Nis Ans
Nis Ans
(i) Copyright
• It means no one else can copy, share, or use these works without the creator’s
permission.
• This helps artists and writers earn money and control how their work is used.
(ii) Patent
• A patent is a legal right given to inventors for their new inventions or unique
processes.
• It stops others from making, using, or selling the invention without the inventor’s
permission for a fixed time (usually 20 years).
(iii) Trademark
• Trademarks prevent other companies from using the same or similar signs that
could confuse customers.
1
### (a) Biometric Terms with Definitions and Working
* *Working:*
* *Definition:* Using the unique pattern of blood vessels in the eye’s retina for
identification.
* *Working:*
*(iii) Keystroke*
* *Working:*
2
* System records timing of key presses/releases while typing.
* A *proxy server* acts as a middleman between your device (like your computer) and
the internet.
* When you send a request (like opening a website), the proxy server receives it first,
then sends it to the internet on your behalf.
* The response from the internet goes back to the proxy server, which then forwards it
to you.
---
* *Privacy:* It hides your real IP address from the websites you visit.
* *Performance:* It can cache (save) frequently visited websites to load them faster next
time.
* *Access Control:* It helps organizations control what websites users can visit.
---
3
### *Example:*
You want to visit a website. Instead of your computer contacting the website directly, the
proxy server contacts it, then sends you the webpage. This way, the website only sees
the proxy server’s IP, not yours.
---
4
### *(a) Types of Attacks:*
---
*Sniffing* means secretly *capturing data* that is being transmitted over a network.
📌 *Example*:
A hacker nearby uses a *sniffing tool* to capture the *username and password* you
typed.
---
📌 *Example*:
A hacker sends an email that looks like it’s from your *bank*, asking for your account
details.
---
5
*Phishing* is a type of attack where *fake emails or messages* are used to trick people
into giving personal information.
📌 *Example*:
You receive an email that says “Your account is blocked. Click here to fix it.”
The link takes you to a *fake website* that looks like your bank, and when you enter
your login details, they go to the attacker.
Password selection strategies are methods used to create secure and strong passwords
that protect systems and data from unauthorized access. Some common strategies are:
1. *User Education*
2. *Computer-Generated Passwords*
6
4. *Proactive Password Checking*
(i) Piggybacking
Meaning:
Example:
A stranger enters an office building right after an employee opens the door using their
access card.
Prevention:
7
### 🔐 *1. Brute Force Attack*
* *What is it?*
Attacker tries all possible password combinations until the correct one is found.
* *Prevention:*
---
* *What is it?*
* *Prevention:*
---
* *What is it?*
User is tricked into giving their password through fake websites or emails.
8
* *Prevention:*
---
* *What is it?*
* *Prevention:*
---
* *What is it?*
* *Prevention:*
9
* Enable *two-factor authentication (2FA)*.
---
* *What is it?*
Attacker uses leaked username-password pairs from other sites to try logging in.
* *Prevention:*
* Enable *2FA*.
10
Here’s a simple and exam-friendly explanation for each term:
Replay Attack
• Attacker captures valid data (like login info) and reuses it later to gain
unauthorized access.
TCP/IP Hacking
Encryption Attacks
11
Principle of Authentication
• The process of verifying the identity of a user or device before allowing access.
Audit
• Access control method where users get permissions based on their role in an
organization.
If you want me to explain any term in more detail or add examples, just ask!
12
Sure! Here’s a simple and clear explanation for each term, exam-friendly:
Misuse Detection
Anomaly Detection
• It finds unusual or abnormal behavior that doesn’t fit the normal pattern.
• Uses base64 encoding and includes headers to show what kind of data it contains
(like certificates or keys).
• A standard format for digital certificates used in public key infrastructure (PKI).
o Validity period
13
• ISO 27001:
An international standard for managing information security. It sets rules to
protect information and ensure confidentiality, integrity, and availability.
• ISO 20000:
A standard for IT service management, ensuring IT services meet business needs
effectively.
• BS 25999:
A British standard for business continuity management, helping organizations
prepare for disruptions.
If you want me to explain any part more or give examples, just say!
Plain Text
Cipher Text
• This is the scrambled or coded version of the plain text after encryption.
• It looks like random characters and cannot be understood without the key.
• Example: "Xy7!qP2@#"
Encryption
• The process of converting plain text into cipher text to keep it secret.
Decryption
14
In short:
Encryption = Locking the message
Decryption = Unlocking the message
15