Cyber Security Mca
Cyber Security Mca
4. People – Users, IT professionals, and stakeholders who interact with the system.
Information Systems help businesses improve efficiency, automate tasks, and support decision-making.
1. Transaction Processing System (TPS) – Handles day-to-day transactions (e.g., ATM system, billing
system).
3. Decision Support System (DSS) – Helps in complex decision-making by analyzing data (e.g.,
weather forecasting, stock market analysis).
4. Enterprise Resource Planning (ERP) – Integrates different departments like HR, finance, and
production (e.g., SAP, Oracle ERP).
5. Knowledge Management System (KMS) – Stores and manages organizational knowledge (e.g.,
company knowledge base).
Each system plays a crucial role in improving business efficiency and decision-making.
1. Planning – Identify the problem and define the objectives of the system.
4. Implementation – Develop the system, test it, and deploy it for users.
SDLC helps in developing reliable and efficient systems by following a step-by-step approach.
The CIA Triad is the foundation of Information Security and consists of three main principles:
1. Confidentiality – Ensures that only authorized users can access sensitive data. (e.g., password-
protected files)
2. Integrity – Ensures that data remains accurate and unchanged unless modified by authorized
users. (e.g., digital signatures, checksums)
3. Availability – Ensures that information is accessible when needed. (e.g., backup servers, disaster
recovery plans)
The CIA Triad helps organizations implement effective security measures to protect their information
systems.
1. Prevents Data Breaches – Protects sensitive personal and business data from hackers.
2. Ensures Business Continuity – Protects systems from cyber-attacks, ensuring smooth operations.
3. Maintains Customer Trust – Prevents identity theft and financial fraud, ensuring user
confidence.
4. Protects Against Financial Losses – Cyber-attacks can lead to loss of money and business
reputation.
5. Ensures Compliance – Many industries have legal requirements to secure data (e.g., GDPR,
HIPAA).
Implementing strong security measures is essential to protect businesses from cyber threats and
financial losses.
Q6: What are the major threats to Information Systems? Explain with examples.
Ans: There are various cyber threats that can compromise the security of Information Systems.
1. Malware – Malicious software like viruses, worms, and ransomware that damage or steal data.
(e.g., WannaCry ransomware attack)
2. Phishing – Cybercriminals send fake emails to steal user credentials or financial information.
3. Denial-of-Service (DoS) Attacks – Overloading a system to make it unavailable for users. (e.g.,
website crashes due to excessive traffic)
5. Zero-Day Exploits – Attacks that target unknown vulnerabilities in software before a fix is
available.
Understanding these threats helps organizations implement better security measures to protect their
data.
8. Cyber Security
1. Use Strong Passwords – Use complex passwords and multi-factor authentication (MFA).
Unit 2
1. Application Security
Q1: What is Application Security? Explain security measures for databases, e-mail, and the internet.
Ans:
Application Security refers to the practices and technologies used to protect applications from cyber
threats. It ensures that software, databases, and communication systems remain secure from
unauthorized access, attacks, and vulnerabilities.
1. Database Security:
o Use firewalls and Intrusion Detection Systems (IDS) to monitor suspicious activity.
2. E-mail Security:
3. Internet Security:
Application security protects businesses and users from cyber threats such as hacking, malware, and
phishing.
Ans:
Data Security ensures that data is protected from unauthorized access, loss, or corruption. Three
important aspects of data security are Backups, Archival Storage, and Disposal of Data.
1. Backups:
o Backups should be stored in secure locations (cloud storage, external hard drives).
2. Archival Storage:
3. Disposal of Data:
Proper data security measures help protect sensitive information from cyber threats and accidental loss.
3. Security Technology
Q3: What is Security Technology? Explain Firewall, VPNs, and Intrusion Detection System.
Ans:
Security technologies protect networks and systems from cyber threats. Some essential security
technologies are:
1. Firewall:
Using security technologies like firewalls, VPNs, and IDS helps prevent cyber-attacks and protect sensitive
data.
4. Access Control
Ans:
Access Control ensures that only authorized users can access specific resources like systems, databases,
or applications. It helps prevent unauthorized access, data breaches, and cyber-attacks.
o Example: An HR employee can access payroll data, but a sales employee cannot.
o Example: A system allows access only from a company laptop, not personal devices.
