-child(6) td {
background-color: #ffcccb;
}

/* Coral */
tr:nth-child(7) th,
tr:nth-child(7) td {
background-color: #e0f2f1;
}

/* Teal */
tr:nth-child(8) th,
tr:nth-child(8) td {
background-color: #fafad2;
}

/* Lemon Chiffon */
tr:nth-child(9) th,
tr:nth-child(9) td {
background-color: #d0f0c0;
}

/* Light Teal */
td:first-child {
font-weight: bold;
}

/* Last Child */
tr:last-child th,
tr:last-child td {
background-color: #FFFEA3;
/* Light teal */
}
</style>
</head>

<body>
<h1>Cybersecurity Protection Tools 🛡️</h1>
<table>
<tr>
<th>Protection Tool 🛠️</th>
<th>Definition 📖</th>
<th>Examples 📝</th>
<th>Features 🔑</th>
</tr>
<tr>
<td>Antivirus Software 🦠</td>
<td>Detects and removes malicious software.</td>
<td>Norton, McAfee, Kaspersky</td>
<td>Real-time scanning, virus removal, heuristic analysis.</td>
</tr>
<tr>
<td>Antispyware Software 👀</td>
<td>Prevents and removes spyware infections.</td>
<td>Spybot, Malwarebytes</td>
<td>Privacy protection, keystroke monitoring detection, updates.</td>
</tr>
<tr>
<td>Firewall 🔥</td>
<td>Monitors and controls incoming/outgoing network traffic.</td>
<td>Windows Defender, ZoneAlarm</td>
<td>Packet filtering, access control, intrusion prevention.</td>
</tr>
<tr>
<td>Intrusion Detection System (IDS) 🚨</td>
<td>Detects suspicious activity in a network.</td>
<td>Snort, Suricata</td>
<td>Signature-based detection, anomaly monitoring, real-time alerts.</td>
</tr>
<tr>
<td>Virtual Private Network (VPN) 🔒</td>
<td>Encrypts internet traffic for privacy and security.</td>
<td>NordVPN, ExpressVPN</td>
<td>Data encryption, IP masking, secure remote access.</td>
</tr>
<tr>
<td>Password Managers 🔑</td>
<td>Securely stores and generates passwords.</td>
<td>LastPass, Dashlane</td>
<td>Encryption, auto-fill, password health checks.</td>
</tr>
<tr>
<td>Email Filtering Tools 📧</td>
<td>Blocks spam and phishing emails.</td>
<td>SpamTitan, Mimecast</td>
<td>Content filtering, domain blacklists, attachment scanning.</td>
</tr>
<tr>
<td>Multi-Factor Authentication (MFA) 🔑🔑</td>
<td>Adds extra authentication layers for security.</td>
<td>Google Authenticator, Duo</td>
<td>2FA codes, biometric security, one-time passwords.</td>
</tr>
<tr>
<td>Endpoint Detection and Response (EDR) 💻</td>
<td>Monitors endpoints for threats and vulnerabilities.</td>
<td>CrowdStrike, Carbon Black</td>
<td>Endpoint monitoring, forensic tools, threat response.</td>
</tr>
</table>
</body>

<br>
<footer>
<p style="color: #FF6347; font-size: 20px;"><b>&copy; 2024 Madhurima Rawat. All rights reserved.</b></p>
</footer>

</html>
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
197 changes: 197 additions & 0 deletions 7 SEMESTER/Management Information System/Week 11/Notes/Malware.html
Original file line number Diff line number Diff line change
@@ -0,0 +1,197 @@
<!--
Author: Madhurima Rawat
Date: 21 November 2024
Brief: This table outlines common cybersecurity threats, their definitions, examples, and key properties.
It provides a quick reference to understand different types of cyber threats and how they can impact systems
and users, including viruses, spyware, ransomware, and phishing.
Additional Details:
- Color Palette: The table uses a light pastel color scheme with alternating shades such as lavender, coral,
cyan, and light teal for different rows, ensuring the table is easy to read and visually appealing.
- Emoji Usage: Each threat type is paired with a relevant emoji (e.g., 🦠 for Virus, 🛠️ for Rootkit, 🎣 for Phishing),
enhancing the visual representation and making the content more engaging.
- Design: The table is designed for clarity, with each row colored differently for easy differentiation.
The headers use a contrasting color to stand out and maintain a cohesive design.
- Purpose: The goal of this table is to educate users about various cybersecurity threats, the characteristics of
each, and examples of well-known threats that have posed security risks in the past. This information is valuable
for individuals and organizations looking to strengthen their cybersecurity knowledge and practices.
-->


