0% found this document useful (0 votes)
1 views7 pages

Cybersecurity

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 7

Cybersecurity(2 mark)

1. Differentiate computer security and cyber security with a


proper example?
Computer security:
Computer security, also called cybersecurity, is the protection of
computer systems and information from harm, theft, and
unauthorized use. Computer hardware is typically protected by
the same means used to protect other valuable or sensitive
equipment—namely, serial numbers, doors and locks, and
alarms.
Cybersecurity:
Cybersecurity is the practice of protecting systems, networks, and
programs from digital attacks. These cyberattacks are usually
aimed at accessing, changing, or destroying sensitive information;
extorting money from users; or interrupting normal business
processes.

2. Summarize cryptography with its types.


Cryptography is technique of securing information and
communications through use of codes so that only those person
for whom the information is intended can understand it and
process it. Thus preventing unauthorized access to information.
The prefix “crypt” means “hidden” and suffix graphy means
“writing”.10-May-2022
Types:
1. Symmetric Key Cryptography:
It is an encryption system where the sender and receiver
of message use a single common key to encrypt and
decrypt messages. Symmetric Key Systems are faster and
simpler but the problem is that sender and receiver have
to somehow exchange key in a secure manner. The most
popular symmetric key cryptography system is Data
Encryption System(DES).
2. Hash Functions:
There is no usage of any key in this algorithm. A hash
value with fixed length is calculated as per the plain text
which makes it impossible for contents of plain text to be
recovered. Many operating systems use hash functions to
encrypt passwords.
3. Asymmetric Key Cryptography:
Under this system a pair of keys is used to encrypt and
decrypt information. A public key is used for encryption
and a private key is used for decryption. Public key and
Private Key are different. Even if the public key is
known by everyone the intended receiver can only
decode it because he alone knows the private key.

3. Identify the cause of risks in cyber security.


 Ransomware. This is a form of malware (malicious
software) that attempts to encrypt (scramble) your data and
then extort a ransom to release an unlock code. ...
 Phishing:

Phishing is an attempt to gain sensitive information while


posing as a trustworthy contact, for example a bank or
online service. Spear phishing is a highly targeted attempt to
gain information from an individual.
 Data leakage:

While cyber security in the office may seem challenging, it is


essential to understand that security extends well beyond the
office these days. The use of smart phones and tablets has
become widespread.
 Hacking:

Gaining access to IT systems from outside an organisation


still offers rich pickings for criminals. Traditionally they have
attempted to gain access to bank account information or credit
card databases.
 Insider threat:
If your organisation employs staff (full time or as
contractors), there is a possibility they could leak data by
mistake or maliciously. The potential damage from a leak of
documents cannot be underestimated.

4.Enumerate the need for authentication in any organization to


access their data.
Authentication enables organizations to keep their networks
secure by permitting only authenticated users or processes to gain
access to their protected resources. This may include computer
systems, networks, databases, websites and other network-based
applications or services.
user and process authentication are used to ensure that only
authorized individuals or processes are allowed to access
company IT resources. Depending on the use cases for which
authentication is used, authentication can consist of either SFA,
2FA or MFA.

The most common implementation of authentication is SFA,


which requires a user ID and a password for sign-on and access.
However, since banks and many companies now use online
banking and e-commerce to conduct business and store customer
Social Security and credit and debit card numbers, there is an
increased use of 2FA and even MFA, which requires users and
customers to enter not only a user ID and password, but also
additional authentication information.

5.Summarize your suggestions to protect from user side attacks

In client-side exploitation, attackers take advantage of the


weakest

link that is clients.


To protect yourself from client-side attacks you have to be alert

during your everyday Internet surfing.

Don’t open any link coming from a malicious or unknown person.

After opening any email attachment always make sure that the

mail is coming from an authorized source.

Avoid downloading .exe attachments of a mail.

Always check the confidentiality of the domain of the website


after

filling in confidential information like username, password, card

number, bank account number, etc.

6.Differentiate the concept of Role based Access Control model


with Mandatory AccessControl model

Mandatory Access Control (MAC) is the strictest of all levels of


control. The design of MAC was defined, and is primarily used by
the government.
MAC takes a hierarchical approach to controlling access to
resources. Under a MAC enforced environment access to all
resource objects (such as data files) is controlled by settings
defined by the system administrator. As such, all access to
resource objects is strictly controlled by the operating system
based on system administrator configured settings. It is not
possible under MAC enforcement for users to change the access
control of a resource.
Mandatory Access Control begins with security labels assigned to
all resource objects on the system. These security labels contain
two pieces of information - a classification (top secret, confidential
etc) and a category (which is essentially an indication of the
management level, department or project to which the object is
available).
Similarly, each user account on the system also has classification
and category properties from the same set of properties applied to
the resource objects. When a user attempts to access a resource
under Mandatory Access Control the operating system checks the
user's classification and categories and compares them to the
properties of the object's security label. If the user's credentials
match the MAC security label properties of the object access is
allowed. It is important to note that both the classification and
categories must match. A user with top secret classification, for
example, cannot access a resource if they are not also a member
of one of the required categories for that object.

7.Classify the different sources of threats in cyber security with a


neat diagram

There are various types of network threats & attacks. A number


of the major classes are:
- Denial of provider / distributed denial of provider (DDoS)
- Man-in-the-middle (MITM)
- Eavesdropping / Sniffer attack
- Utility layer attacks (layer 7 or web assaults)
- Advanced chronic threats (apt)

8.Infer the motives for Vulnerabilities in the cyber-attack with an


example
A vulnerability in cyber security refers to any weakness in an
information system, system processes, or internal controls of an
organization. These vulnerabilities are targets for
lurking cybercrimes and are open to exploitation through the
points of vulnerability.

Examples of Vulnerabilities

Below are some examples of vulnerability:

 A weakness in a firewall that can lead


 Lack of security cameras
 Unlocked doors at businesses

9. Explain White Hat Hackers?


A white hat hacker -- or ethical hacker -- is an individual who uses hacking
skills to identify security vulnerabilities in hardware, software or networks.
However, unlike black hat hackers -- or malicious hackers -- white hat
hackers respect the rule of law as it applies to hacking.
most commonly, white hat hackers are employed by specific businesses.
These experts then set about identifying weaknesses and helping to improve
security.

To safeguard services and assets against attack, white hat hackers are often
behind the scenes, thwarting attacks in real time. In addition, they can be
focused on cyber threat analysis, exposing weaknesses to try to help guide
and prioritize vulnerability remediation.

10. Explain black Hat Hackers?

Black hat hackers are criminals who break into computer networks with
malicious intent. They may also release malware that destroys files, holds
computers hostage, or steals passwords, credit card numbers, and other
personal information.

Black hat hackers often start as novice "script kiddies" using purchased
hacker tools to exploit security lapses. Some are trained to hack by bosses
eager to make money quickly. The leading black hats tend to be skilled
hackers who work for sophisticated criminal organizations which
sometimes provide collaboration tools for their workers and offer service
agreements to customers, just like legitimate businesses. Black hat malware
kits sold on the dark web occasionally even include warranties and
customer service.

You might also like