Access control ensures data security by preventing unauthorized users from accessing sensitive
information.
5. Security Threats
Ans:
Security threats are cyber-attacks or malicious activities that harm computer systems and networks.
Some common threats include:
1. Viruses:
2. Worms:
3. Trojan Horse:
4. Logic Bombs:
o Malicious code triggered by specific conditions (e.g., deleting files on a certain date).
5. Trapdoors (Backdoors):
6. Spoofing:
o Attackers impersonate trusted entities (e.g., fake websites or emails) to steal data.
7. E-mail Viruses:
8. Macro Viruses:
Unit 3
1. Introduction to E-Commerce
Ans:
E-Commerce (Electronic Commerce) refers to buying and selling goods or services over the internet. It
includes online shopping, electronic payments, and digital transactions.
Advantages of E-Commerce:
Disadvantages of E-Commerce:
E-Commerce is growing rapidly due to its ease of access and technological advancements.
2. Threats to E-Commerce
Ans:
E-Commerce platforms face several security threats, including:
To counter these threats, e-commerce sites use encryption, firewalls, and secure payment gateways.
Ans:
An Electronic Payment System (EPS) enables secure financial transactions over the internet. It is used in
online shopping, bill payments, and banking.
2. Credit/Debit Cards – Secure online transactions using card details (e.g., Visa, MasterCard).
4. Mobile Payments – Payments using mobile apps (e.g., Google Pay, PhonePe).
Electronic payments provide fast, secure, and cashless transactions, improving the e-commerce
experience.
Digital signatures enhance security in e-commerce, online banking, and legal documents.
Ans:
Cryptography is the practice of securing data by converting it into an unreadable format using
encryption techniques.
Types of Cryptography:
1. Symmetric Encryption – The same key is used for encryption and decryption (e.g., AES, DES).
2. Asymmetric Encryption – Uses a pair of public and private keys (e.g., RSA, ECC).
Cryptography protects sensitive information from cyber threats in communication and transactions.
Ans:
A Secure Information System (SIS) protects data and transactions from cyber threats.
3. Implement Security Controls – Apply access controls, IDS, and secure coding.
Developing secure systems helps prevent data breaches and cyber threats.
Ans:
Information Security Governance (ISG) involves policies and strategies to protect an organization’s data
and IT systems.
Importance of ISG:
Ans:
Security Architecture & Design focuses on building secure IT systems by implementing security
measures at different layers.
Key Elements:
A strong security architecture ensures that IT systems remain protected from cyber threats.
Q9: What are security issues in hardware, data storage, and downloadable devices?
Ans:
Security risks exist in different areas of IT infrastructure:
Security measures like encryption, physical locks, and controlled access prevent unauthorized use of IT
assets.
Ans:
Physical security ensures that IT assets like servers, networks, and storage devices remain safe from
theft, damage, or unauthorized access.
4. Fire & Disaster Protection – Installing fire suppression systems and disaster recovery plans.
Implementing physical security measures helps prevent data loss, system downtime, and security
breaches.
Unit 4
1. Security Policies
Q1: What are Security Policies? Why should they be developed?
Ans:
A Security Policy is a set of rules and guidelines designed to protect an organization's data, IT systems,
and users from security threats.
Security policies are essential for maintaining data integrity, confidentiality, and availability.
Q2: What is the Security Policy Review Process? Explain its steps.
Ans:
The Policy Review Process ensures that security policies remain effective and updated with evolving
threats.
1. Assessment of Current Policies – Analyze existing security policies and their effectiveness.
4. Approval & Documentation – Get management approval and formally document changes.
Regular policy reviews help organizations stay ahead of cyber threats and regulatory changes.
Q3: How should security policies be published and communicated within an organization?
Ans:
After a security policy is developed, it must be published and communicated properly to ensure
compliance.
Methods of Publishing Security Policies:
Notification Requirements:
Employees should acknowledge they have read and understood the policies.
Proper publication and notification ensure that employees follow security guidelines effectively.
Q4: What are different types of security policies? Explain with examples.
Ans:
Security policies vary based on the organization’s needs. The main types of security policies are:
Example: Employees should not open suspicious email attachments or share sensitive data via
email.
