Cyber Security
Cyber Security
Question Bank
Unit -1 Introduction to Cyber Security and cybercrime:
1. What is cybercrime? How are cybercrimes classified?
Explain with example.
✅ What is Cybercrime?
Cybercrime means any illegal activity done using computers, the
internet, or other digital devices. These crimes are carried out to
harm someone, steal data or money, or disrupt systems.
✅ 2. Cyberbullying
What it is: Using the internet or mobile devices to threaten,
insult, or embarrass someone.
Example: Sending mean messages, spreading fake rumors, or
sharing private photos without permission.
✅ 3. Identity Theft
What it is: Someone pretends to be you online using your
personal information.
Goal: To do fraud, open fake bank accounts, or misuse your
social media.
Example: A hacker uses your Aadhaar number or photo to
apply for a loan.
✅ 6. Cyberstalking
What it is: Repeatedly following or contacting someone online
in a scary or annoying way.
Example: Someone keeps messaging you, tracking your activity,
or sending threats.
✅ 7. Image/Video Misuse
What it is: Downloading or editing someone's photos or videos
to use them wrongly.
Example: Morphing a photo and posting it online to defame the
person.
🔐 Information Security:
Information security means protecting data and information
from being accessed, used, or changed by unauthorized
people. It helps keep your personal, financial, and private
details safe from cybercriminals.
It is important for both individuals and organizations to keep
their systems, software, and data secure.
🔹 Ways to maintain information security:
Using strong and unique passwords
Keeping software and antivirus updated
Not sharing OTPs or personal details with unknown
people
Being careful with emails, links, and downloads
2. Cyberbullying
Cyberbullying is when someone uses the internet to
insult, threaten, or embarrass another person.
Common on social media platforms like Facebook,
Instagram, WhatsApp, etc.
Example: Sending mean messages or sharing private
photos without permission.
3. Identity Theft
This happens when someone steals another person’s
personal data like Aadhaar number, PAN card, or mobile
number and uses it to commit fraud.
Example: A hacker opens a fake bank account using your
identity.
4. Hacking Social Media or Email Accounts
Hackers gain unauthorized access to someone’s
personal accounts to steal data or misuse it.
Example: Hacking an Instagram account and asking
followers for money using fake messages.
5. Cyberstalking
This involves repeatedly sending messages, following
someone online, or trying to control them using threats
or emotional pressure.
Victims often feel scared, stressed, or unsafe.
2. Ransomware Attacks
In this crime, a hacker locks all the organization’s files or
systems and asks for money (ransom) to unlock them.
Example: A software company’s data is encrypted, and
the hacker demands money to restore it.
4. Website Defacement
A company or government website is hacked and its
homepage is changed with unwanted or fake messages.
Example: A government website is defaced by hackers
with anti-national slogans.
e. Salami attack.
Meaning:
A Salami Attack is a type of cybercrime where the criminal
makes many small attacks that go unnoticed but together
cause big damage. The word “salami” refers to cutting thin
slices — just like the criminal takes small amounts of money
or data from many places without being detected.
This type of attack is often used in financial systems, like
banks or payroll systems.
🔹 How It Works:
The attacker makes tiny changes to many transactions so
that no one notices. But over time, the attacker collects a
large amount of money or data. Each change is so small that
it appears normal and doesn’t raise any alarm.
🔸 Example:
A programmer working in a bank alters the code so that 1
paisa is deducted from every customer’s bank transaction
and transferred to a secret account. One paisa is a small
amount, so customers don’t notice. But if the bank has
millions of customers, the attacker can steal a huge sum
without being caught quickly.
2. Privacy Concerns:
Third-party access: Cloud service providers and government
agencies might access users' private data stored in the cloud.
Data control: Users may have limited control over how their
data is managed, stored, or shared by the cloud provider.
7. Vendor Lock-in:
Difficult to switch providers: Once an organization commits to
a cloud service provider, it may be difficult to migrate its data or
services to another provider due to compatibility issues, high
migration costs, or technical challenges.
