0% found this document useful (0 votes)
5 views

Cyber Security Assignment - 1

The document is an assignment on cybersecurity by Suraj Kumar Pandey, addressing various topics including the impact of DDoS attacks, comparisons between malware-based and social engineering attacks, phishing email analysis, and a flowchart for classifying cyberattacks. It emphasizes the importance of employee training in reducing cyberattack risks by promoting awareness and safe online practices. The assignment includes calculations, immediate countermeasures for phishing, and examples of different attack vectors.

Uploaded by

Suraj Pandey
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Cyber Security Assignment - 1

The document is an assignment on cybersecurity by Suraj Kumar Pandey, addressing various topics including the impact of DDoS attacks, comparisons between malware-based and social engineering attacks, phishing email analysis, and a flowchart for classifying cyberattacks. It emphasizes the importance of employee training in reducing cyberattack risks by promoting awareness and safe online practices. The assignment includes calculations, immediate countermeasures for phishing, and examples of different attack vectors.

Uploaded by

Suraj Pandey
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

CYBER SECURITY

ASSIGNMENT – 1

NAME – Suraj Kumar Pandey

ROLL NO. – R2142220901

SAP ID – 500107301

BATCH – 7 (AI ML)


QUESTIONS -

1. A company experiences a Distributed Denial of Service (DDoS)


attack that floods its server with 1,000,000 requests per second. If
the server can handle 100,000 requests per second, how many
seconds would it take for the server to crash?
2. Compare and contrast malware-based attacks and social
engineering attacks based on their method of execution and impact
on information systems.
3. A network administrator notices that 2% of 50,000 email accounts
in the system received phishing emails. Calculate how many
accounts were targeted and propose immediate countermeasures.
4. Design a flowchart to classify cyberattacks based on their attack
vectors (e.g., network-based, application-based, and user-based).
Include examples for each category.
A company adopts a cybersecurity policy that mandates periodic
employee training. Describe how this measure helps reduce the risk of
cyberattacks like social engineering

ANSWERS –

1. DDoS Attack Impact on Server:


The company’s server can handle 100,000 requests per second,
but during the DDoS attack, it is flooded with 1,000,000 requests
per second, which is 10 times its maximum capacity.
o Calculation:

Overload Factor = Incoming Requests / Server Capacity


=1,000,000 / 100,000=10
o Since the server is overwhelmed immediately, it would
likely crash within 1 second because it cannot process the
excess requests. In real-world scenarios, the crash time
would depend on how the server handles overloads, but
given the 10x capacity breach, the failure would be almost
instantaneous.
2. Comparison of Malware-based Attacks and Social
Engineering Attacks:
o Malware-based Attacks:
 Method of Execution: Involves malicious software
such as viruses, worms, ransomware, spyware, or
trojans. These are usually distributed through
infected attachments, malicious downloads, or
compromised websites. Once installed, malware can
steal data, corrupt files, monitor user activity, or
encrypt data for ransom.
 Impact: Directly affects systems by damaging files,
stealing sensitive information, or disrupting
operations. The spread can be rapid, affecting
multiple systems on the network.
 Example: Ransomware like WannaCry encrypts data
and demands a ransom for decryption keys.
o Social Engineering Attacks:
 Method of Execution: Manipulates human
psychology to trick users into revealing sensitive
information or performing actions that compromise
security. These attacks do not rely on software
vulnerabilities but instead exploit human trust and
curiosity.
 Impact: Targets individuals rather than systems,
potentially bypassing technical defenses. Successful
attacks can lead to credential theft, unauthorized
access, or financial loss.
 Example: Phishing emails posing as legitimate
entities to steal login credentials or financial
information.
3. Phishing Attack Analysis and Countermeasures:
o Calculation:

2% of 50,000 email accounts received phishing emails:

Number of Targeted Accounts=2/100×50,000=1,000


o Immediate Countermeasures:
 Alert and Educate Users: Notify all users about the
phishing attempt, advising them not to click on links
or download attachments from suspicious emails.
 Block and Quarantine: Block the sender’s domain
and quarantine the phishing emails to prevent further
spread.
 Security Scans and Monitoring: Conduct a security
scan to check for compromised accounts or systems.
Monitor affected accounts for any suspicious activity.
 Password Reset and Multi-Factor Authentication:
Encourage users to reset their passwords and enable
multi-factor authentication for enhanced security.
 Report and Collaborate: Report the phishing attack
to relevant authorities or cybersecurity organizations
to help mitigate wider impacts.
4. Flowchart for Classifying Cyberattacks:
o Network-based Attacks:
 Definition: Exploits network infrastructure and
protocols to disrupt services or gain unauthorized
access.
 Examples:
 DDoS (Distributed Denial of Service):
Overwhelms servers with traffic to make them
unavailable.
 Man-in-the-Middle (MitM): Intercepts
communication between two parties to steal
data or inject malicious content.
o Application-based Attacks:
 Definition: Target vulnerabilities in software
applications to execute malicious actions.
 Examples:
 SQL Injection: Manipulates database queries
to access or modify data.
 Cross-Site Scripting (XSS): Injects malicious
scripts into web applications to steal cookies or
session tokens.
o User-based Attacks:
 Definition: Exploit human behavior to gain
unauthorized access or steal information.
 Examples:
 Phishing: Deceptive emails designed to trick
users into revealing sensitive information.
 Pretexting: Creating a fabricated scenario to
manipulate individuals into divulging
confidential information.
5. Impact of Periodic Employee Training on Cybersecurity:
o Risk Reduction Through Awareness: Regular training
programs educate employees about common cyber threats
like phishing, social engineering, and malware, making
them more cautious and less likely to fall for scams.
o Recognizing Suspicious Activities: Employees learn to
identify red flags such as phishing emails, suspicious links,
or unusual requests for sensitive information.
o Promoting Safe Online Practices: Training reinforces
secure browsing habits, proper password management, and
the importance of multi-factor authentication.
o Incident Reporting and Response: Educated employees
are more likely to report potential security incidents
quickly, enabling faster response and damage containment.
o Building a Security Culture: Continuous education fosters
a culture of security awareness, where employees actively
contribute to protecting organizational assets.

You might also like