CS Dec 2023 Scheme
CS Dec 2023 Scheme
Model Answers
NOTE: All model answers are general specific to subject, if any answers are relevant,
please give marks.
SECTION-1
1a. Define cyber security. Explain CIA and AAA security principles. 10M
Security principles
The basic tenets of information security are confidentiality, integrity and availability.
1. Confidentiality:
The purpose of the confidentiality is to ensure that only those authorized users are allowed to
view or access the information. The purpose of the confidentiality is to avoid the
unauthorized person/ user. Confidentiality is achieved through Encryption.
2. Integrity:
The assurance that the data received are exactly same as sent by the authorized user. i.e. the
data contains no modification, no insertion, no deletion etc. Integrity is achieved by using
Hash code or Checksum.
3. Availability: This principle makes the information to be available and useful for its
authorized people always. It ensures that these accesses are not hindered by system
malfunction or cyber- attacks.
1.Authentication
The process by which it can be identified that the user, which wants to access the
network resources, valid or not by asking some credentials such as username and password.
CYBER SECURITY (20CS54IT) DEC 2023
2. Authorization:
Once the authentication is successfully done, authorization can be used to determine which
resources are the user is allowed to access and what operations they can be performed.
3.Accounting
It provides means of monitoring and capturing the events done by the user while
accessing the network resources. It even monitors how long the user has access to the
network. The administrator can create an accounting method list to specify what should be
accounted for and to whom the accounting records should be sent.
1b. What is malware? List and explain any five types of malwares. 10M
1. Spyware
2. Adware
3. Backdoor
4. Ransomware
5. Scareware
6. Rootkit
7. Virus
8. Trojan horse
9. Worm
● A virus is the most common type of malware that can execute itself and spread by
infecting other programs or files.
● A worm can self-replicate without a host program and typically spreads without any
interaction from the malware authors.
CYBER SECURITY (20CS54IT) DEC 2023
OR
2a. Illustrate the purpose of defence in depth? Explain the layers of defence in depth. 10M
2b. Illustrate:
Denial-of-Service: DOS attack is the type of attack where an attacker sends enormous amount of
request at the rate which the server cannot handle. The following are the effects of DOS attacks
● Slowdown of response.
● Slowdown of server or Crash of server.
● Increase the level of traffic in the network
● Interrupts the other network services for the user
● Causes significant loss of time and money
Distributed DoS: A Distributed DoS (DDoS) attack is similar to a DoS attack but originates
from multiple, coordinated sources. For example:
● An attacker builds a network (botnet) of infected hosts called zombies, which are
controlled by handler systems.
● The zombie computers will constantly scan and infect more hosts, creating more and
more zombies.
● When ready, the hacker will instruct the handler systems to make the botnet of
zombies carry out a DDoS attack.
ON path Attack
● Man in The Middle: A MitM attack happens when a cybercriminal takes control of a
device without the user‘s knowledge. With this level of access, an attacker can intercept
and capture user information before it is sent to its intended destination. These types of
CYBER SECURITY (20CS54IT) DEC 2023
attacks are often used to steal financial information. There are many types of malware that
possess MitM attack capabilities.
● Man In The Mobile: A variation of man-in-middle, MitMo is a type of attack used to
take control over a user‘s mobile device. When infected, the mobile device is instructed to
exfiltrate user-sensitive information and send it to the attackers. ZeuS is one example of a
malware package with MitMo capabilities. It allows attackers to quietly capture two- step
verification SMS messages that are sent to users.
SECTION-II
3a. Write the steps of RSA-algorithm. Given p=17, q=11, e=7.Find the decryption key(d).
10M
d=((192*1)+1)/7
d=23
6. Hence the decryption key(d) is =23.
3b. Analyze & identify the need for digital signature. Explain the working principle of digital
signature 10M
Digital signatures
Digital signature is a cryptographic value that is calculated from the data and a secret
key known only by the signer.
In real world, the receiver of message needs assurance that the message belongs to the
sender and he should not be able to repudiate the origination of that message. Apart from
ability to provide non repudiation of the message, the digital signature also provides message
authentication and data integrity.
Digital signature uses the concept of public key encryption method. The below fig
explain the concept og digital signature.
OR
Explanation:
Sender uses digital signature generation algorithm that uses sender private key and the
message(M) to generate the Digital Signature(S).
Then the Sender appends the Digital Signature(S) to the Message(M) and transferred to the
Receiver.
CYBER SECURITY (20CS54IT) DEC 2023
The receiver uses Digital Signature Analyzer algorithm to validate the signature, it uses
sender’s public key to validate the signature. If the validation is successful, then the receiver
accepts the message.
