Cyber Interview
Cyber Interview
Concept Description
Purpose Prevents unauthorized access to sensitive data
Example Encrypting customer financial records in banks
Implementation 🔹 Access Control Lists (ACLs) 🔹 Multi-Factor Authentication (MFA) 🔹
Data Encryption (AES, RSA) 🔹 Role-Based Access Control (RBAC)
📌 Real-World Example:
Online banking requires passwords and OTPs to ensure only account holders access their
financial information.
Concept Description
Purpose Ensures data is not tampered with
Concept Description
Example Blockchain technology in banking prevents unauthorized transactions
Implementation 🔹 Hash Functions (SHA-256) 🔹 Digital Signatures 🔹 Checksums 🔹
Version Control Systems (Git)
📌 Real-World Example:
Banking transactions use hashing algorithms to verify the authenticity of digital
payments.
Concept Description
Purpose Prevents denial of service
Example Online banking portals should be accessible 24/7
Implementation 🔹 Load Balancing 🔹 Redundant Systems 🔹 Cloud Backup 🔹 DDoS
Protection
📌 Real-World Example:
Banks deploy failover systems to ensure ATMs work even if the main server crashes.
Concept Description
Purpose Confirms user identity before granting access
Example Logging into a website using a password and OTP
Implementation 🔹 Passwords 🔹 Biometrics (Fingerprint, Face ID) 🔹 Two-Factor
Authentication (2FA) 🔹 Smart Cards
📌 Real-World Example:
Banks use biometric authentication in mobile banking apps for secure logins.
Concept Description
Purpose Ensures accountability for digital actions
Example Digital signatures on contracts prevent signers from denying their
approval
Implementation 🔹 Digital Signatures 🔹 Audit Logs 🔹 Blockchain Ledger
📌 Real-World Example:
A customer signs a loan agreement digitally, ensuring they cannot later deny agreeing to
the terms.
Question 2️⃣
Which technique prevents an attacker from denying their involvement in a cyber attack?
(a) Encryption
(b) Non-repudiation
(c) Authentication
(d) Availability
(e) Phishing
Question 3️⃣
What is the best security measure to prevent SQL Injection attacks?
(a) Using firewalls
(b) Encrypting passwords
(c) Input validation and parameterized queries
(d) Using strong passwords
(e) None of the above
Question 4️⃣
Which cyber security principle ensures that information is available to authorized users at all
times?
(a) Authentication
(b) Availability
(c) Integrity
(d) Confidentiality
(e) Hashing
Question 5️⃣
A bank’s website requires customers to enter their password and OTP before accessing their
account. Which security measure is being implemented?
(a) Data Integrity
(b) Multi-Factor Authentication
(c) Firewall Protection
(d) Non-Repudiation
(e) Digital Signature
📌 6. Conclusion
Cyber security is crucial in today’s digital world to protect financial transactions, personal
data, and business operations. Understanding core concepts like confidentiality, integrity,
availability, authentication, and non-repudiation helps organizations build robust security
frameworks.
📌 Real-World Example:
WannaCry Ransomware (2017): A worm-based attack that affected 200,000+ systems
worldwide, encrypting data and demanding ransom payments in Bitcoin.
📌 Real-World Example:
Google & Facebook Scam ($100M): Attackers impersonated a vendor via email and
tricked both companies into wiring $100 million in fraudulent transactions.
🚫 2.3 Denial-of-Service (DoS) & Distributed Denial-of-
Service (DDoS) Attacks
DoS and DDoS attacks overload a system with excessive traffic, causing service disruptions.
📌 Real-World Example:
GitHub DDoS Attack (2018): The largest DDoS attack (1.35 Tbps) that temporarily shut
down GitHub.
📌 Real-World Example:
Colonial Pipeline Attack (2021): A ransomware attack that shut down fuel supply in the
US, leading to fuel shortages and price hikes.
📌 Real-World Example:
Evil Twin Attack: A fake Wi-Fi network tricks users into connecting, exposing their login
details.(asked in IBPS SO 2024)
📌 Real-World Example:
Yahoo Data Breach (2012): Attackers used SQL injection to steal 450,000 email
passwords.
📌 Real-World Example:
Stuxnet (2010): A zero-day attack on Iranian nuclear plants that damaged centrifuges by
exploiting Windows vulnerabilities.
🔹 Why Cryptography?
