Cyber Security All Questions
Cyber Security All Questions
Unit 1
1.Define Information Security. Explain the importance of
information security(REPEATED IN 0CT 2019)
Information Security is not only about securing information from unauthorized access.
Information Security is basically the practice of preventing unauthorized access, use, disclosure,
disruption, modification destruction of information. Information can be physical or electronic
one. Information can be anything like Your details or we can say your profile on social media,
your data in mobile phone, your biometrics etc.
Importance:
#1. Most businesses/individuals have information that needs protection
Businesses, hospitals, and governments are at risk because they handle massive amounts of
sensitive information. That includes financial accounts, social security numbers, medical
information, national security secrets, and more.
#2. Threats are everywhere
Information security threats are very common. They include worms, viruses, information
extortion, intellectual property theft, identity theft, and physical equipment theft. Information
security threats aren’t limited to malicious actors.
#3. Information security is required
In many countries, businesses dealing with data must implement information security policies
and strategies. entities will need to comply as data privacy remains a major issue.
#4. Security breaches are expensive
There are many aspects of a security breach and they can all be costly. To prevent another
breach, businesses and governments must also pay a specialist to analyze the situation and figure
out what happened
#5. Attacks are getting more impressive
Information security is even more essential these days because cyberattacks are getting more
sophisticated. The technology is improving, which not only means that hackers are getting better.
#6. There are state-sponsored hackers
sometimes a bigger agenda behind cyberattacks. Some hacker groups are funded by governments
to destabilize or interfere with other nations.
#7. IoT makes life easier for hackers
“IoT” stands for “internet of things.”. It’s a massive network of physical objects, Unfortunately,
many of these devices are vulnerable to attacks.
#8. Information security is a growing career field
It’s clear that information security is essential for any organization dealing with data. They’ll
need specialists to help implement strategies and policies. As the need increases, so do
employment opportunities.
#9. Information security builds trust
Companies can build trust by thoroughly researching the best security measures, conducting
regular assessments, and knowing what their third parties are up to.
Information security is always important, but it’s most important in times of crisis. The global
pandemic is a good example. Cyberattacks doubled in 2020.
Unit 2
3. What are the Security Threats to E-Commerce?
1)Financial frauds: Ever since the first online businesses entered the world of the internet,
financial fraudsters have been giving businesses a headache. There are various kinds of financial
frauds prevalent in the e-commerce industry
2)Credit Card Fraud: It happens when a cybercriminal uses stolen credit card data to buy
products on your e-commerce store. Usually, in such cases, the shipping and billing addresses
vary.
3) Fake Return & Refund Fraud: The bad players perform unauthorized transactions and clear
the trail, causing businesses great losses. Some hackers also engage in refund frauds, where they
file fake requests for returns.
4. Phishing: fraudsters present fake copies of your website pages or another reputable website to
trick the users into believing them. For example, see this image below. A seemingly harmless and
authentic email from PayPal asking to provide details
5)Spamming:Some bad players can send infected links via email or social media inboxes. They
can also leave these links in their comments or messages on blog posts and contact forms. Once
you click on such links, they will direct you to their spam websites, where you may end up being a
victim.
6)DoS & DDoS Attacks:Many e-commerce websites have incurred losses due to disruptions in
their website and overall sales because of DDoS (Distributed Denial of Service) attacks.
7)Malware:Hackers may design a malicious software and install on your IT and computer systems
without your knowledge. These malicious programs include spyware, viruses, trojan, and
ransomware
.8) Exploitation of Known Vulnerabilities:Attackers are on the lookout for certain vulnerabilities
that might be existing in your e-commerce store.
Often an e-commerce store is vulnerable to SQL injection (SQLi) and Cross-site Scripting (XSS)
9). Bots: can be seen as advanced form of worms. They are automated processes that are designed
to interact over the internet without the need for human interaction.