4b. What is the purpose of Public key infrastructure(PKI),explain the different components of PKI.
As shown in the illustration, the CA accepts the application from a client to certify his
public key. The CA, after duly verifying identity of client, issues a digital certificate to that
client.
CYBER SECURITY (20CS54IT) DEC 2023
4b. Find:
10M
i. Euler totient function-φ(255),φ(256)
ii. Find GCD(360,210), GCD(136,260)
φ(255)
CYBER SECURITY (20CS54IT) DEC 2023
255=5*3*17
Here p1=5, p2=3, p3=17
φ(255)=φ(255)*((1-1)/p1) ((1-1)/p2) ((1-1)/p3))
φ(255)=255*(((1-1)/5) ((1-1)/3) ((1-1)/17) )
=255*((4/5)*(2/3)*(16/17))
=128
φ(256)
256=28
Here p1=2
φ(256)=φ(256)*((1-1)/p1))
φ(256)=256*(((1-1)/2))
=256*(1/2)
=128
GCD(360,210)
1. 360 mod 210=150
2. 210 mod 150=60
3. 150 mod 60=30
4. 60 mod 30=00
Since remainder is 0, GCD(360,210)=30.
GCD(136,260)
1. 260 mod 136=124
2. 136 mod 124=12
3. 124 mod 12=4
4. 12 mod 4=00
Since remainder is 0, GCD(136,260)=4
SECTION-III
5a. Explain the following security devices in cyber security. 10M
i. Firewall
ii. IDS
i) Firewall
CYBER SECURITY (20CS54IT) DEC 2023
The primary purpose of the firewall is to allow non harmful traffic and to filter malicious packets
based on the predefined rule. The filtering rules is based on the information contained in the
network packets, such as
1. Source IP address: It is the address of the computer that generates packets.
2. Destination IP address: It is the address of the computer that receives the packet.
ii) IDS(Intrusion Detection System)
An Intrusion Detection System (IDS) is a system that monitors network traffic for
suspicious activity and issues alerts when such activity is discovered. It is a software application
that scans a network or a system for the harmful activity or policy breaching. Any malicious
venture or violation is normally reported either to an administrator or collected centrally using a
security information and event management (SIEM) system. A SIEM system integrates outputs
from multiple sources and uses alarm filtering techniques to differentiate malicious activity from
false alarms.
The working of IDS is as shown below figure
CYBER SECURITY (20CS54IT) DEC 2023
An IDS monitors the network traffic for suspicious or malicious activity based on pre-defined
pattern or signature. When IDS detects an issue alerts the network administrator to take action.
5b. Explain the different phases of Microsoft Secure SDLC. 10M
Microsoft SDL consists of seven components including five core phases and two
supporting security activities. The five core phases are requirements, design,
implementation, verification, and release. Each of these phases contains mandatory checks
and approvals to ensure all security and privacy requirements and best practices are properly
addressed. The two supporting security activities, training and response are conducted
before and after the core phases respectively to ensure they're properly implemented, and
software remains secure after deployment.
Training
All Microsoft employees are required to complete general security awareness
training and specific training appropriate to their role.
Requirements
Every product, service, and feature Microsoft develops starts with clearly defined
security and privacy requirements; they're the foundation of secure applications and
inform their design. Development teams define these requirements based on factors
such as the type of data the product will handle, known threats, best practices,
regulations and industry requirements, and lessons learned from previous incidents.
Once defined, the requirements are clearly defined, documented, and tracked.
Design
CYBER SECURITY (20CS54IT) DEC 2023
Once the security, privacy, and functional requirements have been defined, the
design of the software can begin. As a part of the design process, threat models are
created to help identify, categorize, and rate potential threats according to risk. Threat
models must be maintained and updated throughout the lifecycle of each product as
changes are made to the software.
Implementation
Implementation begins with developers writing code according to the plan they
created in the previous two phases. Microsoft provides developers with a suite of
secure development tools to effectively implement all the security, privacy, and
function requirements of the software they design. These tools include compilers,
secure development environments, and built-in security checks.
Verification Testing
Before any written code can be released, several checks and approvals are required
to verify that the code conforms to SDL, meets design requirements, and is free of
coding errors.
Various automated checks are also required and are built into the commit pipeline to
analyze code during check-in and when builds are compiled. The security checks used
at Microsoft fall in to the following categories.
1. Static code analysis
2. Binary analysis
3. Credential and secret scanner
4. Encryption scanning
5. Fuzz testing.
Release
After passing all required security tests and reviews, builds aren't immediately
released to all customers. Builds are systematically and gradually released to larger and
larger groups, referred to as rings, in what is called a safe deployment process (SDP).
