Cyber Security Important Question for End Sem(Ans)
Cyber Security Important Question for End Sem(Ans)
Cyber Security
1. Data Protection – Prevents personal, financial, and organizational data from being
stolen or misused.
2. Prevents Cyber Attacks – Shields systems from threats like hacking, phishing, and
malware.
3. Maintains Trust – Helps businesses build trust with customers by safeguarding their
data.
4. Regulatory Compliance – Ensures organizations follow data protection laws (like
GDPR, HIPAA).
5. Business Continuity – Prevents disruptions by securing IT systems and backing up
data.
Components of an Information System are the essential parts that work together to collect,
process, store, and distribute information. The five main components are:
Information Assurance (IA) is the practice of managing risks related to the use, processing,
storage, and transmission of information. It ensures that data is protected, reliable, and
available to authorized users when needed.
These goals help maintain trust and secure communication in digital environments.
5. Explain the types of Information Systems and how security is applied to them.
Ans.
Applying proper information security practices to each system helps prevent data breaches,
ensure smooth operations, and protect business assets.
These threats can disrupt operations, cause financial loss, and damage reputation, so strong
information security practices are essential.
Why is it Needed?
In short, cybersecurity risk analysis is essential to protect data, reduce threats, and
maintain business continuity.
1. Planning:
3. Design:
4. Development (Implementation):
5. Testing:
6. Deployment:
7. Maintenance:
Each phase ensures the system is reliable, secure, and meets user needs.
Ans.
The Internet began in the late 1960s as a research project by the U.S. Department of Defense
called ARPANET (Advanced Research Projects Agency Network). It was created to allow
communication between computers at different universities and research institutions.
In the 1970s, protocols like TCP/IP were developed, which became the standard for data
transmission. The Internet as we know it started to take shape in 1983 when ARPANET adopted
TCP/IP.
In the 1990s, the World Wide Web (WWW) was invented by Tim Berners-Lee, making the
internet accessible to the public with browsers and websites. This led to a global expansion of the
Internet.
Today, the Internet is a vital part of daily life, connecting billions of people and enabling
communication, commerce, education, and entertainment across the world.
1. Vulnerability:
A vulnerability is a weakness or flaw in a system, application, or network that can be
exploited by attackers to gain unauthorized access, cause damage, or steal data.
Example: An outdated software version with known security bugs.
2. Banner Grabbing:
Banner grabbing is a technique used to gather information about a computer system
or network service. It collects details like software version, operating system, and
server type by reading the banner message sent by services like HTTP, FTP, or SMTP.
Example: Identifying a web server's software and version via HTTP headers.
3. Traffic Probing:
Traffic probing involves monitoring and analyzing network traffic to gather
intelligence about active systems, open ports, and running services. It helps identify
potential targets or vulnerabilities.
Example: Using tools like Nmap to scan a network for active hosts and ports.
These terms are commonly used in ethical hacking, penetration testing, and cybersecurity
assessments.
Purpose:
Examples:
• Nessus detects that a server is running an old version of Apache with known bugs.
• Nikto finds a web application vulnerable to cross-site scripting (XSS).
• OpenVAS identifies an unpatched system with remote code execution vulnerability.
Vulnerability scanning is a crucial part of cybersecurity to keep systems safe and compliant.
Vulnerabilities can be classified into several types based on their nature and impact. Here are
the main categories:
1. Network Vulnerabilities:
o Weaknesses in network components like routers, firewalls, or open ports.
o Example: Open port 21 (FTP) allowing unauthorized access.
2. Operating System Vulnerabilities:
o Flaws in the OS that can be exploited.
o Example: Unpatched Windows OS vulnerable to remote code execution.
3. Application Vulnerabilities:
o Bugs or flaws in software applications.
o Example: SQL Injection in a web login form.
4. Configuration Vulnerabilities:
o Misconfigured systems or devices.
o Example: Default admin credentials left unchanged on a router.
5. Human-related Vulnerabilities:
o Caused by user mistakes or lack of awareness.
o Example: Falling for a phishing email and sharing passwords.
Conclusion:
Understanding the types of vulnerabilities helps organizations identify, prioritize, and
secure weak points in their systems effectively.
1. False Positives:
A false positive occurs when a security system incorrectly identifies normal or safe
activity as a threat.
o Example: An antivirus flags a legitimate software file as malware.
o Impact: Can lead to unnecessary alerts and wasted time investigating non-issues.
2. False Negatives:
A false negative happens when a security system fails to detect an actual threat.
o Example: A malware file passes through a firewall undetected.
o Impact: Very dangerous, as it allows real threats to go unnoticed and cause harm.
3. Zero-Day Vulnerabilities:
A zero-day vulnerability is a software flaw that is unknown to the vendor and has no
patch available.
o Example: A hacker discovers a bug in a web browser and exploits it before the
company releases a fix.
o Impact: Highly critical, often used in advanced cyberattacks due to the lack of
defense.
These concepts are vital in cybersecurity for understanding the effectiveness and limitations
of threat detection systems.
