diff options
| author | Mohit Agarwal <mohit.agarwal@sky.com> | 2024-01-01 18:55:33 +0000 |
|---|---|---|
| committer | Mohit Agarwal <mohit.agarwal@sky.com> | 2024-01-01 18:55:33 +0000 |
| commit | eec6292056e6f6d6aa9f52ed2b71585e60632568 (patch) | |
| tree | 5f87496cb57f51812871cb53bdbd4199ef0fa24c /notes | |
| parent | 9923e6e6fcc27a1a0f233b13e4c83d5d0c10b4d0 (diff) | |
Diffstat (limited to 'notes')
| -rw-r--r-- | notes/algorithms.tex | 24 | ||||
| -rw-r--r-- | notes/cyber.tex | 53 | ||||
| -rw-r--r-- | notes/data-rep.tex | 15 | ||||
| -rw-r--r-- | notes/paper.tex | 6 |
4 files changed, 56 insertions, 42 deletions
diff --git a/notes/algorithms.tex b/notes/algorithms.tex index 4801766..bffe1a9 100644 --- a/notes/algorithms.tex +++ b/notes/algorithms.tex @@ -91,11 +91,11 @@ of order so we would swap them. Here are some but not all steps on the original list $n$ \begin{align*} - &n = \{2,6,4,7,8,3,9,0\} \mbox{ comparing 2 and 6} \\ - &n = \{2,4,6,7,8,3,9,0\} \mbox{ comparing 6 and 4, \textit{swap}} \\ - &n = \{2,4,6,7,8,3,9,0\} \mbox{ comparing 6 and 7} \\ - &n = \{2,4,6,7,8,3,9,0\} \mbox{ comparing 7 and 8} \\ - &n = \{2,4,6,7,3,8,9,0\} \mbox{ comparing 8 and 3, \textit{swap}} \\ + &n = \{\color{red}2\color{black},\color{red}6\color{black},4,7,8,3,9,0\} \mbox{ comparing 2 and 6} \\ + &n = \{2,\color{red}4\color{black},\color{red}6\color{black},7,8,3,9,0\} \mbox{ comparing 6 and 4, \textit{swap}} \\ + &n = \{2,4,\color{red}6\color{black},\color{red}7\color{black},8,3,9,0\} \mbox{ comparing 6 and 7} \\ + &n = \{2,4,6,\color{red}7\color{black},\color{red}8\color{black},3,9,0\} \mbox{ comparing 7 and 8} \\ + &n = \{2,4,6,7,\color{red}3\color{black},\color{red}8\color{black},9,0\} \mbox{ comparing 8 and 3, \textit{swap}} \\ &... \end{align*} @@ -111,13 +111,15 @@ sequentially add the smaller value between the lists to the output \begin{align*} list\ 1 &&list\ 2 &&output\ list\\ - \{1,3,5\}&&\{2,4,6\}&&\{\} &&\mbox{}\\ - \{3,5\} &&\{2,4,6\}&&\{1\} &&\mbox{Comparing 1 and 2, we start with 1}\\ - \{3,5\} &&\{4,6\} &&\{1,2\} &&\mbox{Comparing 3 and 2, we add 2}\\ - \{5\} &&\{4,6\} &&\{1,2,3\} &&\mbox{Comparing 3 and 4, we add 3}\\ - \{5\} &&\{6\} &&\{1,2,3,4\}&&\mbox{Comparing 5 and 4, we add 4}\\ - \{\} &&\{6\} &&\{1,2,3,4,5\}&&\mbox{Comparing 5 and 6, we add 5}\\ + \{{\color{red}1},3,5\}&&\{{\color{red}2},4,6\}&&\{\} &&\mbox{}\\ + \{{\color{red}3},5\} &&\{{\color{red}2},4,6\}&&\{1\} &&\mbox{Comparing 1 and 2, we start with 1}\\ + \{{\color{red}3},5\} &&\{{\color{red}4},6\} &&\{1,2\} &&\mbox{Comparing 3 and 2, we add 2}\\ + \{{\color{red}5}\} &&\{{\color{red}4},6\} &&\{1,2,3\} &&\mbox{Comparing 3 and 4, we add 3}\\ + \{{\color{red}5}\} &&\{{\color{red}6}\} &&\{1,2,3,4\}&&\mbox{Comparing 5 and 4, we add 4}\\ + \{\} &&\{{\color{red}6}\} &&\{1,2,3,4,5\}&&\mbox{Comparing 5 and 6, we add 5}\\ \{\} &&\{\} &&\{1,2,3,4,5,6\}&&\mbox{Comparing nothing and 6, we add 6}\\ + \{\} &&\{\} &&\{1,2,3,4,5,6\}&&\mbox{Lists 1 \& + 2: we are finished}\\ \end{align*} \section{Programming languages} diff --git a/notes/cyber.tex b/notes/cyber.tex index efa62ff..08b3f12 100644 --- a/notes/cyber.tex +++ b/notes/cyber.tex @@ -5,18 +5,19 @@ networks, and malicious threats and attacks that they are vulnerable to. \section{Threats} - -\begin{itemize} - \item \textit{Social engineering} involves exploiting people + \textit{Social engineering} involves exploiting people directly for access or information. \textit{Blagging} involves obtaining information through deception or impersonation, such as calling someone whilst posing as a friend. - \textit{Phishing} is posing as a legitimate organisation to + + \noindent\textit{Phishing} is posing as a legitimate organisation to obtain personal information, generally through email. - \textit{Pharming} involves a bogus website that imitates a + + \noindent\textit{Pharming} involves a bogus website that imitates a legitimate one. \textit{Shouldering} involves watching somebody enter their personal information. - \item \textit{Malicious code} is code written to do bad. A + + \noindent\textit{Malicious code} is code written to do bad. A \textit{virus} does damage on a computer and spreads itself on a user's device over the internet. \textit{Spyware} is software that monitors, logs, and sends information to the @@ -26,28 +27,34 @@ to. is designed to show the user advertisement and a \textit{Trojan} is any malware that poses as a legitimate software. - \item \textit{Weak passwords} or \textit{misconfigured access + + \noindent\textit{Weak passwords} or \textit{misconfigured access rights} may allow an attacker easy access to unauthorised data. Access rights would normally restrict certain information from certain users. - \item \textit{Removable media} such as a DVD or USB flash drive is - a vector by which malware can easily spread, particularly when - distributed, such as at a public event. - \item Unpatched or outdated software may contain vulnerabilities, - as well as normal software with recently discovered - vulnerabilities which an attacker could exploit. -\end{itemize} + + \noindent\textit{Removable media} such as a DVD or USB flash drive is + a vector by which malware can spread, particularly when + distributed, such as at an event + + \noindent\textbf{Unpatched or outdated} software may contain + widely known vulnerabilities, which an attacker could exploit. \section{Threat prevention} -\subsection{MAC Address filtering} +\subsection{MAC address filtering} -A \textit{MAC Address} is unique to each device. Filtering MAC -Addresses could mean only allowing authorised devices to connect to -the network (\textit{whitelisting}) or blocking certain devices from a -network (\textit{blacklisting}). However, this is bypassable through -MAC address \textit{spoofing}, where a device can appear to have a MAC -address other than its own. +A \textit{media access control address} is unique to each device. Filtering MAC +addresses could mean: +\begin{itemize} + \item \textit{whitelisting}, or only allowing authorised devices + to connect to or + \item \textit{blacklisting} which is blocking certain devices from + a network. +\end{itemize} +However, this is bypassable through MAC address \textit{spoofing}, + where a device can appear to have a MAC address other than its + own. \subsection{Firewall} @@ -62,8 +69,8 @@ most common form of this is through a username and password. It can also be through physical objects such as cards (such as credit card) and through biometric methods such as fingerprints. -CAPTCHA (tests that determine if a user is a human, such as by typing -in a word in strange font) and e-mail verification (where the user +CAPTCHA (tests that determine if a user is a human) +and e-mail verification (where the user must respond to an e-mail only they could have received) can also be used as authentication and to ensure that the user is human and not an automated attack. diff --git a/notes/data-rep.tex b/notes/data-rep.tex index f2f5ef4..7e93d0b 100644 --- a/notes/data-rep.tex +++ b/notes/data-rep.tex @@ -2,9 +2,9 @@ \section{Metadata} -Metadata means data about data. It is the information stored in a file -that is not part of the main information, but instead important -properties and data of the file, such as the author name of a PDF +Metadata is data about data: it is information stored in a file +that is not part of the main data, but instead +properties important to file, such as the author name of a PDF document. Although we do not take it into account when calculating file size, it is important to realise that in the real world, it would be there. @@ -188,8 +188,11 @@ the sting would be $7\times 10 = 70\ bits$ (as there are 10 characters). Using the Huffman tree we have generated we can encode $repetitive$ as -\begin{align*} - 0100000101001110111001100 -\end{align*} + + +\noindent\hspace*{0.3\textwidth}\texttt{0100000101001110111001100}\\ + \hspace*{0.3\textwidth}\texttt{r\ \ \ e\ p\ \ \ e\ t\ i\ t\ i\ v\ \ e\ } + + This uses $25\ bits$, which is a $(70-25)\div(70)\times 100 \approx 64.3\%$ saving. diff --git a/notes/paper.tex b/notes/paper.tex index b28234a..ed2d119 100644 --- a/notes/paper.tex +++ b/notes/paper.tex @@ -25,6 +25,8 @@ top=0.5in, bottom=0.8in ]{geometry} \defaultfontfeatures{LetterSpace=1.05} \setmainfont{Sabon} +\usepackage{xcolor} + \ctikzset{resistor = european} \usetikzlibrary{calc,shapes.geometric,shapes.gates.logic.US,arrows} @@ -52,13 +54,13 @@ top=0.5in, bottom=0.8in ]{geometry} \titleformat{\section}{\large}{}{0em}{} \titleformat{\subsection}{\bfseries}{}{0em}{} -\titleformat{\chapter}{\vspace{-2cm}\tt\huge\itshape}{\thechapter:}{5mm}{} +\titleformat{\chapter}{\vspace{-2cm}\tt\LARGE\itshape}{\thechapter:}{5mm}{} \begin{document} \begin{titlepage} \vspace*{4cm} - \noindent\fontsize{1.30cm}{1cm}\selectfont + \noindent\fontsize{1.00cm}{0.80cm}\selectfont \texttt{\textit{Computer Science}} \vspace{2cm} |