Some attackers develop special bots that can scrape your website to get information about
inventory and prices
10)Man in The Middle (MITM):A hacker may listen in on the communication taking place
between your e-commerce store and a user. If the user is connected to a vulnerable Wi-Fi or
network, such attackers can take advantage of that.
11) e-Skimming:E-skimming involves infecting a website’s checkout pages with malicious
software. The intention is to steal the clients’ personal and payment details.
12)Brute force:The online environment also has players who can use brute force to attack your
admin panel and crack your password. These fraudulent programs connect to your website and try
out thousands of combinations in an attempt to obtain you site’s passwords.
Credit card – An e payment method where the card is required for making payments through an
electronic device.
Direct debit – Direct debit transfers funds from a customer’s account with the help of a third
party (like Phonepe)
Natural Disaster: Natural Disasters are naturally occurring physical phenomena caused either
by rapid or slow onset events that have immediate impacts on human health and secondary
impacts causing further death and suffering.These disasters can
be:Geophysical,Hydrological,Climatological,Meteorological,Biologicale.g. Earthquakes,
Landslides, Tsunamis and Volcanic.
A natural disaster is a natural process or occurrence that can lead to property harm, injury or
other health effects, loss of livelihoods, loss of life, environmental damage, and economic
disruption
Man-made disasters have an element of human intent, negligence, or error involving a failure of
a man-made system, as opposed to natural disasters resulting from natural hazards. Such man-
made disasters are crime, arson (firebombing), civil disorder, terrorism, war, biological/chemical
threat, cyber-attacks, etc.
Natural disasters appears both seasonally and without warning, subjecting the nation to frequent
time of insecurity, disruption, and monetary loss. These resources serve to prepare IHEs for
several natural disasters, such as winter storms, floods, tornados, hurricanes, wildfires,
earthquakes, or any combination thereof.
There are specific natural disasters can severely damage the computer system directly, or avoid
its operations. These includes are as follows −
It can be local flooding such as fracture of air conditioning or water cooling equipment.
It can be local landslide, earth quake, subsidence, etc.
It is used to exceptional weather conditions.
Non-transferable
Near spoof-proof
Biometrics like face patterns, fingerprints, iris scanning, and others are near-impossible to
replicate with current technology.
There's a one in 64 billion chance that your fingerprint will match up exactly with
someone else's.
Unit 3
9.Explain Model of Cyptography Systems.[Oct 19]
2. Integrity The information cannot be altered in storage or transit between sender and
intended receiver without the alteration being detected.
3. Non-repudiation. The creator/sender of the information cannot deny at a later stage their
4. Authentication. The sender and receiver can confirm each other's identity and the
origin/destination of the information.
Types of cryptography
Symmetric key ncryption:
This is the simplest kind of encryption that involves only one secret key to cipher and decipher
information. Symmetric encryption is an old and best-known technique. It uses a secret key that
can either be a number, a word or a string of random letters. It is a blended with the plain text of
a message to change the content in a particular way.
The sender and the recipient should know the secret key that is used to encrypt and decrypt all
the messages. The main disadvantage of the symmetric key encryption is that all parties involved
have to exchange the key used to encrypt the data before they can decrypt it.
Asymmetric Encryption
Asymmetric encryption is also known as public key cryptography, which is a relatively new
method, compared to symmetric encryption. Asymmetric encryption uses two keys to encrypt a
plain text. Secret keys are exchanged over the Internet or a large network. It ensures that
malicious persons do not misuse the keys.
It is important to note that anyone with a secret key can decrypt the message and this is why
asymmetric encryption uses two related keys to boosting security. A public key is made freely
available to anyone who might want to send you a message. The second private key is kept a
secret so that you can only know.
Asymmetric encryption is mostly used in day-to-day communication channels, especially over
the Internet.
The digital signatures are different from other electronic signatures not only in terms of process
and result, but also it makes digital signatures more serviceable for legal purposes. Some
electronic signatures that legally recognizable as signatures may not be secure as digital
signatures and may lead to uncertainty and disputes.