🔹 Types of Encryption
Encryption Description Key Used Example Use Case
Type Algorithms
Symmetric Uses a single key for Shared AES, DES, VPN, Wi-Fi
Encryption 🔐 both encryption and Key Blowfish Security (WPA2)
decryption
Asymmetric Uses two keys: a Public & RSA, ECC, Digital
Encryption 🔑 public key for Private Diffie-Hellman Signatures,
encryption and a Key Pair HTTPS,
private key for SSL/TLS
decryption
Encryption Description Key Used Example Use Case
Type Algorithms
Hashing 📝 Converts data into a No Key SHA-256, Password
fixed-length hash that Used MD5, Bcrypt Storage, Data
cannot be reversed Integrity
Feature Description
Key Length 128-bit, 192-bit, 256-bit
Speed Faster than asymmetric encryption
Security Secure, but key sharing is a risk
Example AES-256 (Used in SSL, VPNs, banking transactions)
📌 Real-World Usage:
Wi-Fi Security (WPA2, WPA3)
Banking Transactions (SWIFT, ATM Security)
Data Encryption in Cloud Storage (Google Drive, OneDrive, Dropbox)
Feature Description
Key Length 1024-bit, 2048-bit, 4096-bit
Speed Slower than symmetric encryption
Security More secure but computationally expensive
Example RSA-2048 (Used in HTTPS, Digital Signatures)
📌 Real-World Usage:
SSL/TLS (Secure Web Browsing - HTTPS)
Digital Signatures (Used in Aadhaar, e-Governance)
End-to-End Encryption (WhatsApp, Signal, ProtonMail)
Feature Description
Key Used None (One-way function)
Speed Faster than encryption
Security Cannot be reversed (Irreversible)
Example SHA-256, MD5, Argon2 (Used in password hashing)
📌 Real-World Usage:
Storing passwords securely (bcrypt, Argon2)
Verifying file integrity (Checksum validation, Digital signatures)
Blockchain (Bitcoin, Ethereum hashing)
🔹 Weakness: Weak hashing algorithms like MD5 and SHA-1 are vulnerable to collision
attacks.
📌 Real-World Example:
MD5 Collision Attack (2012): Attackers created two different PDF documents with the
same MD5 hash, proving its weakness.
📌 Conclusion
Cryptography plays a vital role in securing digital communication, banking transactions, and
data privacy. Symmetric encryption is fast but needs secure key sharing, while asymmetric
encryption provides stronger security but is slower. Hashing ensures data integrity without
encryption.
🌐 5. Network Security
Network security involves protecting data, systems, and infrastructure from cyber threats
while it travels across communication channels. It prevents unauthorized access, cyber-
attacks, data breaches, and network disruptions.
🔹 Types of Firewalls
📌 Real-World Example:
Banks and financial institutions use NGFWs to prevent fraud and secure online
transactions.
📌 Real-World Example:
E-commerce sites use IPS to block SQL Injection and IDS to detect brute-force login
attempts.
🔹 Weakness: IDS cannot stop attacks in real-time without an IPS.
🔹 Types of VPNs
📌 Real-World Example:
Corporate employees working remotely use VPNs to securely access office networks.
🔹 Weakness: If VPN credentials are stolen, hackers can access the network remotely.
📌 Real-World Example:
Hospitals segment patient medical records from guest Wi-Fi networks to prevent
cyberattacks.
📌 Conclusion
Network security is critical for safeguarding digital infrastructure from cyber threats. Firewalls,
IDS/IPS, VPNs, and network segmentation work together to prevent unauthorized access,
detect attacks, and secure communication.
📲 6. Application Security
Application security focuses on protecting software and applications from vulnerabilities that
can be exploited by cyber attackers. It ensures the confidentiality, integrity, and
availability of applications.
8. Cloud Security ☁️
Cloud security focuses on protecting data, applications, and services hosted in cloud
environments. It ensures data privacy, compliance, and protection from cyber threats.
📌 Real-World Example: Capital One Data Breach (2019) – A cloud misconfiguration in AWS
led to the theft of 100 million customer records. Proper IAM and security audits could have
prevented it.
9. IoT Security 📡
IoT (Internet of Things) security protects connected smart devices, including home
automation, industrial sensors, medical devices, and wearable gadgets.
📌 Real-World Example: Mirai Botnet Attack (2016) – Compromised IoT devices launched a
massive DDoS attack, shutting down major services like Twitter and Netflix. Changing default
passwords could have mitigated the attack.
📌 Real-World Example: Google fined $57 million under GDPR for failing to provide
transparent data policies.
📌 Real-World Example: Twitter CEO Jack Dorsey's account hacked (2019) due to SIM
swapping. Using MFA and secure authentication could have prevented it.
📌 Real-World Example:
Google & IBM developing Quantum-Safe Encryption to future-proof online security.
Microsoft implementing Zero Trust Architecture to protect enterprise networks.
📌 Conclusion
Cyber security is constantly evolving, and securing operating systems, cloud
environments, IoT devices, and applications is essential. Emerging threats like AI-
powered cyber attacks, ransomware evolution, and IoT vulnerabilities require stronger
encryption, advanced threat detection, and legal enforcement.
🔹 Key Takeaways:
✅ Use multi-layered security approaches (firewalls, IAM, encryption)
✅ Stay updated with cyber laws and compliance (GDPR, IT Act)
✅ Follow security best practices (patch updates, strong passwords)
✅ Adopt AI-driven and quantum-resistant security measures
✅ Answer: (b) Combines multiple security features like IDS, antivirus, and deep packet
inspection
📌 Explanation: NGFWs offer advanced security by integrating firewalls, intrusion
detection systems (IDS), malware protection, and traffic analysis.