Cyber Security1
Cyber Security1
Cryptography is the practice and study of techniques for securing information and
communication mainly to protect the data from third parties that the data is not intended for.
Basis of
Symmetric Encryption Asymmetric Encryption
Comparison
Same key for encryption & Different keys for encryption &
Encryption key
decryption decryption
Encryption is fast but more Encryption is slow due to high
Performance
vulnerable computation
Algorithms DES, 3DES, AES and RC4 Diffie-Hellman, RSA
Often used for securely exchanging
Purpose Used for bulk data transmission
secret keys
IDS is Intrusion Detection System and it only detects intrusions and the administrator has to
take care of preventing the intrusion. Whereas, in IPS i.e., Intrusion Prevention System, the
system detects the intrusion and also takes actions to prevent the intrusion.
CIA stands for Confidentiality, Integrity, and Availability. CIA is a model that is designed to
guide policies for Information Security. It is one of the most popular models used by
organizations.
Confidentiality
The information should be accessible and readable only to authorized personnel. It should not
be accessible by unauthorized personnel. The information should be strongly encrypted just
in case someone uses hacking to access the data so that even if the data is accessed, it is not
readable or understandable.
Integrity
Making sure the data has not been modified by an unauthorized entity. Integrity ensures that
data is not corrupted or modified by unauthorized personnel. If an authorized
individual/system is trying to modify the data and the modification wasn’t successful, then
the data should be reversed back and should not be corrupted.
Availability
Both Encryption and Hashing are used to convert readable data into an unreadable format.
The difference is that the encrypted data can be converted back to original data by the process
of decryption but the hashed data cannot be converted back to original data.
A Firewall is a network security system set on the boundaries of the system/network that
monitors and controls network traffic. Firewalls are mainly used to protect the
system/network from viruses, worms, malware, etc. Firewalls can also be to prevent remote
access and content filtering.
Vulnerability Assessment is the process of finding flaws on the target. Here, the
organization knows that their system/network has flaws or weaknesses and want to find these
flaws and prioritize the flaws for fixing.
Penetration Testing is the process of finding vulnerabilities on the target. In this case, the
organization would have set up all the security measures they could think of and would want
to test if there is any other way that their system/network can be hacked.
The data should be available to the user whenever the user requires it. Maintaining of
Hardware, upgrading regularly, Data Backups and Recovery, Network Bottlenecks should be
taken care of.
1. The client sends a SYN(Synchronize) packet to the server check if the server is up or
has open ports
2. The server sends SYN-ACK packet to the client if it has open ports
3. The client acknowledges this and sends an ACK(Acknowledgment) packet back to
the server
9. What are the response codes that can be received from a Web Application?
1xx–Informationalresponses
2xx-Success
3xx-Redirection
4xx-Client-sideerror
5xx – Server-side error
Traceroute is a tool that shows the path of a packet. It lists all the points (mainly routers)
that the packet passes through. This is used mostly when the packet is not reaching its
destination. Traceroute is used to check where the connection stops or breaks to identify the
point of failure.
HIDS(Host IDS) and NIDS(Network IDS) are both Intrusion Detection System and work
for the same purpose i.e., to detect the intrusions. The only difference is that the HIDS is set
up on a particular host/device. It monitors the traffic of a particular device and suspicious
system activities. On the other hand, NIDS is set up on a network. It monitors traffic of all
device of the network.
Secure servers use the Secure Sockets Layer (SSL) protocol for data encryption and
decryption to protect data from unauthorized interception.
Step 1: Make sure you have a secure password for your root and administrator users
Step 2: The next thing you need to do is make new users on your system. These will
be the users you use to manage the system
Step 4: The next step is to configure your firewall rules for remote access
Data Leakage can be prevented by using tools, software, and strategies known as DLP(Data
Leakage Prevention) Tools.
Following are some common cyber attacks that could adversely affect your system.
1. Malware
2. Phishing
3. Password Attacks
4. DDoS
5. Man in the Middle
6. Drive-By Downloads
7. Malvertising
8. Rogue Software
17. What is a Brute Force Attack? How can you prevent it?
Brute Force is a way of finding out the right credentials by repetitively trying all the
permutations and combinations of possible credentials. In most cases, brute force attacks are
automated where the tool/software automatically tries to login with a list of credentials. There
are various ways to prevent Brute Force attacks. Some of them are:
Password Length: You can set a minimum length for password. The lengthier the
password, the harder it is to find.
Password Complexity: Including different formats of characters in the password
makes brute force attacks harder. Using alpha-numeric passwords along with special
characters, and upper and lower case characters increase the password complexity
making it difficult to be cracked.
Limiting Login Attempts: Set a limit on login failures. For example, you can set the
limit on login failures as 3. So, when there are 3 consecutive login failures, restrict the
user from logging in for some time, or send an Email or OTP to use to log in the next
time. Because brute force is an automated process, limiting login attempts will break
the brute force process.
Port Scanning is the technique used to identify open ports and service available on a host.
Hackers use port scanning to find information that can be helpful to exploit vulnerabilities.
Administrators use Port Scanning to verify the security policies of the network. Some of the
common Port Scanning Techniques are:
1. Ping Scan
2. TCP Half-Open
3. TCP Connect
4. UDP
Physical Layer: Responsible for transmission of digital data from sender to receiver through
the communication media,
Data Link Layer: Handles the movement of data to and from the physical link. It is also
responsible for encoding and decoding of data bits.