Unit 4
11)Explain the basic concept of Network Security.[Oct 19]
Network security is the security provided to a network from unauthorized access and risks. It is
the duty of network administrators to adopt preventive measures to protect their networks from
potential security threats.
Computer networks that are involved in regular transactions and communication within the
government, individuals, or business require security. The most common and simple way of
protecting a network resource is by assigning it a unique name and a corresponding password.
Intrusion detection systems help in sending an alarm against any malicious activity in the
network, drop the packets, and reset the connection to save the IP address from any blockage.
Needs:
1) Attackers continuously develop new exploits and attack techniques designed to
circumvent your defenses.
2) A network intrusion detection system (NIDS) is crucial for network security because it
enables you to detect and respond to malicious traffic.
3) The primary benefit of an intrusion detection system is to ensure IT personnel is notified
when an attack or network intrusion might be taking place.
4) A network intrusion detection system (NIDS) monitors both inbound and outbound
traffic on the network, as well as data traversing between systems within the network.
5) The network IDS monitors network traffic and triggers alerts when suspicious activity or
known threats are detected.
6) IT personnel can examine more closely and take the appropriate steps to block or stop an
attack.
A VPN provides a secure, encrypted connection between two points. Before setting up the VPN
connection, the two endpoints of the connection create a shared encryption key. This can be
accomplished by providing a user with a password or using a key sharing algorithm.
A Virtual Private Network is a way to extend a private network using a public network such as
the internet.
The name only suggests that it is a Virtual “private network” i.e. user can be part of a local
network sitting at a remote location. It makes use of tunnelling protocols to establish a secure
connection.
A VPN provides a secure, encrypted connection between two points. Before setting up the VPN
connection, the two endpoints of the connection create a shared encryption key. This can be
accomplished by providing a user with a password or using a key sharing algorithm.
A Virtual Private Network is a way to extend a private network using a public network such as
the internet.
Types of VPNs
VPNs are designed to provide a private, encrypted connection between two points – but does not
specify what these points should be. This makes it possible to use VPNs in a few different
contexts:
Needs:
• Remote Access VPN: A remote access VPN is designed to link remote users securely
to a corporate network. For instance when the COVID-19 pandemic emerged in 2020, many
organizations transitioned to a remote workforce, and set up secure remote access VPNs from the
remote clients to connect to critical business operations at the corporate site.
Needs:
Needs:
Cloud Access: VPNaaS solutions are natively integrated into cloud platforms. This enables
remote workers to have secure, direct access to an organization’s cloud-based resources.
Global Footprint: VPNs deployed as physical appliances are limited to the locations where
an organization can host these appliances. VPNaaS solutions are implemented in the cloud,
providing them with a global footprint.
Mobile Support: Traditional VPNs are often clunky and difficult to use on mobile devices.
Many VPNaaS solutions have explicit mobile support that provides improved usability for the
remote workforce.
UNIT 5
16)Explain the Term Cybercrime in Brief[Oct 19]
What is meant by Cybercrime? What falls under the purview of Cybercrime, and what
constitutes the crime? Cybercrime is a criminal activity that mainly targets or involves using a
computer, network associated with a computer, or a connected device Cybercrime is not always
conducted by individuals or hackers but could be done by organizations too.
Hacking
Credit card fraud
Viruses Dissemination
Cyber terrorism
Spoofing (Email Spoofing, screen spoofing etc)
1. Email trackers are browser extensions for Chrome, which automatically add a 1x1 pixel
image to the body of the email you send.
2. Once a recipient opens it, their browser requests to get that image from the server where
it is hosted.
3. This request will be parsed, indicating that the email has been opened.
4. You can use this tool for recruitment and link-building to save time and know when to
follow-up with more emails in case the recipient opened the email but never answered.
They could have forgotten to reply, or something could have disturbed their attention.
