Cs questiON
Cs questiON
2. **Phishing Attacks**:
Phishing is a type of active attack that relies
on social engineering to deceive individuals
into revealing sensitive information, such as
usernames, passwords, or credit card details.
Here's how a phishing attack typically unfolds:
- **Email or Message**: The attacker sends
a fraudulent email or message that appears to
come from a legitimate source, such as a
bank, social media site, or trusted company.
- **Deception**: The email often contains a
sense of urgency or a compelling reason to
take immediate action. It may include a link to
a fake website that mimics a genuine one.
- **Data Harvesting**: If the recipient falls
for the deception and clicks the link, they are
taken to a fake login page where they are
prompted to enter sensitive information. This
information is then captured by the attacker.
- **Misuse**: The attacker can then misuse
the stolen information for various malicious
purposes, such as unauthorized access to the
victim's accounts or committing financial
fraud.
Active attacks like these highlight the
importance of robust cybersecurity measures,
including regular software updates, antivirus
software, and user awareness training, to
protect against malicious activities in the
digital realm.
4 What is passive attack? Explain any two
active attacks in detail.
Ans : A passive attack in cybersecurity is
when a malicious actor secretly observes or
intercepts data without altering or damaging
it. Instead of actively manipulating or
damaging information, passive attacks focus
on unauthorized data access or surveillance.
Here are explanations of two common passive
attacks:
1. **Eavesdropping (Sniffing)**:
Eavesdropping is a classic example of a
passive attack. It involves an attacker secretly
intercepting and monitoring data as it travels
across a network or communication channel.
Here's how it works:
- **Interception**: The attacker gains access
to the data transmission, often by exploiting
vulnerabilities or using specialized tools.
- **Monitoring**: Instead of altering the
data, the attacker silently listens and captures
the information being exchanged, such as
emails, messages, or login credentials.
- **Data Theft**: The purpose of
eavesdropping is to steal sensitive
information, which can later be used for
malicious purposes, such as identity theft or
unauthorized access to accounts.
2. **Traffic Analysis**:
Traffic analysis is another passive attack that
doesn't involve altering data but focuses on
analyzing patterns and metadata associated
with data transmission. Here's how it
operates:
- **Data Collection**: Attackers collect data
about the timing, volume, and
sources/destinations of network traffic. This
can include information like IP addresses and
packet sizes.
- **Pattern Recognition**: By analyzing this
metadata, attackers can deduce patterns of
behavior, identify communication
relationships, and potentially gain insights
into an organization's activities or plans.
- **Espionage or Espionage or Profiling**:
The gathered information can be used for
purposes such as corporate espionage, spying,
or profiling an individual's online behavior. It
may help attackers identify vulnerabilities or
targets for future attacks.
Passive attacks are often harder to detect
because they don't disrupt the normal flow of
data. To protect against passive attacks,
encryption techniques and secure
communication protocols are commonly
employed to ensure that even if intercepted,
the data remains unreadable to unauthorized
parties.
1. **Reconnaissance (Information
Gathering)**:
- In this phase, hackers gather information
about the target system or network. This
includes identifying potential vulnerabilities,
finding out who the users are, and
understanding the system's architecture.
- Techniques: Hackers use methods like
scanning for open ports, conducting network
mapping, and gathering information from
social media or publicly available sources.
2. **Scanning**:
- Once hackers have gathered initial
information, they move on to scanning the
target more comprehensively. This involves
probing the system for weaknesses and
vulnerabilities.
- Techniques: Port scanning, vulnerability
scanning, and network analysis tools are used
to identify potential entry points.
4. **Maintaining Access**:
- After successfully gaining access, hackers
aim to maintain their presence within the
system or network without being detected.
This may involve creating backdoors or
installing rootkits to maintain control.
- Techniques: Installing malware or
establishing remote access mechanisms that
allow continued control over the
compromised system.
1. **Reconnaissance (Information
Gathering)**:
- In this phase, hackers gather information
about the target system or network. This
includes identifying potential vulnerabilities,
finding out who the users are, and
understanding the system's architecture.
- Techniques: Hackers use methods like
scanning for open ports, conducting network
mapping, and gathering information from
social media or publicly available sources.
2. **Scanning**:
- Once hackers have gathered initial
information, they move on to scanning the
target more comprehensively. This involves
probing the system for weaknesses and
vulnerabilities.
- Techniques: Port scanning, vulnerability
scanning, and network analysis tools are used
to identify potential entry points.
