Cyber Security Test
Cyber Security Test
Cyberspace is the virtual environment where digital communication, data exchange, and
online activities occur.
Cybersecurity is the practice of protecting computer systems, networks, and data from digital
threats and unauthorized access.
2 marks:
1.injection attack
2.dns spoofing
3.session hijacking
4.phishing
5.brute force
6.denial of service
7.dictionary attack
8.url interpretation
1.virus
2.worm
3.trojan horse
4.backdoors
5.bots
2.History of Internet.
✓ In the 1960s, research into what was then known as packet switching gave birth
to the Internet.
✓ It was believed that packet switching would be a better and faster way to convey
technology.
or the internet.
✓ The military used this technique to exchange private information. Then, this datasharing
technology was made available to American educational institutions so
they could use the government's supercomputer, initially at 56 kbit/s, then at 1.5
✓ In the US, the internet was completely commercialised by 1995, and internet
3.SPDI rules.
The SPDI Rules (Sensitive Personal Data or Information Rules) were issued on April 13, 2011.
These rules impose strict security requirements on organizations that retain sensitive user personal
information. They apply to any corporate body or person located in India. According to the Security
Practices Rules, sensitive personal information must be given to government entities.
4.explain 2013 rules in IT act.
Manner of Performing Functions and Duties) Rules, 2013 (2013 rules), established
3 marks:
1.phishing
o Phishing attacks have long been the most common and effective means by which
trick a user into clicking a link or opening an attachment than it is to identify and
o In recent years, phishing attacks have only grown more sophisticated. While the
original phishing scams were relatively easy to detect, modern attacks are
o Employee cyber security awareness training is not enough to protect against the
modern phishing threat. Managing the risk of phishing requires cyber security
solutions that identify and block malicious emails before they even reach a user’s
inbox.
is measured in a packet.
iii. Application layer attacks- Its goal is to crash the web server
Table
Ransomware
o While ransomware has been around for decades, it only became the dominant
form of malware within the last few years. The WannaCry ransomware outbreak
o Since then, the ransomware model has evolved drastically. While ransomware used
to only encrypt files, it now will steal data to extort the victim and their customers
in double and triple extortion attacks. Some ransomware groups also threaten or
19
ransom demands.
Malware
evolution of malware.
o Malware authors and cyber defenders are playing a continual cat and mouse game,
where attackers try to develop techniques that overcome or bypass the latest in
is created.
effective, and, often, by the time security analysts have detected and responded to
Mitigating the threat of Gen V malware requires cyber security solutions focused
on prevention, stopping the attack before it begins and before any damage is done.
5 marks:
1.Explain system based attack.
System-based attacks
the computer files without the knowledge of a user. It is a selfreplicating malicious computer
program that replicates by inserting
2. Worm
3. Trojan horse
4. Backdoors
purposes.
5. Bots
❖ Web-based attacks
✓ These are the attacks which occur on a website or web applications. Some of
information.
etc.
2. DNS Spoofing
3. Session Hijacking
b. Web applications create cookies to store the state and user sessions.
user data.
4. Phishing
in electronic communication.
5. Brute force
a. It is a type of attack which uses a trial and error method. This attack
6. Denial of Service
It can be classified into the followingi. Volume-based attacks- Its goal is to saturate the bandwidth
is measured in a packet.
iii. Application layer attacks- Its goal is to crash the web server
7. Dictionary attacks
8. URL Interpretation
URL, and one can make a web server to deliver web pages for
functionality.
3.Architecture of cyberspace.
Practically cyberspace architecture for global standard is not yet possible, though
certain groups of networks are maintaining some rules and regulations to make a
minimum architecture through TCP/IP and a virtual global server system. Here
• Advent of internet
• Internet society
• Regulation of cyberspace
2. Data Security – Data security controls protect the storage and transfer of data.
6. Perimeter Security – Perimeter security controls include both the physical and
7. The Human Layer – Humans are the weakest link in any cyber security posture.
controls that protect mission critical assets from a wide variety of human