These rings can be defined as
● Ring 0: The development team is responsible for service
● Ring 1: All Microsoft employees
● Ring 2: User outside of Microsoft
● Ring 4: Worldwide release in sub-phase.
CYBER SECURITY (20CS54IT) DEC 2023
Response
All Microsoft services are extensively logged and monitored after release,
identifying potential security incidents using a centralized proprietary near-real-time
monitoring system.
OR
6a. Write a note on 10M
i. Third Party patch management
ii. Bit locker drive Encryption
Third Party patch management
Third-party patching or third-party patch management, is essentially the process of
deploying patch updates to third-party applications that have been installed on one or more of
your endpoints (e.g., servers, desktops, or laptops). Third-party patching addresses bugs or
vulnerabilities in the software that either affect its function or security. Patching software
vulnerabilities is a critical part of your overall IT security process that helps prevent exploitation
by hackers.
Third-party risk management (TPRM) is a form of risk management that focuses on
identifying and reducing risks relating to the use of third parties (sometimes referred to as
vendors, suppliers, partners, contractors, or service providers)
Why is Third-Party Risk Management Important?
While third-party risk isn’t a new concept, upticks in breaches across industries and a greater
reliance on outsourcing have brought the discipline into the forefront like never before.
Disruptive events, have impacted almost every business and their third parties – no matter the
size, location, or industry. In addition, data breaches or cyber security incidents are common. In
in 2021, the impact that third parties have on business resilience was highlighted through outages
and other third-party incidents. Some of the ways you can be impacted are:
Microsoft BitLocker improves file and system protections by mitigating unauthorized data
access. It uses the Advanced Encryption Standard algorithm with 128- or 256-bit keys. BitLocker
combines the on-disk encryption process and special key management techniques.
Although BitLocker first debuted with Windows Vista in 2007, beginning with Windows
10 version 1511, Microsoft updated BitLocker, introducing new encryption algorithms, new
group policy settings, new operating system (OS) drives and removable data drives. This update
applies to Windows 11, 10 and Server 2016 and above. BitLocker itself works on Pro, Enterprise
and Education editions of Windows.
Open Web Application Security(OWASP) is a non profit organization that has identified most
common vulnerabilities such as
1. Broken Access Control: If the authentication access restriction are not properly implemented,
its easy for attackers to take whatever they want. With broken access control, unauthorized
user’s may have access to sensitive files and system.
CYBER SECURITY (20CS54IT) DEC 2023
SECTION-IV
7a. Differentiate between the different categories of cloud delivery models. 10M
The Cloud Computing Service Delivery Models.
● Infrastructure as a Service(IaaS)
● Platform as a Service(PaaS)
● Software as a Service(SaaS)
Infrastructure as a Service(IaaS)
IaaS is a cloud delivery model that delivers the computer infrastructure to support various
operations.
CYBER SECURITY (20CS54IT) DEC 2023
Typically IaaS provides the infrastructure such as networking equipments, devices, database
and web servers. It is also known as Hardware as a Service.
Platform as a Service(PaaS)
PaaS is a cloud delivery model that delivers platform and environment to the software
developers to build applications and services.
PaaS services are hosted in the cloud and accesses by the user via their web browser.
PaaS fress the user from having to install hardware or software to develop and run the new
applications.
Here the consumer does not manage or control infrastructure including network, servers, OS
or Storage.
Software as a Service(SaaS): SaaS is a cloud delivery model that delivers the services and
applications over the internet. Instead of installing and maintaining software, the user access
it via internet through their browser, it frees the user from the complex software and hardware
management.
Most SaaS applications can be run directly from a web browser without any downloads or
installation required.
SaaS is also known as Web based software, on demand software or hosted software.
7b. What is the need of Identity and Access Management(IAM)?Explain any five IAM best practices.
10M
Many companies have applications, platforms, and tools that are designed with
implicit trust features. Implicit trust means that if users have access to your network or log in
to a tool, the system “remembers” them and doesn’t always prompt the user to verify their
identity again. These lax access permissions can pose a major risk to your organization’s
CYBER SECURITY (20CS54IT) DEC 2023
security stance if an unauthorized entity gains access to your system via a remembered
credential.
Protecting your most valuable data involves limiting who can access it as much as
possible—but, to limit access, you first need to know where your most valuable data is stored
and how it is used.
Your IAM technologies are only as strong as the identity management best
practices and policies that support them. If your team is leveraging single sign-on (SSO)
tools, it’s critical that each user’s password is strong, unique, and difficult to guess to support
password and IAM best practices. Passwords must be complex enough to deter cyberattacks,
frequently changed, and not used for multiple sign-on requirements.