Covers all aspects of IT security, including data protection, access control, and incident response.
Example: Employees must use strong passwords and multi-factor authentication (MFA).
Example: Employees must use VPNs when accessing company data from personal devices.
Different security policies help organizations maintain a safe and secure IT environment.
Ans:
Background:
XYZ Corporation is a multinational IT company handling sensitive client data. Recently, they experienced
a cyberattack where hackers accessed confidential customer information.
2. Data Encryption – Secured stored and transmitted data using AES encryption.
3. Employee Training – Conducted security awareness programs on phishing and cyber threats.
Employees became more aware of cyber threats and followed security best practices.
Lessons Learned:
Unit 5
Q1: What are Information Security Standards? Explain ISO standards for Information Security.
Ans:
Information Security Standards are guidelines and best practices that help organizations protect their
data, systems, and networks from security threats.
ISO (International Organization for Standardization) provides globally recognized security standards.
1. ISO 27001:
2. ISO 27002:
3. ISO 27701:
Ans:
The Information Technology (IT) Act 2000 is India’s primary law dealing with cybercrime and electronic
commerce.
1. Legal Recognition of Electronic Transactions – Digital signatures and electronic records are
legally valid.
2. Cyber Crime Punishments – Defines penalties for hacking, identity theft, and data breaches.
3. Data Protection & Privacy – Protects sensitive personal information from misuse.
5. Establishment of CERT-In – The Computer Emergency Response Team (CERT-In) monitors cyber
threats in India.
The IT Act 2000 was later amended in 2008 to address evolving cyber threats.
Q3: What is the Copyright Act? How does it protect digital content?
Ans:
The Copyright Act, 1957 protects original works like books, music, films, and software from unauthorized
use.
2. Online Content Protection – Protects digital books, music, and videos from piracy.
3. Penalty for Copyright Infringement – Fines and imprisonment for unauthorized use of
copyrighted material.
4. Digital Rights Management (DRM) – Controls access to copyrighted content using encryption.
The Copyright Act ensures that creators retain rights over their work and prevent software piracy.
Importance of IPR:
2. Prevents Unauthorized Use – Ensures only the owner can benefit from their work.
4. Legal Protection – Owners can take legal action against patent or copyright violations.
Q5: What are the key laws under Intellectual Property Rights (IPR)?
Ans:
India has several laws to protect Intellectual Property (IP):
These laws ensure that innovators and businesses retain exclusive rights over their creations.
Q6: What are Cyber Crimes? Explain different types with examples.
Ans:
A Cyber Crime is a criminal activity involving computers, networks, or digital data.
2. Identity Theft – Stealing personal information to commit fraud (Example: Using stolen Aadhaar
details).
3. Phishing – Fake emails tricking users into giving sensitive information (Example: Fraudulent bank
emails).
4. Cyber Bullying – Online harassment or threats (Example: Abusive social media messages).
6. Ransomware Attacks – Malware that locks data and demands ransom (Example: WannaCry
attack).
Cyber crimes are increasing, making cyber laws essential for protecting individuals and businesses.
Ans:
India has several Cyber Laws to address online crimes and digital security.
1. IT Act 2000 – Main law for cyber security, covering hacking, fraud, and privacy.
2. Indian Penal Code (IPC) Section 420 – Deals with online fraud and cheating.
3. Personal Data Protection Bill (PDPB) – Focuses on data privacy and protection.
4. Cyber Security Framework by CERT-In – Issues guidelines for cyber security best practices.
Cyber laws ensure that criminal activities in the digital space are properly addressed.
Ans:
Software Piracy is the illegal copying, distribution, or use of software without a proper license.
Ans:
A Software License is a legal agreement between the software developer and the user, defining how the
software can be used.
1. Proprietary License – The software is owned by a company, and users need permission to use it
(Example: Windows OS).
2. Open-Source License – Free software with modifiable source code (Example: Linux OS).
3. Freemium License – Basic version is free, but advanced features need payment (Example:
Spotify).
4. Enterprise License – Allows multiple users within an organization (Example: Microsoft Office 365
for companies).
5. Trial License – Free software for a limited period (Example: Adobe Photoshop 30-day trial).