Cyber Security Essentials ?
Answer Key
Q.1 (6x2=12)
1. Cyberspace is the virtual environment where communication over computer networks occurs. Characteristics: global
reach, anonymity.
2. Zero-day attacks exploit unknown vulnerabilities; e.g., Stuxnet. Zero-click attacks require no user interaction; e.g.,
Pegasus spyware.
3. Social media privacy can be compromised through phishing, data scraping, or weak privacy settings.
4. RBI guidelines: Two-factor authentication and mandatory grievance redressal mechanisms.
5. Antivirus software detects and prevents malicious software, reducing infection risks.
6. Cyber-crimes targeting women and children: cyberstalking, online child pornography.
Q.2 A)
i) Cyber security involves protecting systems, networks, and data. Scope includes national defense, e-commerce, and
personal data. Challenges: sophisticated threats, lack of awareness.
ii) CERT-IN handles incident response; NCIIPC secures critical infrastructure.
Q.2 B)
i) Social media issues: cyberbullying, addiction, misinformation, data misuse, and digital footprint risks.
ii) Flagging content helps platforms identify and remove harmful materials; reporting informs enforcement.
Q.3 A)
i) Cyberspace architecture: includes users, networks, services, and data layers. E.g., a user accesses a web app via ISP
and cloud servers.
ii) Internet is the infrastructure; WWW is a service on it.
Q.3 B)
i) Best practices: strong passwords, limited sharing, reviewing privacy settings, avoiding unknown links.
ii) IT Act 2000 and Indian Penal Code address offensive posts.
Q.4 A)
i) E-commerce security: authentication, encryption, digital signatures, secure payment gateways.
ii) Aadhaar-enabled payments link Aadhaar to bank accounts; enable biometric payments.
Q.4 B)
i) IT Act 2000 provisions: identity theft (Section 66C), data breach (Section 72); punishable by fines/imprisonment.
ii) Firewalls monitor and control incoming/outgoing network traffic based on security rules.
Q.5 A)
i) Digital security checklist: SSL, encryption, data backup, user authentication, privacy policy.
ii) Campaign: ?Cyber Safe Campus ? Think Before You Click!?
Q.5 B)
i) Guide: verify sources, adjust settings, avoid oversharing, use MFA, report abuse.
ii) Security plan: PCI DSS compliance, encryption, staff training, fraud detection tools.
[Similar approach applied to Set 2 and 3 ? content too long to show here in full.]
-- End of Answer Key --