Cyber Security
Cyber Security
Information security
Network security
Operational security
Application security
End-user education
Business continuity planning
4) Define Cryptography.
6) What is CIA?
7) What is a Firewall?
It is a security system designed for the network. A firewall is set on the boundaries
of any system or network which monitors and controls network traffic. Firewalls
are mostly used to protect the system or network from malware, worms, and
viruses. Firewalls can also prevent content filtering and remote access.
8) Explain Traceroute
It is a tool that shows the packet path. It lists all the points that the packet passes
through. Traceroute is used mostly when the packet does not reach the
destination. Traceroute is used to check where the connection breaks or stops or
to identify the failure.
Usage HIDS is used to detect the intrusions. NIDS is used for the network.
What does it It monitors suspicious system activities and It monitors the traffic of all
do? traffic of a specific device. device on the network.
Data leakage is an unauthorized transfer of data to the outside world. Data leakage
occurs via email, optical media, laptops, and USB keys.
It is the technique for identifying open ports and service available on a specific
host. Hackers use port scanning technique to find information for malicious
purposes.
1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
VPN stands for Virtual Private Network. It is a network connection method for
creating an encrypted and safe connection. This method protects data from
interference, snooping, censorship.
Black hat hackers are people who have a good knowledge of breaching network
security. These hackers can generate malware for personal financial gain or other
malicious reasons. They break into a secure network to modify, steal, or destroy
data so that the network can not be used by authorized network users.
17) What are white hat hackers?
White hat hackers or security specialist are specialized in penetration testing. They
protect the information system of an organization.
Grey hat hackers are computer hacker who sometimes violate ethical standards,
but they do not have malicious intent.
There are various ways to reset BIOS password. Some of them are as follows:
It is a protocol used for finding MAC address associated with IPv4 address. This
protocol work as an interface between the OSI network and OSI link layer.
The main difference between these two is that SSL verifies the identity of the
sender. SSL helps you to track the person you are communicating to. TLS offers a
secure channel between two clients.
24) What is the abbreviation of CSRF?
TFA stands for Two Factor Authentication. It is a security process to identify the
person who is accessing an online account. The user is granted access only after
presenting evidence to the authentication device.
Symmetric encryption requires the same key for encryption and decryption. On the
other hand, asymmetric encryption needs different keys for encryption and
decryption.
WAF stands for Web Application Firewall. WAF is used to protect the application by
filtering and monitoring incoming and outgoing traffic between web application
and the internet.
A Hacker is a person who finds and exploits the weakness in computer systems,
smartphones, tablets, or networks to gain access. Hackers are well experienced
computer programmers with knowledge of computer security.
Yong domains are easily infected with malicious software. You need to use DNS
monitoring tools to identify malware.
SSH stands for Secure Socket Shell or Secure Shell. It is a utility suite that provides
system administrators secure way to access the data on a network.
SSL verifies the sender's identity, but it does not provide security once the data is
transferred to the server. It is good to use server-side encryption and hashing to
protect the server against a data breach.
Vulnerabilities refer to the weak point in software code which can be exploited by a
threat actor. They are most commonly found in an application like SaaS (Software
as a service) software.
39) Define the term residual risk. What are three ways to deal with risk?
It is a threat that balances risk exposure after finding and eliminating threats.
1. Reduce it
2. Avoid it
3. Accept it.
Malware
Phishing
Password attacks
DDoS
Man in the middle
Drive-by downloads
Malvertising
Rogue software
In order to authenticate users, they have to provide their identity. The ID and Key
can be used to confirm the user's identity. This is an ideal way how the system
should authorize the user.
46) Name the protocol that broadcast the information across all the devices.
Use cipher algorithm to protect email, credit card information, and corporate data.
Public Wi-Fi has many security issues. Wi-Fi attacks include karma attack, sniffing,
war-driving, brute force attack, etc.
Public Wi-Fi may identify data that is passed through a network device like emails,
browsing history, passwords, and credit card data.
Data encryption is a technique in which the sender converts the message into a
code. It allows only authorized user to gain access.
Diffie-Hellman is a protocol used while exchanging key between two parties while
RSA is an algorithm that works on the basis two keys called private and public key.
