Iis CT1
Iis CT1
3.Explain criteria for information classification. 4. Describe RBAC and ABAC with diagram.
i. Value i.RBAC:
This is the most common factor for classifying Role-based access control (RBAC) uses roles
data, especially in private organizations. and user groups to categorize access controls.
If data is critical to business operations, financial With RBAC, system administrators assign roles
stability, or competitive advantage, it must be to subjects and configure access permissions to
classified and secured. apply at the role level.
Higher-value information requires stricter security Based on a subject’s role, permission to access
controls to prevent unauthorized access, leaks, or a resource will automatically be granted or
cyber threats. denied.
ii. Age In a static environment that doesn’t have
The sensitivity of information may decrease over frequent shift changes, RBAC can create an
time, allowing reclassification to a lower security effective access management policy.
level. Example Security analyst: Can configure a
firewall, but can't view customer data
Sales representative: Can view customer accounts, but can't Even if piggybacking isn’t attempted with malicious
change firewall settings. intent, it’s still illegal because the user is taking undue
advantage of a service they haven’t paid for.
Piggybacking Types:
1. Password Sharing
2. Physical Access
3. Remote Access
4. Wi-Fi Piggybacking
5. Social Engineering
Prevention:
Use access control systems like biometric
authentication, keycards, or PIN-based entry.
Implement automatic session logout after inactivity.
ii.ABAC: Enable two-factor authentication (2FA) for added
This sets and enforces policies based on characteristics, such security.
as department, location, manager, and time of day. Use encrypted connections to prevent unauthorized
Using Boolean logic, ABAC creates access rules with if-then data access.
statements that define the user, request, resource, and action.
For example, if the requester is a salesperson, they are ii.Shoulder Surfing:
granted read-write access to the customer relationship During a shoulder surfing attack, an attacker physically
management (CRM) solution, as opposed to an administrator views someone’s entry of sensitive information, be it
who is only granted view privileges to create a report. passwords, personal identification numbers, or any
other such data, over the target’s shoulder.
Most often, this attack takes place in public or semi-
public environments where an attacker can have a
glimpse of what is on screen or being typed at the
keyboard without raising much suspicion.
Privacy screens, which only allow a small angle of view
to their displays, can also be used by users to defend
against shoulder surfing.
Besides, they need to be aware of the surroundings
while inputting sensitive data and place themselves in
such a way as to block the possible viewers.
On-screen keyboards would also introduce some extra
difficulty for people attempting to capture keystrokes,
5.Describe piggy backing and shoulder surfing. hence offering extra protection from this kind of
i.Piggybacking: attack.
Piggybacking is the process of using a wireless connection to Prevention:
access an internet connection without authorization. Looking for an area of space free where your back
Its objective is to gain free network access which is often is against a wall.
exploited to attempt malicious activities like data breaching Never give or share your password or any vital
and dissemination of malware. It can also lead to slower information to anyone.
internet speed for all the systems connected to the network. Never share such open personal accounts in
public local places.
Locating a quiet spot away from the crowd. Replace each letter in the plaintext message with
the letter that is three positions to the right in the
6.Explain working of fingerprint mechanism and its limitations. alphabet.
Fingerprint biometrics is a commonly used form of biometric H becomes K (shift 3 from H)
security that is easy to use, hard to fool, and often a cost- E becomes H (shift 3 from E)
effective strategy, relying on something a person has. L becomes O (shift 3 from L)
Fingerprints cannot be forgotten or lost like a password or ID L becomes O (shift 3 from L)
card, and no two people share fingerprints, guaranteeing that O becomes R (shift 3 from O)
they are unique to each individual.
Fingerprint biometrics use a scanner that can be small and The encrypted message is now “KHOOR”.
freestanding or contained within a device directly, such as a
smartphone, security system, or computer. Fingerprint 8. Describe encryption and decryption with diagram.
scanners take a digital rendering of the fingerprint and convert i. Encryption:
it to a digital algorithm for storage. Encryption is a form of data security in which
In this way, fingerprint data is safe from reverse engineering. information is converted to ciphertext. Only
Even if a bad actor obtains the fingerprint data through a authorized people who have the key can decipher
breach or theft, it cannot be turned back into the fingerprint the code and access the original plaintext
image and used. information.
A security feature that is convenient, easy to use, and user- It uses encryption algorithms and a secret key to
friendly, fingerprint biometrics is used across a wide range of scramble data into an unreadable format.
applications to both verify and authenticate identities. Encryption is used in secure communication, online
Fingerprint biometrics continue to advance with evolving transactions, and data storage.
technology. More companies and industries are adopting this ii.Decryption:
form of biometric authentication. When coupled with other Decryption is the process of converting an
security protocols, such as strong passwords or tokens, encrypted message back to its original (readable)
fingerprint biometrics are even more secure. format. The original message is called the plaintext
Limitations: message
False acceptance and rejection can occur, leading to It allows authorized users to access the original data
security and usability issues. securely.
Dirt, moisture, or sensor damage can affect fingerprint Decryption ensures that only intended recipients
scanning accuracy. can read the encrypted message.
Skin conditions like cuts, burns, or worn-out fingerprints
may cause recognition failures.
Spoofing attacks using fake fingerprints can bypass weak
biometric systems.
Fingerprint data, once compromised, cannot be
changed like passwords, posing privacy risks.
7. Convert the given plain text, encrypt it with the help of Caesar
cipher technique. “Information Security”.
Choose a shift value. In this case, we will use a shift of 3.
9. Explain Man in the middle Attack with example.
A man-in-the-middle (MITM) attack is a cyberattack in
which a hacker steals sensitive information by
eavesdropping on communications between two online Account login credentials
targets such as a user and a web application.If an Business secrets
attacker puts himself between a client and a webpage, a Marketing secrets
Man-in-the-Middle (MITM) attack occurs. This form of Information of the employee base
assault comes in many different ways. Information about the
Phishing attacks are one common means of entry for software/tools/technologies that is being
MITM attackers. By clicking on a malicious link in an used at the company
email, a user can unknowingly launch a man-in-the
browser attack. Preventive Measures:
MITM attacker might also eavesdrop on private Destroy any CDs/DVDs containing
communications between two people. In this scenario, personal data.
the attacker diverts and relays messages between the In case you no longer need your PC,
two people, sometimes altering or replacing messages to make sure you have deleted all the data
control the conversation. so that it can’t be recovered.
Use of firewalls can prevent suspicious
For example, In order to intercept financial login
Internet users from accessing the
credentials, a fraudulent banking website can be used.
discarded data.
Between the user and the real bank webpage, the fake Paper documents should be
site lies "in the middle." permanently destroyed/shredded.
Companies should lock waste bins and