Network Layer: Responsible for packet forwarding and providing routing paths for network
communication.
Transport Layer: Responsible for end-to-end communication over the network. It splits the
data from the above layer and passes it to the Network Layer and then ensures that all the
data has successfully reached at the receiver’s end.
Session Layer: Controls connection between the sender and the receiver. It is responsible for
starting, ending, and managing the session and establishing, maintaining and synchronizing
interaction between the sender and the receiver.
Presentation Layer: It deals with presenting the data in a proper format and data structure
instead of sending raw datagrams or packets.
Application Layer: It provides an interface between the application and the network. It
focuses on process-to-process communication and provides a communication interface.
20. What is a VPN?
Almost all Cybersecurity Interview Questions will have this question included. VPN stands
for Virtual Private Network. It is used to create a safe and encrypted connection. When you
use a VPN, the data from the client is sent to a point in the VPN where it is encrypted and
then sent through the internet to another point. At this point, the data is decrypted and sent to
the server. When the server sends a response, the response is sent to a point in the VPN where
it is encrypted and this encrypted data is sent to another point in the VPN where it is
decrypted. And finally, the decrypted data is sent to the client. The whole point of using a
VPN is to ensure encrypted data transfer.
23. What are black hat, white hat and grey hat hackers?
Black hat hackers are known for having vast knowledge about breaking into
computer networks. They can write malware which can be used to gain access to
these systems. This type of hackers misuse their skills to steal information or use the
hacked system for malicious purpose.
White hat hackers use their powers for good deeds and so they are also
called Ethical Hackers. These are mostly hired by companies as a security specialist
that attempts to find and fix vulnerabilities and security holes in the systems. They use
their skills to help make the security better.
Anonymity is just a simple thing in Ethical Hacking & CyberSecurity. If you are
interested in this domain, check Edureka’s CompTIA Security+ Certification
Training.
Grey hat hackers are an amalgamation of a white hat and black hat hacker. They
look for system vulnerabilities without the owner’s permission. If they find any
vulnerabilities, they report it to the owner. Unlike Black hat hackers, they do not
exploit the vulnerabilities found.
Patch management should be done as soon as it is released. For windows, once the
patch is released it should be applied to all machines, not later than one month. Same
goes for network devices, patch it as soon as it is released. Proper patch management
should be followed.
Since BIOS is a pre-boot system it has its own storage mechanism for settings and
preferences. A simple way to reset is by popping out the CMOS battery so that the
memory storing the settings lose its power supply and as a result, it will lose its
setting.
Use VPN
Use strong WEP/WPA encryption
Use Intrusion Detection Systems
Force HTTPS
Public Key Pair Based Authentication
Address Resolution Protocol (ARP)is a protocol for mapping an Internet Protocol address
(IP address) to a physical machine address that is recognized in the local network.
When an incoming packet destined for a host machine on a particular local area network
arrives at a gateway, the gateway asks the ARP program to find a physical host or MAC
address that matches the IP address.
The ARP program looks in the ARP cache and, if it finds the address, provides it so that the
packet can be converted to the right packet length and format and sent to the machine.
If no entry is found for the IP address, ARP broadcasts a request packet in a special format to
all the machines on the LAN to see if one machine knows that it has that IP address
associated with it.
30. What is port blocking within LAN?
Restricting the users from accessing a set of services within the local area network is called
port blocking.
Stopping the source to not to access the destination node via ports. As the application works
on the ports, so ports are blocked to restricts the access filling up the security holes in the
network infrastructure.
A Botnet is a number of devices connected to the internet where each device has one or more
bots running on it. The bots on the devices and malicious scripts used to hack a victim.
Botnets can be used to steal data, send spams and execute a DDOS attack.
Salt is a random data. When a properly protected password system receives a new password,
it creates a hash value of that password, a random salt value, and then the combined value is
stored in its database. This helps to defend against dictionary attacks and known hash attacks.
Example: If someone uses the same password on two different systems and they are being
used using the same hashing algorithm, the hash value would be same, however, if even one
of the system uses salt with the hashes, the value will be different.
SSL is meant to verify the sender’s identity but it doesn’t search for anything more than that.
SSL can help you track the person you are talking to but that can also be tricked at times.
TLS is also an identification tool just like SSL, but it offers better security features. It
provides additional protection to the data and hence SSL and TLS are often used together for
better protection.
Requires not only a password and username but also something that only, and only, that user
has on them, i.e. a piece of information only they should know or have immediately to hand –
such as a physical token.
Authenticator apps replace the need to obtain a verification code via text, voice call or email.
Self-learning security systems use data mining, pattern recognition, and natural language
processing to simulate the human brain, albeit in a high-powered computer model.
VPN VLAN
Helps to group workstations that are
Related to remote access to the network of a
not within the same locations into the
company
same broadcast domain
Means to logically segregate networks
Used to connect two points in a secured and
without physically segregating them
encrypted tunnel
with various switches
Does not involve any encryption technique but it is
Saves the data from prying eyes while
only used to slice up your logical network into
in transit and no one on the net can
different sections for the purpose of management
capture the packets and read the data
and security
SQL Injection (SQLi) is a code injection attack where an attacker manipulates the data being
sent to the server to execute malicious SQL statements to control a web application’s
database server, thereby accessing, modifying and deleting unauthorized data. This attack is
mainly used to take over database servers.
You can prevent SQL Injection attacks by using the following practices: