Cyber Security Previous Year Solution 2021
Cyber Security Previous Year Solution 2021
1. Social Engineering:
2. Footprinting:
3. Scanning:
3. Describe some working of the following tools with the help of examples :
(a) Nmap
(b) Zenmap
Ans:- (a) Nmap: Nmap (Network Mapper) is a powerful open-source tool used
for network discovery and security auditing. It is designed to scan networks,
discover hosts, services running on those hosts, and various information
related to network configuration. Here's how Nmap works and an example of
its usage:
Working of Nmap:
This command performs a TCP SYN scan (-sS) on the host with IP address
192.168.1.1, displaying verbose output (-v).
Working of Zenmap:
Example: After launching Zenmap, users can input the target IP addresses or
ranges, select scan options and profiles, and initiate the scan with a single click.
The results are then displayed in the interface, allowing users to analyse the
findings and take appropriate actions.
(c) Port Scanner: A port scanner is a software tool used to identify open ports
on a target system or network. It works by sending network packets to specific
port numbers on a target host and analysing the responses received. Port
scanners are commonly used for security auditing, network monitoring, and
troubleshooting network connectivity issues.
This command performs a port scan on the host with IP address 192.168.1.1,
scanning ports 1 to 100. The output will display the status of each scanned
port, indicating whether it is open, closed, or filtered.
The Setup:
1. Malicious Hotspot: The attacker creates a fake Wi-Fi network with a
name similar to a legitimate one (e.g., "Coffee Shop Free Wi-Fi_2"). This
entices unsuspecting users to connect.
2. Traffic Interception: Once a user connects to the fake hotspot, the
attacker's device acts as a middleman between the user's device and the
real internet. All data traffic (web browsing, emails, messages) flows
through the attacker's device.
The Deception:
1. Packet Sniffing: The attacker uses tools to capture data packets traveling
between the user's device and the internet. These packets might contain
sensitive information like login credentials, credit card details, or
personal messages.
2. HTTPS Spoofing (Optional): For secure websites using HTTPS, the
attacker might attempt to fool the user's device by presenting a fake SSL
certificate. This creates a false sense of security while the attacker
intercepts encrypted data (though decryption is more complex).
Data Theft: Login credentials, credit card details, emails, and other
sensitive information can be stolen from intercepted packets.
Session Hijacking: If the attacker captures a valid session cookie, they
might be able to hijack the user's session on a website or application,
impersonating the user and potentially gaining access to accounts.
Malware Injection: The attacker might inject malicious code into
websites or data streams, infecting the user's device with malware when
they access the compromised content.
By being aware of MitM attacks and taking precautions, you can significantly
reduce the risk of falling victim to these deceptive tactics.
Here's how a one-way hash function can be used for message authentication:
In summary, Shivi and Shivesh could potentially face legal liability for copyright
infringement, DMCA violations, breach of licensing agreements, and privacy
violations if they implement their idea without proper authorization and
compliance with applicable laws and regulations.
8. You get a call from a high school student named Mohan who claims he has
just received an e-mail from another student threatening to commit suicide.
Mohan isn't Sure where the student sent the e-mail from. Write a brief
report on how you should proceed, including what you should do first in this
situation.
1. Ensure Safety: The first priority is to ensure the safety and well-being of
the individual who sent the threatening email. If there is an immediate
risk of harm, contact emergency services (police, paramedics)
immediately.
2. Engage in Dialogue: Engage in a supportive and non-judgmental
dialogue with Mohan to gather more information about the email,
including any specific details provided by the sender.
3. Verify Information: Attempt to verify the identity of the sender and the
credibility of the threat. If possible, ask Mohan to provide any additional
information or context about the sender and their circumstances.
4. Contact School Authorities: Inform school authorities, such as the
principal, guidance counsellor, or school psychologist, about the
situation. Provide them with relevant details and collaborate on a
response plan.
5. Involve Parents or Guardians: If appropriate, involve the parents or
guardians of both Mohan and the student who sent the threatening
email. Inform them about the situation and seek their support in
addressing the issue.
6. Assess Risk: Assess the level of risk posed by the threat based on the
information available. Consider factors such as the content of the email,
the sender's history or behaviour, and any known risk factors for suicide.
7. Report to Authorities: If deemed necessary, report the incident to local
law enforcement or child protective services. Provide them with all
available information and cooperate with any investigations.
8. Provide Support and Resources: Offer support and reassurance to
Mohan, emphasizing the importance of taking threats of self-harm
seriously and seeking help from trusted adults or mental health
professionals. Provide information about available resources, such as
hotlines or counselling services, for individuals experiencing suicidal
thoughts.
9. Document Incident: Document all relevant information, including details
of the threatening email, actions taken, and communication with Mohan
and school authorities. Maintain confidentiality and adhere to privacy
laws and policies.
Deepak Kumar
22/04/2024
In summary, both mobile and IoT security are essential aspects of overall
cybersecurity, requiring proactive measures to protect devices, data, and
systems from evolving threats in an increasingly interconnected world.
1. Top Ten Project: OWASP releases a list of the top ten most critical web
application security risks, known as the OWASP Top Ten. This list helps
organizations prioritize their efforts to mitigate common security
vulnerabilities.
2. Documentation: OWASP provides comprehensive documentation, guides, and best
practices on various aspects of web application security. This includes topics such as
secure coding practices, authentication and authorization mechanisms, input
validation, and security testing methodologies.
3. Tools and Projects: OWASP hosts a wide range of open-source tools and projects
aimed at improving web application security. These tools cover areas such as
vulnerability scanning, penetration testing, code analysis, and security automation.
4. Community Engagement: OWASP fosters a vibrant and active community of security
professionals, developers, researchers, and enthusiasts who collaborate on various
projects, share knowledge, and contribute to the advancement of web application
security.
Key Characteristics:
1. Volume: DDoS attacks generate a massive amount of traffic or requests, often far
beyond the target's capacity to handle, leading to service disruption or downtime.
2. Distributed Nature: DDoS attacks involve multiple sources, making it challenging to
identify and mitigate the attack. Botnets consisting of compromised devices, such as
computers, IoT devices, or servers, are often used to distribute the attack traffic.
3. Variety of Attack Vectors: DDoS attacks can exploit various vulnerabilities and
protocols to overwhelm the target. Common attack vectors include UDP floods, SYN
floods, HTTP floods, and DNS amplification attacks.
4. Intent: DDoS attacks may be launched for various reasons, including financial
extortion, political activism, competitive advantage, or simply as a form of vandalism
or sabotage.
5. Impact: DDoS attacks can have significant financial, operational, and reputational
consequences for organizations. They can disrupt online services, cause revenue
loss, damage brand reputation, and impact customer trust and satisfaction.