Dependence on a single vendor: If the cloud provider fails or
changes its service terms, it could affect the organization’s
operations.
b. Botnets
A botnet is a network of infected computers or devices, often called
zombies, that are remotely controlled by a cybercriminal. These
devices are compromised with malware, which allows the attacker to
control them without the owner’s knowledge. Once infected, these
devices can be used to perform malicious activities on a large scale.
How Botnets Work:
1. Infection: Cybercriminals spread malware through infected
email attachments, malicious links, or vulnerable software,
infecting devices like computers, smartphones, and even
Internet of Things (IoT) devices.
2. Control: Once a device is infected, the attacker can control it
remotely without the device owner knowing. The attacker can
use a command and control (C&C) server to send instructions
to the infected devices.
3. Execution of Attacks: The botnet can then be used to carry out
attacks like Distributed Denial of Service (DDoS), spamming,
data theft, or cryptocurrency mining.
Common Uses of Botnets:
1. DDoS Attacks: The botnet sends a massive amount of traffic to
overwhelm a website or server, causing it to crash and become
unavailable.
o Example: A botnet targeting an e-commerce website
during a sale season, causing the site to crash.
2. Spamming: Botnets can send out huge volumes of spam emails,
often for malicious purposes like spreading viruses or phishing.
3. Data Theft: Botnets can steal sensitive information, such as
passwords, credit card numbers, or personal data, and send it
back to the attacker.
4. Cryptocurrency Mining: Cybercriminals use botnets to silently
mine cryptocurrencies, such as Bitcoin, using the computational
power of infected devices.
Botnet Examples:
Mirai Botnet: One of the most famous botnets, Mirai, infected
IoT devices like cameras and routers and was used for a large-
scale DDoS attack on major websites.
Emotet: Originally a banking Trojan, it evolved into a botnet
used for spreading malware and stealing sensitive data.
Prevention and Protection:
Regular Software Updates: Keeping devices and software
updated to fix vulnerabilities.
Antivirus Software: Using antivirus software to detect and
remove botnet malware.
Firewalls: Employing firewalls to block unauthorized traffic and
control incoming data.
Network Monitoring: Continuously monitoring network traffic
for unusual activities that might indicate botnet control.
c. Attack Vector
An attack vector is the way or method a hacker uses to get into a
computer system or network to carry out harmful actions like
stealing information, damaging files, or causing problems for the
system. It's like a "pathway" the attacker takes to break into a system.
Common Types of Attack Vectors:
1. Phishing: Hackers trick people by sending fake emails or
messages that look like they are from trusted sources. They
often ask people to click on harmful links or provide personal
information.
o Example: An email that seems to come from your bank
asking you to click a link and enter your password, which
actually steals it.
2. Malware: Malicious software that infects a computer. Hackers
often use malware to damage systems or steal data.
o Example: A virus or ransomware that gets onto your
computer when you download something from a
suspicious website.
3. Software Vulnerabilities: Hackers take advantage of
weaknesses or flaws in software to break into systems.
o Example: A hacker might use a security hole in an old
version of a program to access your computer.
4. Social Engineering: This is when hackers trick people into giving
away personal information or access to systems by using
manipulation or lies.
o Example: A hacker pretending to be an IT worker and
asking an employee for their password.
5. Unsecured Networks: Hackers can also target networks that
don’t have good security, like public Wi-Fi, to steal information.
o Example: Connecting to an open Wi-Fi network and
capturing your data like passwords or credit card
numbers.
6. Physical Access: Hackers can also get physical access to a device
or system, such as a computer, to steal data or install malware.
o Example: A hacker sneaking into an office and plugging a
USB stick into a computer to steal information.
Why It’s Important to Secure Attack Vectors:
To protect yourself or your organization, it’s important to:
Keep software updated to fix security holes.
Use firewalls to monitor and block harmful traffic.
Use stronger security measures like two-factor authentication.