5. Automate Workflows
IAM tools offer IT teams many opportunities to use automation to make your
organization more secure. Automation reduces manual errors, streamlines workflows, and
supports compliance and governance needs.
OR
HTTP methods: The HTTP method indicates the what action to be perform by the Server.
These method names are case sensitive and they must be used in uppercase.
● GET Method
● HEAD Method
● POST Method
● PUT Method
● DELETE Method
● CONNECT Method
● OPTION Method
● TRACE Method
GET Method:
A GET request retrieves data from a web server by specifying parameters in the URL
portion of the request. This is the main method used for document retrieval.
HEAD Method:
The HEAD method is functionally similar to GET, except that the server replies with
are status line and Header section only.
POST Method:
The POST method is used when you want to send some data to the server, for
example, file update, form data, etc using HTML forms.
PUT Method:
The PUT method is used to request the server to store the included entity-body at a
location specified by the given URL.
DELETE Method:
The DELETE method is used to request the server to delete a file at a location
specified by the given URL.
CONNECT Method:
OPTIONS Method:
CYBER SECURITY (20CS54IT) DEC 2023
The OPTIONS method is used by the client to find out the HTTP methods and other
options supported by a web server. The client can specify a URL for the OPTIONS method,
or an asterisk (*) to refer to the entire server.
TRACE Method:
The TRACE method is used to echo the contents of an HTTP Request back to the
requester which can be used for debugging purpose at the time of development.
Android architecture contains different number of components to support any android device
needs.
The main components of android architecture are following:-
● Applications
● Application Framework
● Android Runtime
● Platform Libraries
● Linux Kernel
Applications –
Applications is the top layer of android architecture. The pre-installed applications like
home, contacts, camera, gallery etc and third party applications downloaded from the play
store like chat applications, games etc. will be installed on this layer only.
CYBER SECURITY (20CS54IT) DEC 2023
It runs within the Android run time with the help of the classes and services provided by the
application framework.
Application framework –
Application Framework provides several important classes, which are used to create an
Android application. It provides a generic abstraction for hardware access and helps in
managing the user interface with application resources. It includes different types of services
activity manager, notification manager, view system, package manager etc. which are helpful
for the development of our application according to the prerequisite.
Application runtime –
Android Runtime environment is one of the most important part of Android. It contains
components like core libraries and the Dalvik virtual machine (DVM). Mainly, it provides the
base for the application framework and powers our application with the help of the core
libraries.
Platform libraries –
The Platform Libraries includes various C/C++ core libraries and Java based libraries
such as Media, Graphics, Surface Manager, OpenGL etc. to provide a support for android
development.
● Media library provides support to play and record audio and video formats.
● Surface manager responsible for managing access to the display subsystem.
● SGL and OpenGL both cross-language, cross-platform application program interface
(API) are used for 2D and 3D computer graphics.
● SQLite provides database support and FreeType provides font support.
● Web-Kit This open source web browser engine provides all the functionality to display
web content and to simplify page loading.
● SSL (Secure Sockets Layer) is security technology to establish an encrypted link
between a web server and a web browser.
Linux Kernel –
Linux Kernel is heart of the android architecture. It manages all the available drivers
such as display drivers, camera drivers, Bluetooth drivers, audio drivers, memory drivers, etc.
which are required during the runtime.
CYBER SECURITY (20CS54IT) DEC 2023
The Linux Kernel will provide an abstraction layer between the device hardware and the
other components of android architecture. It is responsible for management of memory,
power, devices etc.
SECTION-V
9a. What are the objectives of Incident Management? Explain the life cycle of Incident Management.
10M
1) Ensure that standardized methods and procedures are used for efficient and prompt
response, analysis, documentation, ongoing management and reporting of incidents
4) Align Incident Management activities and priorities with those of the business
1) New indicates that the service desk has received the incident but has not assigned it to
an agent.
2) Assigned means that an incident has been assigned to an individual service desk agent.
3) In progress indicates that an incident has been assigned to an agent but has not
beenresolved.Theagentisactivelyworkingwiththeusertodiagnoseandresolvetheincident.
4) On hold or pending status indicates that the incident requires some information or
response from the user or from a third party. The incident is placed “on hold” so that
SLA response deadlines are not exceeded while waiting for a response from the user or
vendor.
5) Resolved means that the service desk has confirmed that the incident is resolved and
that the user’s service has restored to the SLA levels.
6) Closed indicates that the incident is resolved and that no further actions can be taken.
9b. Define GRC. Explain Enterprise Risk Management and identify the different types of risk faced
by the Enterprise. 10M
Governance
Governance is the set of policies, rules, or frameworks that a company uses to achieve
its business goals. It defines the responsibilities of key stakeholders, such as the board of
directors and senior management.
Risk
A possible event that could cause harm or loss or make it more difficult to achieve
objectives.
Compliance
Compliance is the act of following rules, laws, and regulations.It applies to legal and
regulatory requirements set by industrial bodies and also for internal corporate policies.
Operational risk is defined as a type of risk that arises from the day-to-day
operations of an organization. It is the potential for loss that comes from faulty or absent
internal procedures, people, and systems, as well as external events.
2. Strategic risk
Refers to the internal and external events that may make it difficult, or
even impossible, for an organization to achieve their objectives and strategic
goals.
3. Credit risk
Is the possibility of a loss happening due to a borrower's failure to repay
a loan or to satisfy contractual obligations.
4. Reputational risk:
Reputational risk is a threat or danger to the good name or standing of a
business or entity.
5. Market risks
Market risk involves the risk of changing conditions in the specific marketplace
in which a company competes for business.
6. Cyber risks
Cyber security risks relate to the loss of confidentiality, integrity, or availability
of information, data, or information systems
7. Legal risk
Risk occur due to negligence of following rules and lows related to
governance
8. Regulatory risk
Risk occurs due to changing the rules and regulations, which affect the business.
OR
10a. Explain:
The steps in the Vulnerability Management Life Cycle are described below.
1. Discover: Inventory all assets across the network and identify host details including
operating system and open services to identify vulnerabilities. Develop a network baseline.
Identify security vulnerabilities on a regular automated schedule.
2. Prioritize Assets: Categorize assets into groups or business units, and assign a business
value to asset groups based on their criticality to your business operation.
3. Assess: Determine a baseline risk profile so you can eliminate risks based on asset
criticality, vulnerability threat, and asset classification.
4. Report: Measure the level of business risk associated with your assets according to your
security policies. Document a security plan, monitor suspicious activity, and describe known
vulnerabilities.
5. Remediate: Prioritize and fix vulnerabilities in order according to business risk. Establish
controls and demonstrate progress.
6. Verify: Verify that threats have been eliminated through follow-up audits.
Types of Vulnerabilities are
Types of vulnerabilities
1. Hardware Vulnerability: A hardware vulnerability is a weakness which can used to attack
the system hardware through physically or remotely. For examples:
CYBER SECURITY (20CS54IT) DEC 2023
10b. What are DevOps? Explain its security challenges and its core principles. 10M
CYBER SECURITY (20CS54IT) DEC 2023
software development and its IT operations. Namely, it calls for speed and
intense, fast communication and collaboration. It is essentially a philosophy that
covers developers’ code and its subsequent need to work(and grow) properly
with the organization’s employees and customers.
Development and IT teams work closely and rapidly to add to and fix software.
This means, for example, adding new features and troubleshooting bugs so that
they can be continuously released in fast cycles without causing disruptions. It
enable steams,
otheremployees,andcustomerstocontinueinteractingwithsoftwarewithoutinterrup
tion
Security challenges in DevOps include:
Collaboration
The key premise behind DevOps is collaboration. Development and operations
teams coalesce into
afunctionalteamthatcommunicates,sharesfeedback,andcollaboratesthroughouttheen
tiredevelopment and deployment cycle. Often, this means development and
operations teams merge into a single team that works across the entire application
life cycle.
Automation
An essential practice of DevOps is to automate as much of the software
development lifecycle as possible. This gives developers more time to write code
and develop new features. Automation is a key element of a CI/CD pipeline and
helps to reduce human errors and increase team productivity. With automated
processes, teams achieve continuous improvement with short iteration times,
which allows them to quickly respond to customer feedback.
Continuous Improvement
Continuous improvement was established as a staple of agile practices, as well as
lean manufacturing and Improvement. It’s the practice of focusing on
experimentation, minimizing waste, and optimizing for speed, cost, and ease of
delivery. Continuous improvement is also tied to continuous delivery, allowing
DevOps teams to continuously push updates that improve the efficiency of
software systems. The constant pipeline of new releases means teams consistently
CYBER SECURITY (20CS54IT) DEC 2023
push code changes that eliminate waste, improve development efficiency, and
bring more customer value.
Certified that the model answers prepared by me for code 20CS54IT are from the
prescribed text/webpages and model answers and scheme of valuation prepared
my me are correct.
[M G Rangaswamy]
Senior Grade Lecturer/CS,
Gpt,Turuvekere