2 Mark
2 Mark
Cyber security is the practice of protecting systems, networks, and programs from digital attacks,
theft, or damage. It ensures the confidentiality, integrity, and availability of data.
• Financial gain.
1. Define OWASP
OWASP (Open Web Application Security Project) is a non-profit organization focused on improving
the security of software. It provides freely available resources, tools, and guidelines for web
application security.
A security breach is an incident where unauthorized access to data, networks, or systems occurs,
often leading to theft, exposure, or corruption of sensitive information.
The Harvester is an open-source intelligence (OSINT) tool used to gather information such as email
addresses, domain names, IP addresses, and URLs from public sources like search engines and online
databases.
Nmap (Network Mapper) is the most commonly used tool for port scanning. It identifies open ports
and running services on a target system.
• TCP Connect Scan: Establishes a full TCP connection to test open ports.
• SYN Scan (Half-Open Scan): Sends SYN packets to detect open ports without completing the
handshake.
An Intrusion Detection System (IDS) is a security tool that monitors network or system activity to
identify and alert on suspicious activities or potential security breaches.
An example of an IDS is Snort, an open-source network-based IDS that detects and prevents
malicious network activities.
• Research Honeypots: Used for studying attack methods and understanding hacker behavior.
An Intrusion Prevention System (IPS) is a security tool that monitors network traffic to detect and
prevent malicious activities by actively blocking threats in real-time.
• Host-Based IPS (HIPS): Protects individual devices by analyzing system logs and application
behavior.
• IDS (Intrusion Detection System): Monitors and alerts on malicious activities but does not
take action to block them.
• IPS (Intrusion Prevention System): Actively blocks threats in addition to monitoring and
alerting.
5. Define Firewall.
A firewall is a network security device or software that filters and controls traffic based on security
policies, protecting networks and devices from unauthorized access or threats.