Train people to recognize phishing and other tricks used by
hackers.
d. Cyberstalking
Cyberstalking
Cyberstalking is when someone uses the internet or electronic
devices to harass, threaten, or annoy another person repeatedly. This
could include sending nasty messages, spreading lies, or even
tracking someone’s online activity to make them feel scared or upset.
How Cyberstalking Happens:
1. Threatening Messages: The stalker sends hurtful or threatening
emails or messages on social media.
o Example: Sending repeated, scary emails or messages to
someone.
2. Monitoring: The stalker watches the victim’s online activities,
like checking their social media posts or tracking where they go.
o Example: Constantly checking where the victim is or what
they’re doing online.
3. Impersonating: The stalker might create fake online profiles
pretending to be the victim and post false or harmful things.
o Example: Making a fake social media account pretending
to be the victim and posting lies.
4. Invasion of Privacy: Sometimes, stalkers share private photos or
personal details online without permission.
o Example: Posting private pictures of someone without
their consent.
Effects of Cyberstalking:
Emotional Harm: The victim may feel anxious, fearful, or
depressed because of the constant harassment.
Privacy Loss: The victim’s personal life and information may be
exposed without their consent.
Fear: In serious cases, the stalker may threaten harm in real life.
Legal Aspects:
Cyberstalking is illegal in many places, and stalkers can face serious
consequences, including arrest and charges for harassment or
threats.
How to Protect Yourself:
Privacy Settings: Keep your online profiles private so only
trusted people can see your information.
Report: If you’re being stalked online, report the behavior to
authorities or the platform.
Block: Block the person who is stalking you from contacting you
or viewing your profiles.
Legal Help: In extreme cases, get legal help to stop the stalker.
Cyberstalking can be harmful and is illegal. It’s important to stay safe
online by protecting your personal information and knowing how to
respond to online harassment.
1. Passive Attack:
A passive attack occurs when an attacker tries to monitor or
eavesdrop on the communication or data exchange between two
systems without altering or disrupting the data. The attacker doesn't
try to modify anything; they are only interested in observing and
collecting information.
Characteristics of Passive Attacks:
The attacker does not alter the data; they only observe it.
It is difficult to detect because there is no immediate disruption
in the system.
The primary goal is to gather information like passwords,
confidential data, or user activity.
Types of Passive Attacks:
1. Eavesdropping (Sniffing): The attacker listens to or intercepts
communication between two systems.
o Example: A hacker intercepts an email or phone call to
steal sensitive information.
2. Traffic Analysis: The attacker examines traffic patterns, like the
size or timing of data packets, to gain insight into the data being
transmitted.
o Example: An attacker might analyze network traffic to
guess what kind of information is being transferred, even
if they can’t see the actual data.
Consequences of Passive Attacks:
Unauthorized access to sensitive or private information (such as
passwords or personal details).
Loss of confidentiality.
2. Active Attack:
An active attack involves an attacker trying to alter, disrupt, or
damage the system or data. Unlike passive attacks, the goal of active
attacks is to modify or destroy information in the system or to
disrupt normal system operations. Active attacks are more noticeable
and can often be detected because they lead to changes or
interruptions.
Characteristics of Active Attacks:
The attacker modifies or disrupts the data.
There is usually a noticeable effect or change in the system’s
behavior.
The attacker’s goal is to damage, manipulate, or completely
compromise the target system.
Types of Active Attacks:
1. Masquerading (Impersonation): The attacker pretends to be
someone else to gain unauthorized access.
o Example: A hacker pretending to be an authorized user to
steal data.
2. Modification of Data: The attacker changes the data being
transmitted or stored.
o Example: A hacker intercepts a message and alters its
contents before sending it to the recipient.
3. Denial of Service (DoS) Attack: The attacker tries to make a
service or network resource unavailable to users by
overwhelming it with traffic.
o Example: A website is flooded with so much traffic that it
crashes, making it inaccessible to legitimate users.
4. Replay Attack: The attacker intercepts and then retransmits
valid data to cause the system to execute unwanted actions.
o Example: A hacker intercepts a valid payment request and
sends it again, causing a second payment to occur.
