MCS-215 - Solution
MCS-215 - Solution
M
Security and Cyber Laws
ues 1. (a) What are the three pillars of digital security? What is the need for digital
Q
security?
Ans 1 (a)Three Pillars of Digital Security:
● ata Protection: Safeguards personal and sensitiveinformation from theft or exposure.
D
● Cyber Attack Prevention: Defends against maliciousthreats like hackers and viruses.
● Trust Maintenance: Protects the reputation of organizationsby keeping data safe.
● Regulatory Compliance: Ensures adherence to laws likeGDPR and HIPAA.
● Business Continuity: Minimizes disruptions, ensuringoperations run smoothly during
attacks or failures.
.Q
ues 1.(b) Explain the following in the context of security issues/attacks: (i) DDoS
attacks (ii) Malware (iii)Crypto-jacking
DDoS attackoverwhelms a target's server or networkby flooding it with traffic from multiple
A
compromised devices. The goal is to make the service unavailable to legitimate users by
exhausting its resources, causing downtime or disruption.
(ii) Malware
alwareis malicious software designed to harm, exploit,or disable devices, systems, and
M
networks. It includes viruses, worms, trojans, ransomware, and spyware, which can steal data,
damage systems, or provide unauthorized access to attackers.
(iii) Crypto-jacking
ues 1(c) Explain the term Cyber Security intrusion detection with the help of an
Q
example.
ns 1(c). Cyber Security Intrusion Detectionis the process of monitoring a system or
A
network for any suspicious or unauthorized activity. It helps identify potential security threats,
like hacks or policy violations, so that action can be taken to prevent or minimize damage.
Imagine a company uses anIntrusion Detection System(IDS)to keep an eye on its network.
The IDS continuously scans for unusual behavior, like multiple failed login attempts, large data
transfers, or activity that matches known attack patterns.
or instance, if someone tries to hack into the system by repeatedly guessing passwords (a
F
brute force attack), the IDS would recognize thisunusual activity. It would then send an alert to
the company's security team, allowing them to block the attacker and stop the intrusion before it
causes harm.
In this case, the IDS helps spot the attack early and gives the company time to respond quickly
and protect their systems.
Ques 1(d). What are the laws related to unauthorized access and web jacking?
hese laws aim to prevent cybercrimes, protect online systems, and hold perpetrators
T
accountable.
Ques 2 Explain the following terms with the help of an example of each.
substitution cipherreplaces each letter or numberin the plaintext with another value based
A
on a specific function.
xample: A simple function-based cipher could be toreplace each letter with the next one in
E
the alphabet (A → B, B → C, etc.). If the plaintext is "HELLO", it would become "IFMMP".
Example:
● onfidentiality: Encryption ensures that only authorizedpeople can read the message.
C
● Integrity: A hash function verifies that the datahas not been altered.
● Authentication: Digital signatures confirm the identityof the sender.
● Non-repudiation: Ensures a sender cannot deny sendinga message.
● Access Control: Only authorized users can decryptand access information.
xample: An image may look normal, but it could containhidden text encoded in the pixel
E
values. A message like "MEET AT 5" could be embedded in an image file and sent without
arousing suspicion.
SAis an asymmetric encryption algorithm that usestwo keys: a public key for encryption and
R
a private key for decryption.
xample: If Alice wants to send a secure message toBob, she encrypts the message using
E
Bob’s public key. Bob can then decrypt it using his private key, ensuring that only Bob can read
the message.
xample: In generating a cryptographic key, a PRNG might be used to produce a sequence of
E
random numbers that form the basis for the key. This makes it difficult for attackers to guess the
key.
Ques 3
1. Confidentiality:
○ Use strong encryption for sensitive data both at rest and in transit.
○ Implement strict access controls and authentication measures (e.g., multi-factor
authentication).
○ Regularly update permissions and user access based on role changes.
2. Integrity:
○ Employ hash functions to verify data integrity and detect alterations.
○ Implement version control and change management processes.
○ Use digital signatures to ensure data authenticity.
3. Availability:
○ Ensure regular backups and have a disaster recovery plan in place.
○ Use redundancy for critical systems (e.g., failover servers).
○ Regularly update and patch systems to prevent downtime from vulnerabilities.
Ans 3(b)Explanations
xample: A user receives an email that appears to be from their bank, asking them to verify
E
their account by clicking a link, which leads to a fraudulent site designed to steal their login
credentials.
ansomware attacks involve malware that encrypts a victim's files, making them inaccessible
R
until a ransom is paid. Attackers threaten to delete the data if the ransom isn’t paid.
xample: A company’s network gets infected, and all files are encrypted. The attackers display
E
a message demanding payment in cryptocurrency for the decryption key.
xample: A company hires a third-party auditor to evaluate its cybersecurity practices, assess
E
risks, and provide recommendations for improving security posture.
ecurity and usability refer to the balance between implementing effective security measures
S
and ensuring that systems are user-friendly. Strong security measures can sometimes hinder
usability, leading to frustration and decreased productivity. The goal is to create systems that are
both secure and easy to use.
egulating cyberspace is essential for user protection, ensuring safety from threats like
R
cyberbullying and exploitation (e.g., protecting vulnerable groups). It also combats cybercrime
and promotes fairness while upholding privacy and human rights.