4. **Maintaining Access**:
- After successfully gaining access, hackers
aim to maintain their presence within the
system or network without being detected.
This may involve creating backdoors or
installing rootkits to maintain control.
- Techniques: Installing malware or
establishing remote access mechanisms that
allow continued control over the
compromised system.
5. **Covering Tracks (Maintaining
Anonymity)**:
- To avoid detection, hackers often attempt
to erase or alter logs, hide their activities, and
cover their digital tracks.
- Techniques: Deleting logs, altering
timestamps, and using anonymization
techniques like VPNs or proxy servers.
(i) **Threat**:
- A **threat** refers to any potential danger
or harm that can exploit a vulnerability in a
computer system, network, or organization's
security. It is an event or circumstance that
has the potential to cause damage, loss, or
compromise of data or systems.
- Threats can take various forms, such as
malware (viruses, Trojans, ransomware),
unauthorized access attempts, natural
disasters, human errors, and more.
Understanding and assessing threats is a
crucial part of cybersecurity to mitigate risks
effectively.
(ii) **Exploit**:
- An **exploit** is a specific piece of
software or a technique that takes advantage
of a vulnerability or weakness in a computer
system, application, or network to carry out a
malicious action.
- Exploits are often used by hackers to gain
unauthorized access, execute arbitrary code,
or compromise the security of a system.
Exploits can target software vulnerabilities,
misconfigurations, or weaknesses in a
system's defenses.
- **Scanning**:
- Hackers scan the target more
comprehensively by probing the system for
weaknesses and vulnerabilities. They use
tools to identify potential entry points.
Unit-2
8 What is malware? Explain types of
malwares.
Ans : **Malware** is a broad term used in
cybersecurity to describe any malicious
software or code that is designed to harm,
compromise, or gain unauthorized access to
computer systems, networks, or digital
devices. Malware can take various forms and
is created by malicious actors with the intent
of causing damage, stealing information, or
gaining control over a victim's system. Here
are some common types of malware:
1. **Viruses**:
- Viruses are self-replicating programs that
attach themselves to legitimate files or
programs. When these infected files are
executed, the virus spreads to other files and
can damage or corrupt data, steal
information, or carry out other malicious
actions.
2. **Worms**:
- Worms are standalone programs that
replicate and spread independently. They
don't need to attach themselves to other files
or programs. Worms often exploit
vulnerabilities to spread quickly through
networks and can cause significant
disruptions.
4. **Ransomware**:
- Ransomware is a type of malware that
encrypts a victim's files or entire system and
demands a ransom for the decryption key.
Victims are usually given a deadline to pay the
ransom, or their files may be permanently lost
or exposed.
5. **Spyware**:
- Spyware is designed to covertly gather
information about a user's activities, such as
browsing habits, login credentials, or personal
data. This information is then sent to the
attacker, often without the user's knowledge
or consent.
6. **Adware**:
- Adware is software that displays intrusive
and unwanted advertisements on a user's
device. While not always malicious, it can
degrade system performance and
compromise user privacy.
7. **Rootkits**:
- Rootkits are malicious software that hide
deep within a system, often at the kernel
level, making them difficult to detect and
remove. They provide unauthorized access
and control over a compromised system.
8. **Keyloggers**:
- Keyloggers record keystrokes on a victim's
computer or mobile device. Attackers can use
the captured keystrokes to steal login
credentials, credit card information, and other
sensitive data.
9. **Botnets**:
- Botnets are networks of compromised
computers, often controlled by a single entity.
These computers, known as bots, are typically
infected with malware and can be used
collectively to carry out various cyberattacks,
such as DDoS attacks or spam campaigns.
10. **Fileless Malware**:
- Fileless malware operates in the
computer's memory without leaving a trace
on the hard drive. It can be challenging to
detect and remove because it doesn't rely on
traditional executable files.
**Virus**:
**Worm**:
1. **Infection**:
- The attacker deploys a keylogger on the
target device. This can be done in several
ways, such as through malicious email
attachments, infected software downloads, or
compromised websites.
2. **Execution**:
- Once the keylogger is installed on the
target system, it runs in the background
without the user's knowledge or consent.
Some keyloggers are sophisticated enough to
evade detection by antivirus software.
3. **Keystroke Logging**:
- The keylogger starts recording every
keystroke made by the user. This includes not
only text input but also commands,
passwords, and other keyboard inputs.
