UNIT1CYBERQANS
UNIT1CYBERQANS
Ans:cyber security is the practices of protecting systems ,networks from digital attacks.
Security-safeguarding of system/network.
A cyberthreat refers to anything that has the potential to cause serious harm to a computer
system. A cyber threat is something that may or may not happen but has the potential to cause
serious damage.Cyber threats can lead to attack on computer systems,networks and more.
NOTE: A Threat is a possible security risk that might exploit the vulenerability of a system or asset.
Vulnerability in software means:A security flaw or weakness found in software code that could be
exploited by an attacker.
Cryptographic failures:Sensitive data such as passwords and account no’s should be properly be
protected.taking advantages of this vulnerability untrusted person can gain access
Injection: injection flaw occurs when untrusted data is send as a part of command or query.
Sql injection
Mandatory Access Control, or MAC for short, refers to a cybersecurity system that looks to allow
or deny access to private and protected information in an organization. This allocation of access
privileges depends on the hierarchy of employees and personnel in said organization.
Q5.WRITE SHORT NOTES ON TYPES OF DOS FILTERS
expl
A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it
inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or
sending it information that triggers a crash.
The main difference between data egress and ingress is the direction of data flow: ingress refers to
data entering a system or network, while egress refers to data leaving a system or network.
Ingress filtering is one type of packet filtering. Its counterpart is egress filtering, which examines
outbound traffic and only enables packets to leave the network if they meet predetermined
policies set by an administrator.
ESSAY QUESTIONS
Cybersecurity means protecting data, networks, programs and other information from
unauthorized or unattended access, destruction or change.
Internet governance refers to the rules, policies, standards and practices that coordinate and
shape global cyberspace.
While Internet connectivity generated innovative new services, capabilities and unprecedented
forms of sharing and cooperation, it also created new forms of crime.
Internet governance is the process whereby cyberspace participants resolve conflicts over these
problems and develop a workable order.
The changing nature of internet: Governance mechanisms aren’t always scalable. Ways of
governing the internet that worked when it was smaller and less complex won’t be sufficient now
it’s larger and more complex.
The concentration of digital power. Networks give powerful advantages to big players that can
maximise numbers of users, achieve economies of scope and scale, and leverage data to maximise
value to consumers and themselves.
The result has been the concentration of online power in a few large companies with global reach
Getting countries to work together towards a unified policy can be a challenge. Countries can have
different ideologies and views on how to run the Internet
Moreover, different organizations and governments often have conflicting ideas about how the
Internet should be managed.
Challenge of regulation. Unlike traditional media like television or newspapers, the Internet does
not reside in one place. Because it is global and interconnected, no one country can enforce its
laws on the entirety of the Internet.
Privacy: End user privacy must be ensured in all digital transactions carried through internet.
Authentication :services must be provided only t legitimate users.this can be done using digital
signatures which involves additional cost.
These threats can come in the form of malware, phishing, and other malicious activity.
Cyber crime:A cyber crime can be defined as a criminal activitiy done using a computer.
Cyber Terrorism: Cyber terrorism (also known as digital terrorism) is defined as disruptive attacks
by recognised terrorist organisations against computer systems with the intent of generating
alarm, panic, or the physical disruption of the information system.
Meaning only
What are disruptive cyber threats? Malicious software that is created and deployed
with the intent of damaging and disrupting critical business functions.
--
This policy specifies certain rules that are to be followed by every member of an organization.
A cybersecurity policy establishes the guidelines for data security activities such as encrypting
emails, limiting access to critical systems, and maintaining data integrity. These policies are crucial
since cyberattacks and data leaks can be extremely expensive.
--
Nodal authority of an organization is used to respond to a computer security incident when they
occur in real time.
4.it is used to provide a set of rules and standards related to information security
policies,preventive techniques and reporting of cyber security incidents.
--
Broken access control:- can lead to security problem like theft of data.
In most cases of Broken Access Control attacks, a malicious user takes advantage of weak or non-
implementation of access control in the target application.
Cryptographic failures.
Cryptographic failures are where attackers often target sensitive data, such as passwords, credit
card numbers, and personal information, when you do not properly protect them. This is the root
cause of sensitive data exposure.
--
System administration is the field of work in which someone manages one or more systems, be
they software, hardware, servers or workstations. Its goal is ensuring the systems are running
efficiently and effectively.
System administrators support, troubleshoot, and maintain computer servers and networks.
-They make sure systems are functioning to meet the needs of an organization
-creating backup
--
->a stream or block of data can be transmitted over network between 2 parties.
Ans
Open access (OA) means free access to information and unrestricted use of electronic resources
for everyone. Any kind of digital content can be OA, from texts and data to software, audio, video,
and multi-media.
Procedure
First attacker identies weak points in the target(individual or organization) using
various methods or tools
In principle attacker makes use of 2 attacks
Active Attack: in an active attack,an attacker tries to modify the contents of the
messages making a a bad impact on availability ,integrity and authenticity of the
data.
Passive attack: in a passive attack,an attacker observes the messages and copies
them.it is used to get information about the target.
Morever there exists other attacks also.
OUTSIDE ATTACK:-
Access control
Access control refers to an ability of either allowing or disallowing a user
from accessing a particular resource.
There are many mechanism that exist which are employed for performing access
control.
Access control system incorporates the following
File permissions
The read permission grants the ability to read a file
The write permission grants the ability to modify a file
Program permission is an access control that can be used by users for
executing a program .
Data rights permission: it is an access control that can be used for
retrieving,updating information in the data base.
Disadvantage
Error prone when skin is dry or dirty(old age).
Disadvantages
The results gets effected with change in age,hair style.
Adv
Highly accurate
Performs verification at high speed.
Disadvantage
Expensive technique
Results may vary based on poor infrared light.
4.Authentication. The sender and receiver can confirm each other's identity and
the origin/destination of the information.
--
Capabilities of firewall
1.firewalls provide protection against cyber attacks by shielding ur
computer
2.firewall also prevents malicious software from accessing a computer
or network via internet
3.firewall filters unsafe incoming services which attacks authenticated
users
4.firewall minimizes the burden of security management services
5.firewall handles security related issues by starting alerts and audits on
firewall system.
Firewall audit: it's an ongoing process in which existing defenses are constantly
reviewed, audited, and improved upon to provide the best-possible network and data
protection.