Definition:
Nmap is an open-source network scanning tool used for discovering hosts, services, and
vulnerabilities in a network.
Uses in Reconnaissance:
Example: Scanning a target IP to find open ports like 22 (SSH), 80 (HTTP), etc.
2. Netcat (nc):
Definition:
Netcat is a versatile networking tool used for reading and writing data across network
connections using TCP or UDP.
Uses in Reconnaissance:
Example: Using Netcat to connect to port 80 of a web server and view the HTTP banner.
Conclusion:
Both tools are essential in the reconnaissance phase of ethical hacking to gather
information about the target system before exploiting vulnerabilities.
17. What is Network Sniffing? Name and explain tools like Wireshark and Hping.
Ans.
What is Network Sniffing? (5 Marks)
Network Sniffing is the process of monitoring and capturing data packets that travel
through a network. It helps network administrators and ethical hackers to analyze traffic,
troubleshoot issues, and detect malicious activities. However, attackers may also use sniffing
for spying or stealing sensitive information.
• Definition:
Wireshark is a popular open-source packet analyzer used for real-time network traffic
capture and detailed protocol analysis.
• Uses:
o Capture and inspect live network traffic.
o Analyze protocols like HTTP, TCP, DNS, etc.
o Troubleshoot network issues.
o Detect unusual traffic or attacks.
• Example: Identifying a DNS poisoning attack by analyzing DNS responses.
2. Hping:
• Definition:
Hping is a command-line network tool used to send custom TCP/IP packets and perform
security testing.
• Uses:
o Perform packet crafting and firewall testing.
o Conduct network scanning and tracerouting.
o Detect open/filtered ports using different scan types.
o Useful for stealthy reconnaissance.
• Example: Using Hping to send SYN packets and analyze the response to check if a port is
open or blocked.
Conclusion:
Network sniffing is crucial in ethical hacking and network analysis, and tools like
Wireshark and Hping provide powerful features for understanding and securing networks.
Unit 3: Network Defense Tools
18. What is a Firewall? Describe types: packet-filtering, stateful, and next-gen firewalls.
Ans.
What is a Firewall? (5 Marks)
A firewall is a network security device or software that monitors and controls incoming
and outgoing network traffic based on predefined security rules. Its main purpose is to create
a barrier between a trusted internal network and untrusted external networks (like the
internet) to prevent unauthorized access.
Types of Firewalls:
1. Packet-Filtering Firewall:
• Function:
Filters network traffic by inspecting individual packets based on IP addresses, ports, and
protocols.
• Pros:
Fast and simple.
• Cons:
Does not track connection state; can be bypassed easily.
• Example: Blocks traffic from a specific IP or port.
• Function:
Tracks the state of active connections and makes decisions based on the context of the
traffic.
• Pros:
More secure than packet-filtering, as it understands whether a packet is part of an existing
connection.
• Cons:
Slower than basic firewalls due to deeper inspection.
• Example: Allows return traffic from a trusted request while blocking unsolicited
connections.
• Function:
Combines traditional firewall functions with advanced features like deep packet
inspection, intrusion prevention systems (IPS), and application awareness.
• Pros:
Can detect and block modern threats like malware and application-layer attacks.
• Cons:
More complex and expensive.
• Example: Detects and blocks suspicious behavior in encrypted traffic, or controls access
to social media apps.
Conclusion:
Firewalls are essential tools for network defense, and each type provides different levels of
protection depending on an organization’s needs.
20. What is NAT (Network Address Translation)? Explain Static and Dynamic NAT.
Ans.
What is NAT (Network Address Translation)? (5 Marks)
Types of NAT:
1. Static NAT:
• Definition:
Maps one private IP address to one fixed public IP address.
• Use Case:
When a specific device (like a web server) must be accessible from the internet at a
constant address.
• Example:
Internal IP 192.168.1.10 is always mapped to public IP 203.0.113.5.
2. Dynamic NAT:
• Definition:
Maps a private IP to any available public IP from a pool of public addresses.
• Use Case:
Suitable for outgoing traffic where the specific public IP doesn't matter.
• Example:
Internal IP 192.168.1.15 could be mapped to 203.0.113.6 one time, and 203.0.113.7
the next.
Conclusion:
NAT helps with IP address management and security, and choosing between static or
dynamic NAT depends on whether the mapping needs to be fixed or flexible.
• Definition:
PAT is a type of NAT that allows multiple devices on a local network to share a single
public IP address, using different port numbers to distinguish each connection.
• How it works:
Each outgoing request from a local device is assigned a unique port number with the
same public IP, so responses can be routed back correctly.
• Example:
o Internal devices: 192.168.1.2:1234, 192.168.1.3:1235
o Translated to: 203.0.113.5:55001, 203.0.113.5:55002
• Use Case:
Internet access for multiple users using one public IP.
2. Port Forwarding:
• Definition:
Port Forwarding is the process of redirecting a communication request from one
address and port number to another. It allows external users to access services on a
private/internal network.
• How it works:
Incoming traffic on a specific port of the public IP is forwarded to a specific device and
port inside the local network.
• Example:
Public IP 203.0.113.5:8080 is forwarded to internal IP 192.168.1.10:80 (web server).
• Use Case:
Hosting web servers, gaming servers, or remote desktop access from outside the network.
Conclusion:
22. What is a VPN? Describe types: PPTP, SSTP, L2TP, Site-to-Site, Remote Access.
Ans.
What is a VPN (Virtual Private Network)? (5 Marks)
A VPN is a secure, encrypted connection over the internet that allows users to access
private networks and share data safely and anonymously. It hides the user's IP address and
encrypts the data, ensuring privacy, security, and bypassing geo-restrictions.
Types of VPNs:
1. PPTP (Point-to-Point Tunneling Protocol):
4. Site-to-Site VPN:
Conclusion:
VPNs enhance privacy, security, and remote accessibility, and choosing the right type
depends on the use case, such as individual remote access or connecting business networks.
Unit 4: Cyber Crimes and Laws
23. What are different types of Cyber Crimes? Classify with examples.
Ans.
Types of Cyber Crimes (5 Marks)
Cyber crimes are illegal activities carried out using computers, networks, or the internet.
They can target individuals, organizations, or governments.
2. Identity Theft:
• Tricking users into giving away sensitive data via fake emails or websites.
• Example: An email pretending to be from a bank asking for login credentials.
5. Cyber Terrorism:
Conclusion:
Cyber crimes can range from personal data theft to national security threats, making
cybersecurity awareness and protection critically important in today’s digital age.
24. Differentiate between Hacking and Penetration Testing.
Ans.
These are types of social engineering attacks used by cybercriminals to trick individuals into
revealing sensitive information.
1. Phishing:
• Definition:
A cyberattack where attackers send fraudulent emails or fake websites pretending to be
trustworthy sources.
• Example:
An email that looks like it’s from a bank asking for login credentials.
• Definition:
A phishing attack via SMS/text messages, usually containing malicious links or asking
for sensitive info.
• Example:
A message saying “Your bank account is blocked, click here to verify.”
• Definition:
A phishing scam where attackers call victims and pretend to be from a legitimate
organization to steal personal details.
• Example:
A phone call from someone pretending to be tech support asking for OTP or bank details.
It ensures that organizations can respond quickly and effectively to security threats.
Steps Involved in Incident Response:
1. Preparation:
o Develop policies, response plans, and train staff.
o Set up necessary tools and systems for detection and response.
2. Identification:
o Detect and confirm the occurrence of a security incident.
o Gather evidence and assess the scope and impact.
3. Containment:
o Limit the spread of the incident.
o Apply short-term and long-term containment strategies.
4. Eradication:
o Find the root cause and remove malicious files or access.
o Fix vulnerabilities that were exploited.
5. Recovery:
o Restore systems and services to normal operation.
o Monitor to ensure systems are secure and functioning properly.
6. Lessons Learned:
o Document the incident and response.
o Analyze what went well and what needs improvement.
Conclusion:
Effective incident response helps reduce downtime, protect data, and improve cyber
resilience in organizations.
The Information Technology (IT) Act 2000 is the first cyber law in India, enacted to
provide legal recognition to electronic transactions, and to address cybercrime and e-
commerce issues.
It ensures secure electronic communication and protects users from cyber threats.
Conclusion:
The IT Act 2000 plays a crucial role in regulating cyber activities in India, ensuring legal
protection in the digital space and boosting trust in online transactions and e-governance.
Conclusion:
• Definition:
Steganography is the technique of hiding secret information within a non-secret file or
message, such as an image, audio, or video, so that no one suspects the information
exists.
• Example:
Hiding a secret text message inside an image file using pixel manipulation.
Cryptography:
• Definition:
Cryptography is the technique of converting readable data (plaintext) into an
unreadable format (ciphertext) using algorithms and keys, to protect confidentiality.
• Example:
Using AES encryption to convert a message into an unreadable code.
Conclusion:
Ans.
Trojan, Keyloggers, and Spyware – Definitions with Examples (5 Marks)
1. Trojan (Trojan Horse):
• Definition:
A Trojan is a type of malware that disguises itself as a legitimate program to trick users
into installing it. Once installed, it gives unauthorized access to attackers.
• Example:
A fake antivirus program that installs malware when run.
2. Keyloggers:
• Definition:
A keylogger is a type of spyware that records every keystroke a user types on their
keyboard, often used to steal usernames, passwords, and other confidential data.
• Example:
An attacker installs a keylogger to capture a user’s banking credentials.
3. Spyware:
• Definition:
Spyware is malicious software designed to monitor a user’s activity secretly, collecting
data like browsing habits, personal info, or system usage.
• Example:
A program that tracks and sends your web activity to advertisers without consent.
Conclusion:
• All three are malicious tools used for spying or unauthorized access.
• Trojan acts as a delivery method, while keyloggers and spyware focus on data theft
and surveillance.
4o