4. **Data Capture**:
- The captured keystrokes are usually stored
in a hidden file or transmitted to a remote
server controlled by the attacker. Remote
transmission may occur in real-time or in
batches, depending on the keylogger's design.
5. **Data Exfiltration**:
- The attacker retrieves the captured data
from the keylogger's storage location or the
remote server. This data can contain a wealth
of sensitive information, including usernames,
passwords, credit card details, and more.
6. **Misuse of Data**:
- The attacker can misuse the stolen
information for various purposes, such as
unauthorized access to the victim's accounts,
identity theft, financial fraud, or espionage.
3. **Unintended Consequences**:
- In some cases, the excess data (in this case,
"45") may overwrite important program data,
such as function pointers or control
structures.
- Attackers can take advantage of buffer
overflows to manipulate the program's
behavior. For instance, they might craft input
specifically to overwrite a function pointer,
causing the program to execute arbitrary code
provided by the attacker.
**Example**:
1. **Emails**:
- Cybercriminals can forge email headers,
sender addresses, and content to
impersonate legitimate senders, such as
banks, government agencies, or trusted
organizations. This is often used in phishing
attacks to trick recipients into revealing
sensitive information or clicking on malicious
links.
2. **Digital Signatures**:
- Forgery of digital signatures involves
creating or altering a digital signature to make
it appear as if a particular person or entity has
signed a document or message when they
have not. This can undermine the authenticity
and integrity of digital transactions.
3. **Websites**:
- Cybercriminals can create fraudulent
websites that mimic legitimate ones, such as
online banking or e-commerce sites. This
technique is known as phishing, and it aims to
deceive users into entering sensitive
information like login credentials or credit
card details.
5. **Online Profiles**:
- Fake social media profiles, online dating
profiles, or professional profiles can be
created to impersonate real individuals or
entities. These forged profiles can be used for
scams, identity theft, or reputation
manipulation.
7. **Cryptocurrency Transactions**:
- In the world of cryptocurrencies, forging
transactions or altering transaction details can
be used to steal funds or manipulate
blockchain records.
8. **Software and Application Code**:
- Malicious actors may forge or tamper with
software or application code to introduce
vulnerabilities, backdoors, or malware. This
can compromise the security and functionality
of software.
1. **Phishing**:
- **Email Phishing**: Attackers send
deceptive emails that appear to come from
legitimate sources, such as banks or trusted
organizations. These emails often contain
malicious links or attachments, and recipients
are tricked into clicking on them and revealing
sensitive information.
2. **Pretexting**:
- Attackers create a fabricated scenario or
pretext to obtain information from a target.
For example, an attacker might pose as a
coworker and claim they need certain details
for a work-related project.
3. **Baiting**:
- Baiting attacks involve offering something
enticing, such as a free software download or
a USB drive, to a victim. Once the victim uses
the offered item, malware is installed on their
system.
4. **Quid Pro Quo**:
- In quid pro quo attacks, an attacker offers a
victim something of value, like technical
support or a service, in exchange for sensitive
information or access to the victim's system.
5. **Tailgating (Piggybacking)**:
- This involves physically following an
authorized person into a secure area or
building without proper authentication.
Attackers exploit the trust of employees or
residents to gain unauthorized access.
6. **Impersonation**:
- Attackers pose as someone else to gain
trust and access. This can involve
impersonating a colleague, a contractor, or
even a law enforcement officer.
7. **Reverse Social Engineering**:
- In reverse social engineering, the attacker
presents themselves as a helpful individual
who needs assistance. They manipulate the
victim into providing information or access
without realizing they're being targeted.
1. **Botmaster**:
- The botmaster is the individual or group
that controls the botnet. They orchestrate the
activities of the compromised devices and
issue commands to the bots. The botmaster
can communicate with the bots through a
command-and-control (C&C) server.
2. **Bots (Zombies)**:
- Bots are the compromised computers or
devices that are part of the botnet. They have
been infected with malware, which gives the
botmaster control over them. Bots can
include desktop computers, servers, IoT
(Internet of Things) devices, and more.
4. **Propagation Mechanism**:
- Botnets need a way to infect new devices
and recruit them into the network. Common
propagation mechanisms include email
attachments, malicious downloads, software
vulnerabilities, and social engineering tactics.
The malware responsible for infecting new
devices is often referred to as a "bot client."
