0% found this document useful (0 votes)
2 views3 pages

Cyber Security Essentials Answers

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views3 pages

Cyber Security Essentials Answers

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Cyber Security Essentials ?

Answer Key

Q.1 (6x2=12)

1. Cyberspace is the virtual environment where communication over computer networks occurs. Characteristics: global

reach, anonymity.

2. Zero-day attacks exploit unknown vulnerabilities; e.g., Stuxnet. Zero-click attacks require no user interaction; e.g.,

Pegasus spyware.

3. Social media privacy can be compromised through phishing, data scraping, or weak privacy settings.

4. RBI guidelines: Two-factor authentication and mandatory grievance redressal mechanisms.

5. Antivirus software detects and prevents malicious software, reducing infection risks.

6. Cyber-crimes targeting women and children: cyberstalking, online child pornography.

Q.2 A)

i) Cyber security involves protecting systems, networks, and data. Scope includes national defense, e-commerce, and

personal data. Challenges: sophisticated threats, lack of awareness.

ii) CERT-IN handles incident response; NCIIPC secures critical infrastructure.

Q.2 B)

i) Social media issues: cyberbullying, addiction, misinformation, data misuse, and digital footprint risks.

ii) Flagging content helps platforms identify and remove harmful materials; reporting informs enforcement.

Q.3 A)

i) Cyberspace architecture: includes users, networks, services, and data layers. E.g., a user accesses a web app via ISP
and cloud servers.

ii) Internet is the infrastructure; WWW is a service on it.

Q.3 B)

i) Best practices: strong passwords, limited sharing, reviewing privacy settings, avoiding unknown links.

ii) IT Act 2000 and Indian Penal Code address offensive posts.

Q.4 A)

i) E-commerce security: authentication, encryption, digital signatures, secure payment gateways.

ii) Aadhaar-enabled payments link Aadhaar to bank accounts; enable biometric payments.

Q.4 B)

i) IT Act 2000 provisions: identity theft (Section 66C), data breach (Section 72); punishable by fines/imprisonment.

ii) Firewalls monitor and control incoming/outgoing network traffic based on security rules.

Q.5 A)

i) Digital security checklist: SSL, encryption, data backup, user authentication, privacy policy.

ii) Campaign: ?Cyber Safe Campus ? Think Before You Click!?

Q.5 B)

i) Guide: verify sources, adjust settings, avoid oversharing, use MFA, report abuse.

ii) Security plan: PCI DSS compliance, encryption, staff training, fraud detection tools.
[Similar approach applied to Set 2 and 3 ? content too long to show here in full.]

-- End of Answer Key --

You might also like