The document is an assignment on cybersecurity by Suraj Kumar Pandey, addressing various topics including the impact of DDoS attacks, comparisons between malware-based and social engineering attacks, phishing email analysis, and a flowchart for classifying cyberattacks. It emphasizes the importance of employee training in reducing cyberattack risks by promoting awareness and safe online practices. The assignment includes calculations, immediate countermeasures for phishing, and examples of different attack vectors.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
5 views
Cyber Security Assignment - 1
The document is an assignment on cybersecurity by Suraj Kumar Pandey, addressing various topics including the impact of DDoS attacks, comparisons between malware-based and social engineering attacks, phishing email analysis, and a flowchart for classifying cyberattacks. It emphasizes the importance of employee training in reducing cyberattack risks by promoting awareness and safe online practices. The assignment includes calculations, immediate countermeasures for phishing, and examples of different attack vectors.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5
CYBER SECURITY
ASSIGNMENT – 1
NAME – Suraj Kumar Pandey
ROLL NO. – R2142220901
SAP ID – 500107301
BATCH – 7 (AI ML)
QUESTIONS -
1. A company experiences a Distributed Denial of Service (DDoS)
attack that floods its server with 1,000,000 requests per second. If the server can handle 100,000 requests per second, how many seconds would it take for the server to crash? 2. Compare and contrast malware-based attacks and social engineering attacks based on their method of execution and impact on information systems. 3. A network administrator notices that 2% of 50,000 email accounts in the system received phishing emails. Calculate how many accounts were targeted and propose immediate countermeasures. 4. Design a flowchart to classify cyberattacks based on their attack vectors (e.g., network-based, application-based, and user-based). Include examples for each category. A company adopts a cybersecurity policy that mandates periodic employee training. Describe how this measure helps reduce the risk of cyberattacks like social engineering
ANSWERS –
1. DDoS Attack Impact on Server:
The company’s server can handle 100,000 requests per second, but during the DDoS attack, it is flooded with 1,000,000 requests per second, which is 10 times its maximum capacity. o Calculation:
Overload Factor = Incoming Requests / Server Capacity
=1,000,000 / 100,000=10 o Since the server is overwhelmed immediately, it would likely crash within 1 second because it cannot process the excess requests. In real-world scenarios, the crash time would depend on how the server handles overloads, but given the 10x capacity breach, the failure would be almost instantaneous. 2. Comparison of Malware-based Attacks and Social Engineering Attacks: o Malware-based Attacks: Method of Execution: Involves malicious software such as viruses, worms, ransomware, spyware, or trojans. These are usually distributed through infected attachments, malicious downloads, or compromised websites. Once installed, malware can steal data, corrupt files, monitor user activity, or encrypt data for ransom. Impact: Directly affects systems by damaging files, stealing sensitive information, or disrupting operations. The spread can be rapid, affecting multiple systems on the network. Example: Ransomware like WannaCry encrypts data and demands a ransom for decryption keys. o Social Engineering Attacks: Method of Execution: Manipulates human psychology to trick users into revealing sensitive information or performing actions that compromise security. These attacks do not rely on software vulnerabilities but instead exploit human trust and curiosity. Impact: Targets individuals rather than systems, potentially bypassing technical defenses. Successful attacks can lead to credential theft, unauthorized access, or financial loss. Example: Phishing emails posing as legitimate entities to steal login credentials or financial information. 3. Phishing Attack Analysis and Countermeasures: o Calculation:
2% of 50,000 email accounts received phishing emails:
Number of Targeted Accounts=2/100×50,000=1,000
o Immediate Countermeasures: Alert and Educate Users: Notify all users about the phishing attempt, advising them not to click on links or download attachments from suspicious emails. Block and Quarantine: Block the sender’s domain and quarantine the phishing emails to prevent further spread. Security Scans and Monitoring: Conduct a security scan to check for compromised accounts or systems. Monitor affected accounts for any suspicious activity. Password Reset and Multi-Factor Authentication: Encourage users to reset their passwords and enable multi-factor authentication for enhanced security. Report and Collaborate: Report the phishing attack to relevant authorities or cybersecurity organizations to help mitigate wider impacts. 4. Flowchart for Classifying Cyberattacks: o Network-based Attacks: Definition: Exploits network infrastructure and protocols to disrupt services or gain unauthorized access. Examples: DDoS (Distributed Denial of Service): Overwhelms servers with traffic to make them unavailable. Man-in-the-Middle (MitM): Intercepts communication between two parties to steal data or inject malicious content. o Application-based Attacks: Definition: Target vulnerabilities in software applications to execute malicious actions. Examples: SQL Injection: Manipulates database queries to access or modify data. Cross-Site Scripting (XSS): Injects malicious scripts into web applications to steal cookies or session tokens. o User-based Attacks: Definition: Exploit human behavior to gain unauthorized access or steal information. Examples: Phishing: Deceptive emails designed to trick users into revealing sensitive information. Pretexting: Creating a fabricated scenario to manipulate individuals into divulging confidential information. 5. Impact of Periodic Employee Training on Cybersecurity: o Risk Reduction Through Awareness: Regular training programs educate employees about common cyber threats like phishing, social engineering, and malware, making them more cautious and less likely to fall for scams. o Recognizing Suspicious Activities: Employees learn to identify red flags such as phishing emails, suspicious links, or unusual requests for sensitive information. o Promoting Safe Online Practices: Training reinforces secure browsing habits, proper password management, and the importance of multi-factor authentication. o Incident Reporting and Response: Educated employees are more likely to report potential security incidents quickly, enabling faster response and damage containment. o Building a Security Culture: Continuous education fosters a culture of security awareness, where employees actively contribute to protecting organizational assets.