5. **Peer-to-Peer (P2P) Communication**:
- Some botnets use a P2P communication
model, where bots can communicate directly
with each other without relying on a
centralized C&C server. This makes it more
challenging to disrupt the botnet by taking
down a single server.
1. **Deceptive Communication**:
- The attacker creates a message that
appears to come from a trusted or legitimate
source, such as a bank, social media platform,
government agency, or well-known company.
2. **Appealing Content**:
- The phishing message often contains
content that is designed to grab the
recipient's attention and provoke a sense of
urgency or curiosity. This could include
warnings about security breaches, offers of
prizes or rewards, or claims of account issues.
6. **Information Capture**:
- On the fake website, the victim may be
asked to provide login credentials, credit card
numbers, social security numbers, or other
personal information. This information is then
captured by the attacker.
8. **Exit Strategy**:
- After capturing the desired information or
executing their malicious intent, the attacker
may choose to cover their tracks or maintain
access for future attacks.
1. **Vulnerability Discovery**:
- Hackers identify a target website or
application that is vulnerable to SQL injection.
They typically look for web forms or input
fields where user data is not properly
validated or sanitized before being
incorporated into SQL queries.
2. **Input Manipulation**:
- The attacker submits specially crafted input
data, such as SQL commands or payloads,
through vulnerable input fields. These inputs
are designed to manipulate the SQL queries
executed by the application.
4. **Unauthorized Access**:
- By injecting malicious SQL commands, the
attacker can exploit vulnerabilities in the
application's code to bypass authentication,
retrieve, modify, or delete data from the
database, or even gain control over the
underlying server.
5. **Data Extraction**:
- The attacker can use SQL injection to
extract sensitive data from the database, such
as usernames, passwords, credit card
numbers, or other confidential information.
7. **Maintaining Access**:
- Once the attacker has compromised the
system, they may attempt to maintain access
for future attacks, install malware, or pivot to
other parts of the network.
8. **Covering Tracks**:
- Sophisticated attackers may attempt to
cover their tracks by altering logs or hiding
their presence in the compromised system to
avoid detection.
1. **Wireshark**:
- Wireshark is a widely used network
protocol analyzer. It allows users to capture
and inspect network packets in real-time.
While it's a legitimate tool for network
troubleshooting, it can also be used
maliciously for packet capture and password
sniffing if the attacker has access to the
network.
3. **Tcpdump**:
- Tcpdump is a command-line packet
analyzer for Unix-like operating systems. It
allows users to capture network traffic and
save it for later analysis, making it a tool of
choice for some attackers.
4. **Ettercap**:
- Ettercap is a comprehensive suite for man-
in-the-middle (MITM) attacks, which include
password sniffing. It can intercept and analyze
network traffic, making it a powerful tool for
attackers.
5. **Cupid**:
- Cupid is a tool designed specifically for
capturing login credentials from web
applications by intercepting HTTP POST
requests. It focuses on web-based password
sniffing.
6. **dsniff**:
- dsniff is a collection of network analysis
tools that includes tools like dsniff and
urlsnarf, which are used for capturing
passwords and URLs, respectively.
1. **Identification**:
- In this initial phase, the need for a digital
forensic investigation is identified. This can
arise from various sources, such as reported
incidents, suspicious activities, legal
requirements, or proactive security measures.
2. **Preservation**:
- Once the need for an investigation is
established, the first priority is to preserve the
integrity of potential evidence. This involves
isolating and securing the affected systems or
devices to prevent any alteration, tampering,
or data loss.
3. **Collection**:
- Digital forensics professionals collect
relevant digital evidence from the preserved
systems and devices. This includes making a
bit-by-bit copy (forensic image) of the storage
media to ensure the original data remains
intact. Chain of custody documentation is
crucial to maintain the evidence's integrity.
4. **Examination**:
- During this phase, digital evidence is
examined in a controlled and secure
environment. Forensic tools and techniques
are used to analyze the data for signs of
cybercrimes, security breaches, or other
relevant information. Investigators may search
for files, metadata, logs, and artifacts.
5. **Analysis**:
- The analysis phase involves interpreting
the findings from the examination phase.
Investigators draw conclusions, identify
patterns, and establish timelines of events.
This phase aims to answer questions related
to the incident, such as how it occurred, who
was involved, and what data was affected.
6. **Documentation**:
- Detailed documentation of the
investigation process is essential. This includes
the procedures followed, tools used, findings,
analysis, and any actions taken during the
investigation. This documentation is critical
for transparency, reporting, and potential
legal proceedings.
7. **Presentation**:
- Digital forensics professionals often need
to present their findings in a clear and
understandable manner. Reports and
presentations are prepared for various
audiences, including management, legal
teams, or law enforcement. The evidence
must be presented in a way that is admissible
in court if required.
9. **Closure**:
- The investigation is formally closed, and
any actions or recommendations resulting
from the investigation are implemented. This
may involve improving security controls,
implementing safeguards, or pursuing legal
actions against perpetrators.
**Importance**:
**Packet Filtering**:
1. **Scope**:
- Packet filtering operates at the network
layer (Layer 3) of the OSI model. It makes
decisions based on the source and destination
IP addresses, port numbers, and protocol
types contained within individual packets.
2. **Decision Criteria**:
- Packet filtering decisions are based on
predefined rules or access control lists (ACLs)
that specify which packets are allowed or
blocked. These rules are typically simple and
are primarily based on IP addresses and port
numbers.
3. **Complexity**:
- Packet filtering is relatively simple and
lacks the advanced features of a firewall. It
can filter packets based on basic criteria but
does not understand the context of the entire
network session.
4. **Statelessness**:
- Packet filtering is stateless, meaning it does
not maintain information about the state or
state changes of network connections. Each
packet is evaluated independently.
5. **Use Cases**:
- Packet filtering is often used in basic
network security configurations and is
suitable for simple access control
requirements, such as permitting or blocking
specific ports or IP addresses.
**Firewall**:
1. **Scope**:
- A firewall operates at a higher OSI layer,
typically at the transport layer (Layer 4) or
application layer (Layer 7). It can perform
deep packet inspection and assess the context
of network sessions.
2. **Decision Criteria**:
- Firewalls have more advanced decision
criteria, including the ability to inspect the
content and behavior of traffic. They can filter
traffic based on application protocols and
perform more sophisticated access control.
3. **Complexity**:
- Firewalls are more complex than packet
filters and offer a wider range of features.
They can enforce security policies, perform
intrusion detection and prevention, and even
include advanced threat intelligence
capabilities.
4. **Stateful Inspection**:
- Most modern firewalls use stateful
inspection, allowing them to maintain
information about the state of network
connections. This enables them to make
context-aware decisions based on the entire
session.
5. **Use Cases**:
- Firewalls are used in diverse cybersecurity
scenarios, including securing corporate
networks, protecting against advanced
threats, application-level filtering, and
providing more granular control over network
traffic.
**Stateless Firewall**:
1. **Connection Awareness**:
- Stateless firewalls lack awareness of the
state or context of network connections. They
examine individual packets in isolation and do
not maintain information about the state of
active connections.
2. **Packet Filtering**:
- Stateless firewalls make access control
decisions based on basic criteria such as
source and destination IP addresses, port
numbers, and protocol types contained within
individual packets.
3. **Simplicity**:
- Stateless firewalls are relatively simple and
straightforward to configure. They are well-
suited for basic access control requirements.
4. **Limited Context**:
- These firewalls do not understand the
context of network sessions. Each packet is
evaluated independently, which means they
may allow or block packets without
considering the overall connection.
5. **Use Cases**:
- Stateless firewalls are commonly used in
scenarios where simple packet filtering and
access control are sufficient. They are often
deployed at the network perimeter to filter
traffic based on IP and port criteria.
**Stateful Firewall**:
1. **Connection Awareness**:
- Stateful firewalls are connection-aware.
They maintain a state table or session table
that tracks the state of active network
connections. This allows them to make
context-aware decisions based on the entire
session.
5. **Use Cases**:
- Stateful firewalls are suitable for more
complex network security scenarios, including
securing enterprise networks, protecting
against advanced threats, and providing
granular control over network traffic. They are
often deployed in scenarios where a higher
level of security and context-awareness is
required.
1. **Data Collection**:
- The IDS continuously collects and analyzes
data from various sources within a network or
system. These sources can include network
traffic, log files, system event records, and
more.
2. **Traffic Analysis**:
- For network-based IDS (NIDS), the system
analyzes network traffic in real-time. It
examines packet headers and payload data to
detect patterns, anomalies, or known attack
signatures.
3. **Behavioral Analysis**:
- In addition to signature-based detection,
IDS may employ behavioral analysis to
establish a baseline of normal network or
system behavior. Deviations from this baseline
can trigger alerts.
4. **Alert Generation**:
- When the IDS detects suspicious activity or
potential security threats, it generates alerts
or notifications. These alerts are typically
categorized by severity, helping administrators
prioritize their response.
5. **Alert Notification**:
- The IDS sends alerts to administrators or a
security operations center (SOC). These alerts
contain information about the detected
intrusion or anomaly, including details about
the affected system, IP addresses involved,
and the nature of the threat.
6. **Response**:
- After receiving alerts, administrators can
take action to mitigate the threat. This may
include isolating compromised systems,
blocking malicious IP addresses, or launching
an investigation.
1. **Sensors**:
- Sensors are responsible for collecting data
from network traffic or system logs. Network-
based IDS (NIDS) uses sensors placed at
strategic points on the network, while host-
based IDS (HIDS) resides on individual
systems.
2. **Analysis Engine**:
- The analysis engine is the core component
that processes collected data. It uses various
methods, including signature-based
detection, anomaly detection, and behavioral
analysis, to identify intrusions or suspicious
activities.
3. **Alerting Mechanism**:
- The alerting mechanism generates alerts
when suspicious activity is detected. These
alerts may include information about the type
of attack, source and destination IP addresses,
and other relevant details.
4. **Database**:
- The IDS may maintain a database of known
attack signatures, patterns, or behaviors. This
database is used for reference during the
analysis process.
5. **User Interface**:
- The user interface allows administrators to
configure and manage the IDS, view alerts,
and access reports. It provides a user-friendly
way to interact with the system.
3. **Hybrid IDS**:
- Hybrid IDS combines elements of both
NIDS and HIDS to provide comprehensive
security coverage. It offers the benefits of
network-wide monitoring and host-specific
insights.
1. **Traffic Inspection**:
- An IPS continuously monitors network
traffic, just like an IDS. It analyzes packets,
payloads, and patterns in real-time to identify
potential security threats or malicious
activities.
2. **Signature-Based Detection**:
- Similar to an IDS, an IPS uses signature-
based detection to compare observed traffic
patterns against a database of known attack
signatures. If it detects a match, it can take
action to block the malicious traffic.
3. **Behavioral Analysis**:
- Beyond signature-based detection, an IPS
employs behavioral analysis to establish a
baseline of normal network or system
behavior. It then looks for deviations from this
baseline, which may indicate an intrusion
attempt.
4. **Alert Generation**:
- When the IPS detects suspicious activity or
potential threats, it generates alerts, similar to
an IDS. However, the primary difference is
that an IPS can take automated action to
mitigate the threat.
1. **Real-Time Protection**:
- An IPS provides real-time protection by
inspecting network traffic as it occurs. It aims
to stop threats before they can compromise
the network or systems.
2. **Automated Response**:
- One of the defining features of an IPS is its
ability to automatically respond to detected
threats. It can take predefined actions based
on security policies, reducing the need for
manual intervention.
3. **Granular Control**:
- IPS solutions offer granular control over
what traffic is allowed or blocked.
Administrators can define specific rules and
policies to match their organization's security
requirements.
7. **Customization**:
- Organizations can customize IPS rules and
policies to align with their specific security
needs and compliance requirements.
2. **Create a Rule**:
- Let's say you want to allow incoming SSH
(Secure Shell) traffic on port 22. You can
create a rule with the following command:
```
sudo iptables -A INPUT -p tcp --dport 22 -j
ACCEPT
```
4. **Save Configuration**:
- To save the iptables configuration, use the
following command:
```
sudo service iptables save
```
2. **Create a Rule**:
- Let's say you want to allow incoming traffic
on port 80 for web server access. You can
create an inbound rule as follows:
- Click on "Inbound Rules" in the left pane.
- Click "New Rule..." in the right pane.
- Select "Port" as the rule type and click
"Next."
- Choose "TCP" and specify port "80." Click
"Next."
- Select "Allow the connection" and click
"Next."
- Choose when the rule applies (e.g., all
profiles) and give the rule a name (e.g., "Allow
HTTP"). Click "Finish."
4. **Save Configuration**:
- Windows Defender Firewall automatically
saves the configuration once you create or
modify rules.
**1. Function**:
**3. Focus**:
- **IDS**: The primary focus of IDS is on
monitoring and reporting. It provides insights
into network or system security incidents and
helps security teams investigate and respond
to threats.
**Relevance in Cybersecurity**: