Unit 2
Unit 2
Q.1) What are the Cyber Security Vulnerabilities? Explain its various types with
suitable examples.
Ans:
3) Poor Network Segmentation and Monitoring: Many attackers rely on poor network
segmentation and monitoring to gain complete access to a network subnet. This has
contributed to the considerable persistence of attackers breaching modern technologies
and retaining more extended access.
A lack of subnet surveillance is a substantial root cause of this flaw.
4) Poor Endpoint Security Defences: Zero-day attacks are becoming more widespread.
Many of the security endpoint protections have proven ineffective in tackling
sophisticated ransomware and intrusions targeting end-users and server platforms.
Traditional antivirus signature-based solutions are no longer considered sufficient
since many attackers can quickly bypass the signatures.
5) Poor Data Backup and Recovery: Organizations have a pressing need to backup and
restore data with the latest threat of malware becomes high, along with conventional
disasters and other failures. Unfortunately, many companies don’t succeed in this region
due to a lack of proper backup and recovery options.
Examples:
1) Hardware: Susceptibility to humidity, dust, soiling, natural disaster, poor encryption or
firmware vulnerability.
2) Software: Insufficient testing, lack of audit trail, design flaws, memory safety violations,
input validation errors, privilege-confusion bugs, race conditions, side channel attacks,
timing attacks and user interface failures.
UNIT-2: Vulnerabilities and Access Control
Ans.
Threat management: Threat management is the process used by cyber professionals
to prevent cyber-attacks, detect cyber threats and respond to security incidents.
- Many modern threat management systems use the cybersecurity framework
established by the National Institute of Standards and Technology (NIST).
- NIST provides comprehensive guidance to improve information security and
cybersecurity risk management for private sector organizations. There are five
primary functions for threat management:
They are Identify, protect, detect, respond and recover.
Identify
The identify function includes categories, such as asset management, business environment,
governance, risk assessment, risk management strategy and supply chain risk management.
Protect
The protect function covers much of the technical and physical security controls for
developing and implementing appropriate safeguards and protecting critical infrastructure.
These categories are identity management and access control, awareness and training, data
security, information protection processes and procedures, maintenance and protective
technology.
Detect
The detect function implements measures that alert an organization to cyberattacks. Detect
categories include anomalies and events, continuous security monitoring and early detection
processes.
Respond
The respond function ensures an appropriate response to cyberattacks and other cybersecurity
events. Categories include response planning, communications, analysis, mitigation and
improvements.
Recover
Recovery activities implement plans for cyber resilience and ensure business continuity in the
event of a cyberattack, security breach or another cybersecurity event. The recovery functions
are recovery planning improvements and communications.
UNIT-2: Vulnerabilities and Access Control
Q.3) Explain various cyber security safeguards w.r.t. Access control, audit
authentication, bio-Metrix, cryptography, deception, ethical hacking, denial of
service filters.
Ans:
Cybersecurity safeguards are the fundamental part of a cybersecurity investment. From the
functional perspective, there are administrative and technical safeguards. The perspective
of time allows a distinction between preventive, detective and corrective safeguards.
Access control: Access control is a security technique that regulates who or what can view
or use resources in a computing environment. Access control systems perform identification,
authentication and authorization of users and entities by evaluating required login
credentials.
There are two types of access control: physical and logical.
Physical access control limits access to campuses, buildings, rooms and physical IT assets.
Logical access control limits connections to computer networks, system files and data.
- The goal of access control is to minimize the security risk of unauthorized access to
physical and logical systems.
- Types of Biometrics: Facial recognition, Fingerprints, Finger geometry (the size and
position of fingers), Vein recognition, Retina scanning, DNA matching, digital signatures,
etc.
Ethical Hacking: Gaining access to a system that you are not supposed to have access is
considered as hacking.
- Ethical hacking is also known as White hat Hacking or Penetration Testing. Ethical
hacking involves an authorized attempt to gain unauthorized access to a computer
system or data. Ethical hacking is used to improve the security of the systems and
networks by fixing the vulnerability found while testing.
- Advantages: It is used to recover the loss of information, especially when you lost your
password, It is used to perform penetration testing to increase the security of the
computer and network and It is used to test how good security is on your network.
Host-Based IDS (HIDS): A host-based IDS is deployed on a particular endpoint and designed to
protect it against internal and external threats. Such an IDS may have the ability to monitor network
traffic to and from the machine, observe running processes, and inspect the system’s logs.
A host-based IDS’s visibility is limited to its host machine, decreasing the available context for
decision-making, but has deep visibility into the host computer’s internals.
Signature Detection: Signature-based IDS solutions use fingerprints of known threats to identify
them. Once malware or other malicious content has been identified, a signature is generated and
added to the list used by the IDS solution to test incoming content. This enables an IDS to achieve a
high threat detection rate with no false positives.
- Can’t detect zero-day vulnerabilities.
Anomaly Detection: Anomaly-based IDS solutions build a model of the “normal” behaviour of the
protected system. All future behaviour is compared to this model, and any anomalies are labelled as
potential threats and generate alerts.
- While this approach can detect novel or zero-day threats, the difficulty of building an
accurate model of “normal” behaviour.
Hybrid Detection: A hybrid IDS uses both signature-based and anomaly-based detection. This
enables it to detect more potential attacks with a lower error rate than using either system in
isolation.