1. P rotection of Users: The internet exposes users tothreats like cyberbullying,
harassment, and exploitation. Regulation helps create safer environments, particularly
for vulnerable groups such as children.
2. Promoting Fairness and Competition: Regulationscan prevent monopolistic practices
by large tech companies, ensuring a level playing field for all participants in the digital
economy.
Ans 4(b) Role of Filtering Devices and Rating Scales in Regulating Internet
Content
iltering Devices: Tools like firewalls block access to inappropriate content, ensuring safer
F
online environments.Example: Schools may use filtering software to block access to adult
content, violence, or other inappropriate material, ensuring a safe learning environment.
It ensures that electronic transactions are enforceable and encourages the adoption of new
technologies in international trade.
International initiatives include the OECD guidelines for data protection (promoting balanced
regulations), the Council of Europe Convention on Cybercrime (enhancing law enforcement
cooperation), and the GDPR (establishing strict privacy standards in the EU).
he UN and APEC also promote frameworks for cybersecurity and cross-border privacy
T
protection, contributing to a safer digital environment.
Ques 5
nder Section 43 of the Information Technology Act, 2000, acomputer contaminantis defined
U
as any software or code that can alter, damage, or cause interference with any computer
resource. This includes viruses, worms, or other malicious software that disrupts normal
functioning or harms data integrity.
Ans 5(c) Six Offences as per the Information Technology Act, 2000
. H
1 acking(Section 66): Unauthorized access and alterationof data in a computer system.
2. Identity Theft(Section 66C): Misrepresentation ofoneself as another person using
electronic signatures or documents.
3. Cyber Terrorism(Section 66F): Acts that threatenthe unity, integrity, security, or
sovereignty of the nation through cyber means.
4. Sending Offensive Messages(Section 66A): Sending messages that are grossly
offensive or menacing in character.
5. D ata Theft(Section 43): Unauthorized access and copying of data from a computer
resource.
6. Publishing Obscene Material(Section 67): Publishingor transmitting material that is
lascivious or appeals to prurient interest.
etwork service providers (NSPs) can be held liable under certain conditions, primarily under
N
the Information Technology Act, 2000:
1. Intermediary Liability: NSPs are not liable for user-generatedcontent unless they are
aware of the illegal activity and do not act promptly to remove it. They must follow due
diligence and have a notice-and-takedown policy.
2. Compliance with Law Enforcement: NSPs are requiredto assist law enforcement
agencies in investigations and provide information as needed.
3. Content Monitoring: While NSPs are not generally responsiblefor monitoring content,
they must take action if they receive knowledge of illegal activities.
4. Failure to Act: If an NSP fails to act upon receivingnotice of illegal content, they may be
held liable for any resulting damages.
In essence, while NSPs enjoy certain protections, they have obligations to maintain a safe
environment and respond to illegal activities.
yber forensicsis the field that involves collecting,analyzing, and preserving digital evidence
C
from computers, networks, and electronic devices for use in legal proceedings. It encompasses
the investigation of cybercrimes, ensuring that evidence is gathered in a way that maintains its
integrity for prosecution.
opyrights protect original works of authorship, including literary, artistic, musical, and software
C
creations, granting the creator exclusive rights to reproduce, distribute, and display the work.
Regulatory Framework:
● G overned by theCopyright Actin most countries, whichoutlines the duration of
protection (typically the creator's life plus 70 years) and exceptions like fair use.
● Related rights protect performers, producers, and broadcasters, ensuring they receive
recognition and compensation for their contributions.
(ii) Patents
atents grant exclusive rights to inventors for their inventions, preventing others from making,
P
using, or selling the invention without permission.
Regulatory Framework:
● G overned by patent laws, such as thePatent Act, whichtypically requires the invention
to be novel, non-obvious, and useful.
● The patent lasts for a limited time (usually 20 years from the filing date) and requires
formal application and examination processes.
(iii) Trademarks
rademarks protect symbols, names, logos, and phrases that distinguish goods or services of
T
one entity from another.
Regulatory Framework:
● G overned by trademark laws, such as theTrademarkAct, which provides guidelines for
registration, enforcement, and protection against infringement.
● Trademarks can last indefinitely as long as they are in use and renewed periodically.
● L
inking: Creating a hyperlink from one webpage toanother. While linking is generally
permissible, it may raise IPR issues if the linked content is copyrighted without
permission.
● In-lining: Displaying content (like images or videos) from one website on another site
using a link that allows the content to be viewed without being hosted on the second site.
This can infringe on copyright if the original content is displayed without authorization.
● Framing: Embedding a webpage within another webpage,making it appear as if the
content is part of the framing site. This can lead to IPR issues, especially if the original
site's content is presented without permission or attribution.
omain name disputesoccur when there is a conflictover the ownership or use of a domain
D
name, typically when a party believes their trademark rights are being infringed upon by another
entity using a similar domain.
xample: Suppose a well-known coffee chain, "Starbrew,"finds that another company has
E
registered the domain "starbrewcoffee.com" and is using it to sell coffee. Starbrew may file a
complaint arguing that the other company is infringing on its trademark rights and misleading
consumers.