aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMohit Agarwal <mohit.agarwal@sky.com>2024-01-01 18:55:33 +0000
committerMohit Agarwal <mohit.agarwal@sky.com>2024-01-01 18:55:33 +0000
commiteec6292056e6f6d6aa9f52ed2b71585e60632568 (patch)
tree5f87496cb57f51812871cb53bdbd4199ef0fa24c
parent9923e6e6fcc27a1a0f233b13e4c83d5d0c10b4d0 (diff)
RewritingHEADmaster
-rw-r--r--notes/algorithms.tex24
-rw-r--r--notes/cyber.tex53
-rw-r--r--notes/data-rep.tex15
-rw-r--r--notes/paper.tex6
4 files changed, 56 insertions, 42 deletions
diff --git a/notes/algorithms.tex b/notes/algorithms.tex
index 4801766..bffe1a9 100644
--- a/notes/algorithms.tex
+++ b/notes/algorithms.tex
@@ -91,11 +91,11 @@ of order so we would swap them. Here are some but not all steps on the
original list $n$
\begin{align*}
- &n = \{2,6,4,7,8,3,9,0\} \mbox{ comparing 2 and 6} \\
- &n = \{2,4,6,7,8,3,9,0\} \mbox{ comparing 6 and 4, \textit{swap}} \\
- &n = \{2,4,6,7,8,3,9,0\} \mbox{ comparing 6 and 7} \\
- &n = \{2,4,6,7,8,3,9,0\} \mbox{ comparing 7 and 8} \\
- &n = \{2,4,6,7,3,8,9,0\} \mbox{ comparing 8 and 3, \textit{swap}} \\
+ &n = \{\color{red}2\color{black},\color{red}6\color{black},4,7,8,3,9,0\} \mbox{ comparing 2 and 6} \\
+ &n = \{2,\color{red}4\color{black},\color{red}6\color{black},7,8,3,9,0\} \mbox{ comparing 6 and 4, \textit{swap}} \\
+ &n = \{2,4,\color{red}6\color{black},\color{red}7\color{black},8,3,9,0\} \mbox{ comparing 6 and 7} \\
+ &n = \{2,4,6,\color{red}7\color{black},\color{red}8\color{black},3,9,0\} \mbox{ comparing 7 and 8} \\
+ &n = \{2,4,6,7,\color{red}3\color{black},\color{red}8\color{black},9,0\} \mbox{ comparing 8 and 3, \textit{swap}} \\
&...
\end{align*}
@@ -111,13 +111,15 @@ sequentially add the smaller value between the lists to the output
\begin{align*}
list\ 1 &&list\ 2 &&output\ list\\
- \{1,3,5\}&&\{2,4,6\}&&\{\} &&\mbox{}\\
- \{3,5\} &&\{2,4,6\}&&\{1\} &&\mbox{Comparing 1 and 2, we start with 1}\\
- \{3,5\} &&\{4,6\} &&\{1,2\} &&\mbox{Comparing 3 and 2, we add 2}\\
- \{5\} &&\{4,6\} &&\{1,2,3\} &&\mbox{Comparing 3 and 4, we add 3}\\
- \{5\} &&\{6\} &&\{1,2,3,4\}&&\mbox{Comparing 5 and 4, we add 4}\\
- \{\} &&\{6\} &&\{1,2,3,4,5\}&&\mbox{Comparing 5 and 6, we add 5}\\
+ \{{\color{red}1},3,5\}&&\{{\color{red}2},4,6\}&&\{\} &&\mbox{}\\
+ \{{\color{red}3},5\} &&\{{\color{red}2},4,6\}&&\{1\} &&\mbox{Comparing 1 and 2, we start with 1}\\
+ \{{\color{red}3},5\} &&\{{\color{red}4},6\} &&\{1,2\} &&\mbox{Comparing 3 and 2, we add 2}\\
+ \{{\color{red}5}\} &&\{{\color{red}4},6\} &&\{1,2,3\} &&\mbox{Comparing 3 and 4, we add 3}\\
+ \{{\color{red}5}\} &&\{{\color{red}6}\} &&\{1,2,3,4\}&&\mbox{Comparing 5 and 4, we add 4}\\
+ \{\} &&\{{\color{red}6}\} &&\{1,2,3,4,5\}&&\mbox{Comparing 5 and 6, we add 5}\\
\{\} &&\{\} &&\{1,2,3,4,5,6\}&&\mbox{Comparing nothing and 6, we add 6}\\
+ \{\} &&\{\} &&\{1,2,3,4,5,6\}&&\mbox{Lists 1 \&
+ 2: we are finished}\\
\end{align*}
\section{Programming languages}
diff --git a/notes/cyber.tex b/notes/cyber.tex
index efa62ff..08b3f12 100644
--- a/notes/cyber.tex
+++ b/notes/cyber.tex
@@ -5,18 +5,19 @@ networks, and malicious threats and attacks that they are vulnerable
to.
\section{Threats}
-
-\begin{itemize}
- \item \textit{Social engineering} involves exploiting people
+ \textit{Social engineering} involves exploiting people
directly for access or information. \textit{Blagging} involves
obtaining information through deception or impersonation, such
as calling someone whilst posing as a friend.
- \textit{Phishing} is posing as a legitimate organisation to
+
+ \noindent\textit{Phishing} is posing as a legitimate organisation to
obtain personal information, generally through email.