<!DOCTYPE html>
<html lang="en">

<head>
<meta charset="UTF-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Cybersecurity Threats Table</title>
<style>
body {
font-family: Arial, sans-serif;
background-color: #f7f7ff;
margin: 20px;
color: #333;
text-align: center;
}

h1 {
color: #FF6347;
}

table {
width: 100%;
border-collapse: collapse;
font-family: Arial, sans-serif;
}

th,
td {
padding: 12px;
border: 1px solid #ccc;
}

th {
background-color: #FF6347;
color: #fff;
}

tr:nth-child(2) th,
tr:nth-child(2) td {
background-color: #ffe4e1;
}

/* Muted pink */
tr:nth-child(3) th,
tr:nth-child(3) td {
background-color: #e6e6fa;
}

/* Lavender */
tr:nth-child(4) th,
tr:nth-child(4) td {
background-color: #e0ffff;
}

/* Cyan */
tr:nth-child(5) th,
tr:nth-child(5) td {
background-color: #ffebcd;
}

/* Lemon */
tr:nth-child(6) th,
tr:nth-child(6) td {
background-color: #ffcccb;
}

/* Coral */
tr:nth-child(7) th,
tr:nth-child(7) td {
background-color: #e0f2f1;
}

/* Teal */
tr:nth-child(8) th,
tr:nth-child(8) td {
background-color: #fafad2;
}

/* Lemon Chiffon */
tr:nth-child(9) th,
tr:nth-child(9) td {
background-color: #d0f0c0;
}

/* Light Teal */
td:first-child {
font-weight: bold;
}

/* Last Child */
tr:last-child th,
tr:last-child td {
background-color: #FFFEA3;
/* Light teal */
}
</style>
</head>

<body>
<h1>Cybersecurity Threats 🚨</h1>
<table>
<tr>
<th>Threat Type 🛡️</th>
<th>Definition 📖</th>
<th>Examples 📝</th>
<th>Properties 🔑</th>
</tr>
<tr>
<td>Virus 🦠</td>
<td>A malicious code that replicates by attaching itself to programs.</td>
<td>ILOVEYOU, Melissa</td>
<td>Self-replicating, requires host program, spreads via infected files.</td>
</tr>
<tr>
<td>Bug 🐞</td>
<td>Software flaw causing unintended behavior or vulnerabilities.</td>
<td>Heartbleed, Shellshock</td>
<td>Exploitable flaws, unintentional errors, patchable.</td>
</tr>
<tr>
<td>Malware 💻</td>
<td>Malicious software designed to harm or exploit systems.</td>
<td>Ransomware, Trojans</td>
<td>Infiltration, disruption, data theft, various types (adware, spyware).</td>
</tr>
<tr>
<td>Spyware 👀</td>
<td>Software that secretly monitors user activity.</td>
<td>CoolWebSearch, FinFisher</td>
<td>Tracks user data, keystroke logging, hides in legit software.</td>
</tr>
<tr>
<td>Adware 📢</td>
<td>Software displaying unwanted ads, often bundled with other apps.</td>
<td>Fireball, DollarRevenue</td>
<td>Intrusive, collects data, slows down systems.</td>
</tr>
<tr>
<td>Ransomware 💰</td>
<td>Locks or encrypts data until a ransom is paid.</td>
<td>WannaCry, Petya</td>
<td>Data encryption, extortion, spreads via phishing emails.</td>
</tr>
<tr>
<td>Trojan Horse 🐎</td>
<td>Malicious code disguised as legitimate software.</td>
<td>Emotet, Zeus</td>
<td>Backdoor access, spreads malware, data theft.</td>
</tr>
<tr>
<td>Phishing 🎣</td>
<td>Fraudulent attempts to steal sensitive information.</td>
<td>Email scams, fake websites</td>
<td>Deception, impersonation, data theft.</td>
</tr>
<tr>
<td>Worm 🪱</td>
<td>Self-replicating malware that spreads across networks.</td>
<td>Code Red, Mydoom</td>
<td>No host needed, network spread, consumes resources.</td>
</tr>
<tr>
<td>Rootkit 🛠️</td>
<td>Allows unauthorized access by masking its presence.</td>
<td>ZeroAccess, Flame</td>
<td>Hides in OS, grants administrative control, hard to detect.</td>
</tr>
</table>
</body>

<br>
<footer>
<p style="color: #FF6347; font-size: 20px;"><b>&copy; 2024 Madhurima Rawat. All rights reserved.</b></p>
</footer>

</html>
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.

0 comments on commit a702de8

Please sign in to comment.