The user uses RDP client software to serve this purpose while other device must
run RDP server software. This protocol is specifically designed for remote
management and to access virtual PCs, applications, and terminal server.
Forward Secrecy is a security measure that ensures the integrity of unique session
key in event that long term key is compromised.
IV stands for the initial vector is an arbitrary number that is used to ensures that
identical text encrypted to different ciphertexts. Encryption program uses this
number only once per session.
54) Explain the difference between stream cipher and block cipher.
RCx
Blowfish
Rijndael (AES)
DES
The full form of ECB is Electronic Codebook, and the full form of CBC is Cipher
Block Chaining.
Buffer overflow attack is an attack that takes advantage of a process that attempts
to write more data to a fixed-length memory block.
SRM stands for Security Reference Monitor provides routines for computer drivers
to grant access rights to object.
A virus is a malicious software that is executed without the user's consent. Viruses
can consume computer resources, such as CPU time and memory. Sometimes, the
virus makes changes in other computer programs and insert its own code to harm
the computer system.
Human-based attack: They may pretend like a genuine user who requests
higher authority to reveal private and confidential information of the
organization.
Computer-based attack: In this attack, attackers send fake emails to harm
the computer. They ask people to forward such email.
Mobile-based attack: Attacker may send SMS to others and collect important
information. If any user downloads a malicious app, then it can be misused
to access authentication information.
How they infect a It inserts malicious code into a Generate it's copy and spread
computer? specific file or program. using email client.
Dependency Virus need a host program to work They do not require any host to
function correctly.
Linked with files It is linked with .com, .xls, .exe, .doc, It is linked with any file on a
etc. network.
Tcpdump
Kismet
Wireshark
NetworkMiner
Dsniff
Protocol Sniffing
Web password sniffing
Application-level sniffing
TCP Session stealing
LAN Sniffing
ARP Sniffing
TCP session hijacking is the misuse of a valid computer session. IP spoofing is the
most common method of session hijacking. In this method, attackers use IP
packets to insert a command between two nodes of the network.
Hacking Tools are computer programs and scripts that help you find and exploit
weaknesses in computer systems, web applications, servers, and networks. There
are varieties of such tools available on the market. Some of them are open source,
while others are a commercial solution.
RSA
Twofish
AES
Triple DES
It is not right to send login credentials through email because if you send someone
userid and password in the mail, chances of email attacks are high.
It is a method used for a security breach in wireless networks. There are two types
of WEP cracking: 1) Active cracking and 2) Passive cracking.
Aircrack
WebDecrypt
Kismet
WEPCrack
It is a technique used to obtain a username, password, and credit card details from
other users.
Acunetix
WebInspect
Probably
Netsparker
Angry IP scanner:
Burp Suite
Savvius
Security threat is defined as a risk which can steal confidential data and harm
computer systems as well as organization.
94) What are physical threats?
98) List security vulnerabilities as per Open Web Application Security Project
(OWASP).
Security vulnerabilities as per open web application security project are as follows:
SQL Injection
Cross-site request forgery
Insecure cryptographic storage
Broken authentication and session management
Insufficient transport layer protection
Unvalidated redirects and forwards
Failure to restrict URL access
An access token is a credential which is used by the system to check whether the
API should be granted to a particular object or not.
ARP poisoning is sending fake addresses to the switch so that it can associate the
fake addresses with the IP address of a genuine computer on a network and hijack
the traffic.
Trojans
Adware
Worms
Spyware
Denial of Service Attacks
Distributed Denial of Service Attacks
Virus
Key loggers
Unauthorized access to computer systems resources
Phishing
Nmap is a tool which is used for finding networks and in security auditing.
EtterPeak is a network analysis tool that is used for sniffing packets of network
traffic.
Some web-based attacks are: 1) SQL Injection attacks, 2) Phishing, 3) Brute Force,
4) DNS Spoofing, 4) Denial of Service, and 5) Dictionary attacks.
Virus
Backdoors
Bots
Worm
There are four types of cyber attackers. They are: 1) cybercriminals, 2) hacktivists,
3) insider threats, 4) state-sponsored attackers.