Consequences of Active Attacks:
Disruption of services (e.g., system crashes or slowdowns).
Data corruption or theft.
Financial losses, legal issues, or reputational damage.
Summary of Differences:
Feature Passive Attack Active Attack
Goal To monitor or To modify, disrupt, or
eavesdrop on data. destroy data or systems.
Impact on No changes made to Data is modified or
Data data. disrupted.
Detection Difficult to detect. Easy to detect due to
disruptions.
Example Eavesdropping on a A hacker altering the
conversation. contents of a message.
Intent To gather sensitive To cause harm or disruption
information. to systems or data.
1. Phishing Attacks
Phishing is when attackers send fake emails or messages that look
like they come from trusted sources, tricking people into revealing
sensitive information like passwords or credit card numbers.
Impact: Stolen login credentials or personal data.
Example: An email pretending to be from the bank asking you
to update your password.
2. Malware
Malware is malicious software like viruses, ransomware, or spyware
that can damage systems or steal information.
Impact: Data loss, system damage, or theft of sensitive data.
Example: Ransomware that locks your files and demands
money to unlock them.
3. SQL Injection
This attack happens when cybercriminals insert harmful SQL
commands into a website’s input fields, allowing them to access or
manipulate the website’s database.
Impact: Unauthorized access to sensitive data.
Example: A hacker enters harmful code in a website’s login
form to steal user data.
6. Insider Threats
These threats come from within the organization. Employees or
trusted individuals may intentionally or accidentally compromise
security.
Impact: Loss of sensitive data or unauthorized access.
Example: An employee stealing company secrets or accidentally
sending confidential data to the wrong person.
2. Ransomware Attacks
Ransomware is a type of malware that encrypts an organization's
files or locks them out of their systems until they pay a ransom.
Impact: Business operations come to a halt, and the company
must decide whether to pay the ransom or deal with data loss.
Example: A hospital’s computer systems are infected with
ransomware, preventing staff from accessing patient records
until a ransom is paid.
5. Insider Threats
Insider threats occur when employees or contractors intentionally or
unintentionally misuse their access to an organization’s systems and
data, often leading to data theft or system damage.
Impact: Insider threats can cause significant damage by leaking
sensitive information, disrupting operations, or enabling
external attacks.
Example: A disgruntled employee intentionally deletes critical
data or leaks confidential company documents to competitors.
3. Use Encryption
Encrypting sensitive data ensures that even if cybercriminals gain
access to it, they won’t be able to read or use it.
Action: Encrypt data both in transit (while being sent over the
internet) and at rest (when stored on servers).
Example: Use SSL/TLS for website encryption and encrypt
databases that store sensitive user information.
4. Operational Disruption
Cybercrime, especially Denial of Service (DoS) attacks or
ransomware, can bring operations to a halt, causing significant
downtime.
Impact: Lost productivity, halted services, or production delays.
Example: A ransomware attack locking up critical data may
require a company to shut down its operations for days,
resulting in lost revenue and productivity.
5. Cost of Recovery
After a cyberattack, organizations often need to invest in recovery
efforts, which can be expensive.
Impact: Expenses for IT staff, cybersecurity experts, and third-
party vendors to restore systems, recover data, and implement
new security measures.
Example: A company may need to spend large amounts to hire
cybersecurity consultants, buy new security software, and
rebuild compromised infrastructure.
2. Security Risks
Pirated software is often tampered with or modified to bypass
security measures, which makes it more vulnerable to malware,
viruses, and other security threats.
Impact: Using pirated software exposes an organization’s
systems to increased security vulnerabilities and cyberattacks.
Example: A company may unknowingly install malware through
pirated software, leading to data breaches, system infections, or
a ransomware attack.
4. Reputation Damage
Using pirated software can seriously damage an organization’s
reputation, especially if customers or partners become aware of it.
Impact: Clients and stakeholders may lose trust in the
organization, viewing it as unethical or unprofessional, which
could impact relationships and business opportunities.