Email Spoofing:
Email spoofing is the process of sending emails with a forged sender address. It deceives the
recipient into believing that the email is sent by someone they know or trust. It’s usually a
phishing tool designed to take over your online accounts, send malware, or steal money.
1. An attacker can spoof emails with a working Simple Mail Transfer Protocol (SMTP)
server and a popular email platform like Outlook or Gmail.
2. When the email arrives in the intended inbox, the email programme reads the contents of
these fields and generates the output that the end-reader sees.
3. If certain information is entered into the appropriate fields, what they see will differ from
what is true, such as the location of the email’s origin.
4. This is possible because SMTP does not support the authentication of addresses.
Although protocols and methods exist to combat spoofing, their adoption has been slow.
How the process of data recovery works is to delve into the most common data
loss scenarios.
Accidental File/Folder Deletion
Even after a file/folder is deleted, it is actually still in place. It is simply earmarked to be
written over when new files/folders are created.
For this reason, it’s possible to recover accidentally deleted files/folders with recovery
software. The software looks for these files that still remain after user deletion and gives
them the option of saving them to a location of their choice if they are found.
When a data storage device is formatted, you won’t be able to access the files that were
present before formatting. However, this doesn’t mean that those files aren’t recoverable.
Formatting erases the pointers that instruct your operating system on where to find your
files.
As long as your data storage device isn’t written to before attempting to recover files
after formatting, you should be able to recover your files. Data recovery software can
restore the file system pointers, allowing you to regain access to your files.
A file system may become damaged as a result of a power outage, a software crash, or as
a result of a power failure. This type of damage will result in users being unable to access
their files.
Many data recovery software tools are capable of repairing this logical damage, giving
users access to their data again.
Hardware Failure
Unfortunately, if your hard drive has physically failed, you will need to take it to a
professional data recovery shop to try to salvage your data.
They have the tools needed to attempt this intricate and potentially difficult process.
Software Error
Software errors can lead to things like accidentally deleted files and corrupted file
systems.
Luckily, in this case, data can be recovered using data recovery software.
Buffer overflow attacks – the most common DoS attack. The concept is to send more
traffic to a network address than the programmers have built the system to handle. It
includes the attacks listed below, in addition to others that are designed to exploit bugs
specific to certain applications or networks
ICMP flood – leverages misconfigured network devices by sending spoofed packets that
ping every computer on the targeted network, instead of just one specific machine. The
network is then triggered to amplify the traffic. This attack is also known as the smurf
attack or ping of death.
SYN flood – sends a request to connect to a server, but never completes the handshake.
Continues until all open ports are saturated with requests and none are available for
legitimate users to connect to.
Unit 6
21)Explain the features of IT Act 2000 with respect to
cyber law[Oct 19]
Cyber Law also called IT Law is the law regarding Information-technology including computers
and internet. It is related to legal informatics and supervises the digital circulation of information,
software, information security and e-commerce.
IT law does not consist a separate area of law rather it encloses aspects of contract, intellectual
property, privacy and data protection laws. Intellectual property is a key element of IT law
1. All electronic contracts made through secure electronic channels are legally valid.
3. Security measures for electronic records and also digital signatures are in place
4. A procedure for the appointment of adjudicating officers for holding inquiries under the Act
is finalized
5. Provision for establishing a Cyber Regulatory Appellant Tribunal under the Act. Further,
this tribunal will handle all appeals made against the order of the Controller or Adjudicating
Officer.
6. An appeal against the order of the Cyber Appellant Tribunal is possible only in the High
Court
7. Digital Signatures will use an asymmetric cryptosystem and also a hash function
8. Provision for the appointment of the Controller of Certifying Authorities (CCA) to license
and regulate the working of Certifying Authorities. The Controller to act as a repository of
all digital signatures.
10. Senior police officers and other officers can enter any public place and search and arrest
without warrant
11. Provisions for the constitution of a Cyber Regulations Advisory Committee to advise the
Central Government and Controller.
22) Write a note on IT act 2008[Oct 19]