- \textit{Pharming} involves a bogus website that imitates a
+
+ \noindent\textit{Pharming} involves a bogus website that imitates a
legitimate one. \textit{Shouldering} involves watching
somebody enter their personal information.
- \item \textit{Malicious code} is code written to do bad. A
+
+ \noindent\textit{Malicious code} is code written to do bad. A
\textit{virus} does damage on a computer and spreads itself on
a user's device over the internet. \textit{Spyware} is
software that monitors, logs, and sends information to the
@@ -26,28 +27,34 @@ to.
is designed to show the user advertisement and a
\textit{Trojan} is any malware that poses as a legitimate
software.
- \item \textit{Weak passwords} or \textit{misconfigured access
+
+ \noindent\textit{Weak passwords} or \textit{misconfigured access
rights} may allow an attacker easy access to unauthorised
data. Access rights would normally restrict certain
information from certain users.
- \item \textit{Removable media} such as a DVD or USB flash drive is
- a vector by which malware can easily spread, particularly when
- distributed, such as at a public event.
- \item Unpatched or outdated software may contain vulnerabilities,
- as well as normal software with recently discovered
- vulnerabilities which an attacker could exploit.
-\end{itemize}
+
+ \noindent\textit{Removable media} such as a DVD or USB flash drive is
+ a vector by which malware can spread, particularly when
+ distributed, such as at an event
+
+ \noindent\textbf{Unpatched or outdated} software may contain
+ widely known vulnerabilities, which an attacker could exploit.
\section{Threat prevention}
-\subsection{MAC Address filtering}
+\subsection{MAC address filtering}
-A \textit{MAC Address} is unique to each device. Filtering MAC
-Addresses could mean only allowing authorised devices to connect to
-the network (\textit{whitelisting}) or blocking certain devices from a
-network (\textit{blacklisting}). However, this is bypassable through
-MAC address \textit{spoofing}, where a device can appear to have a MAC
-address other than its own.
+A \textit{media access control address} is unique to each device. Filtering MAC
+addresses could mean:
+\begin{itemize}
+ \item \textit{whitelisting}, or only allowing authorised devices
+ to connect to or
+ \item \textit{blacklisting} which is blocking certain devices from
+ a network.
+\end{itemize}
+However, this is bypassable through MAC address \textit{spoofing},
+ where a device can appear to have a MAC address other than its
+ own.
\subsection{Firewall}
@@ -62,8 +69,8 @@ most common form of this is through a username and password. It can
also be through physical objects such as cards (such as credit card)
and through biometric methods such as fingerprints.
-CAPTCHA (tests that determine if a user is a human, such as by typing
-in a word in strange font) and e-mail verification (where the user
+CAPTCHA (tests that determine if a user is a human)
+and e-mail verification (where the user
must respond to an e-mail only they could have received) can also be
used as authentication and to ensure that the user is human and not an
automated attack.
diff --git a/notes/data-rep.tex b/notes/data-rep.tex
index f2f5ef4..7e93d0b 100644
--- a/notes/data-rep.tex
+++ b/notes/data-rep.tex
@@ -2,9 +2,9 @@
\section{Metadata}
-Metadata means data about data. It is the information stored in a file
-that is not part of the main information, but instead important
-properties and data of the file, such as the author name of a PDF
+Metadata is data about data: it is information stored in a file
+that is not part of the main data, but instead
+properties important to file, such as the author name of a PDF
document. Although we do not take it into account when calculating
file size, it is important to realise that in the real world, it would
be there.
@@ -188,8 +188,11 @@ the sting would be $7\times 10 = 70\ bits$ (as there are 10
characters).
Using the Huffman tree we have generated we can encode $repetitive$ as
-\begin{align*}
- 0100000101001110111001100
-\end{align*}
+
+
+\noindent\hspace*{0.3\textwidth}\texttt{0100000101001110111001100}\\
+ \hspace*{0.3\textwidth}\texttt{r\ \ \ e\ p\ \ \ e\ t\ i\ t\ i\ v\ \ e\ }
+
+
This uses $25\ bits$, which is a $(70-25)\div(70)\times 100 \approx
64.3\%$ saving.
diff --git a/notes/paper.tex b/notes/paper.tex
index b28234a..ed2d119 100644
--- a/notes/paper.tex
+++ b/notes/paper.tex
@@ -25,6 +25,8 @@ top=0.5in, bottom=0.8in ]{geometry}
\defaultfontfeatures{LetterSpace=1.05}
\setmainfont{Sabon}
+\usepackage{xcolor}
+
\ctikzset{resistor = european}
\usetikzlibrary{calc,shapes.geometric,shapes.gates.logic.US,arrows}
@@ -52,13 +54,13 @@ top=0.5in, bottom=0.8in ]{geometry}
\titleformat{\section}{\large}{}{0em}{}
\titleformat{\subsection}{\bfseries}{}{0em}{}
-\titleformat{\chapter}{\vspace{-2cm}\tt\huge\itshape}{\thechapter:}{5mm}{}
+\titleformat{\chapter}{\vspace{-2cm}\tt\LARGE\itshape}{\thechapter:}{5mm}{}
\begin{document}
\begin{titlepage}
\vspace*{4cm}
- \noindent\fontsize{1.30cm}{1cm}\selectfont
+ \noindent\fontsize{1.00cm}{0.80cm}\selectfont
\texttt{\textit{Computer Science}}
\vspace{2cm}