Example: A business partner may choose to sever ties with an
organization that is caught using pirated software, fearing
reputational harm or legal liability.
5. Operational Disruptions
Pirated software often lacks stability and may cause frequent crashes,
malfunctions, or performance degradation.
Impact: The use of unreliable software can lead to disruptions
in daily business operations, causing downtime, delays, and lost
productivity.
Example: Employees relying on pirated software may face
system crashes that delay work, causing frustration and
potentially leading to missed deadlines.
2. Identification
The Identification phase involves detecting and confirming that an
incident has occurred. This is typically the first step in the response to
any cyber threat, as early detection helps minimize damage.
Activities in the Identification Phase:
Monitoring Systems: Continuously monitor systems for unusual
activity using tools like IDS, firewalls, and security information
and event management (SIEM) systems.
Alert Generation: Once suspicious activity is detected (e.g.,
unauthorized login attempts, unusual network traffic), an alert
is generated for investigation.
Incident Verification: Security analysts review the alerts and
logs to confirm if they are false positives or genuine incidents.
Incident Categorization: Classify the incident based on its
severity, type (e.g., malware, phishing, data breach), and impact
to prioritize the response.
3. Containment
After confirming that an incident has occurred, the next phase is
containment, which aims to prevent further damage and stop the
attack from spreading across the network or system.
Activities in the Containment Phase:
Short-Term Containment: Implement immediate actions to
limit the spread of the incident. This could involve isolating
affected systems from the network, blocking malicious IP
addresses, or stopping the execution of malicious code.
Long-Term Containment: Implement temporary fixes to ensure
the attack doesn’t affect additional systems. This might involve
changing access credentials, applying patches, or temporarily
disabling specific services or systems.
Communication with Stakeholders: Inform relevant parties
about the containment measures and the potential risks
involved. This could include internal stakeholders like the
management or affected departments, and external parties like
third-party vendors or law enforcement.
4. Eradication
The Eradication phase involves completely removing the root cause
of the incident. This ensures that the organization is not at risk of the
same attack occurring again.
Activities in the Eradication Phase:
Root Cause Analysis: Investigate the incident to identify how
the attacker gained access, what vulnerabilities were exploited,
and which systems were compromised.
Remove Malicious Artifacts: Delete any malicious files,
backdoors, malware, or other tools that attackers may have
used to gain access.
System Clean-Up: Ensure that all affected systems are cleaned,
restored, and free from any lingering threats. This might include
reinstalling operating systems, applying patches, and removing
unauthorized user accounts.
Patch Vulnerabilities: Apply security patches to systems and
applications that were exploited in the incident to prevent
future attacks.
5. Recovery
Once the threat has been eradicated, the Recovery phase focuses on
restoring normal operations and ensuring that affected systems and
data are returned to a secure state.
Activities in the Recovery Phase:
Restore Systems: Rebuild and restore affected systems from
clean backups or reimage compromised systems to ensure they
are free of threats.
Monitor Systems Closely: Once systems are restored,
continuously monitor them for any signs of residual malware or
abnormal behavior.
Return to Normal Operations: Gradually bring systems and
services back online, prioritizing mission-critical systems.
Testing and Validation: Perform thorough testing to ensure that
systems are functioning properly and securely before they are
fully restored to normal operation.
6. Lessons Learned
After the incident has been resolved, the final phase is to perform a
lessons learned analysis. This phase is critical for improving future
responses and strengthening the organization’s security posture.
Activities in the Lessons Learned Phase:
Post-Incident Review: Hold a meeting with the incident
response team and other stakeholders to discuss the incident.
Evaluate what went well and what could be improved in the
response process.
Document the Incident: Create a detailed report documenting
the timeline of the incident, the actions taken, the lessons
learned, and any gaps identified in the response.
Improve Security Posture: Based on the review, update security
policies, incident response plans, and system defenses to
prevent future incidents. Implement new security measures or
strengthen existing ones.
Training and Awareness: Update employee training based on
the insights from the incident. Ensure staff are aware of new
threats and updated security measures.