Cyber Security 3
Cyber Security 3
Cryptography aids to secure information from third parties who are called adversaries. It
allows only the sender and the recipient to access the data securely.
Traceroute is a network diagnostic tool. It helps track the route taken by a packet that is sent
across the IP network. It shows the IP addresses of all the routers it pinged between the
source and the destination.
Uses:
It shows the time taken by the packet for each hop during the transmission.
When the packet is lost during the transmission, the traceroute will identify where the
point of failure is.
Uses:
It monitors the incoming and outgoing network traffic. It permits or allows only data
packets that agree to the set of security rules.
It acts as a barrier between the internal network and the incoming traffic from external
sources like the Internet.
It is a process that happens in a TCP/IP network when you make a connection between a
local host and the server. It is a three-step process to negotiate acknowledgment and
synchronization of packets before communication starts.
Step 1: The client makes a connection with the server with SYN.
Step 2: The server responds to the client request with SYN+ACK.
Step 3: The client acknowledges the server’s response with ACK, and the actual data
transmission begins.
HTTP response codes indicate a server’s response when a client makes a request to the
server. It shows whether an HTTP request is completed or not.
1xx: Informational
The request is received, and the process is continuing. Some example codes are:
100 (continue)
101 (switching protocol)
102 (processing)
103 (early hints)
2xx: Success
The action is received, understood, and accepted successfully. A few example codes for this
are:
200 (OK)
202 (accepted)
205 (reset content)
208 (already reported)
3xx: Redirection
To complete the request, further action is required to take place. Example codes:
The request has incorrect syntax, or it is not fulfilled. Here are the example codes for this:
The server fails to complete a valid request. Example codes for this are:
It is a security model to ensure IT security. CIA stands for confidentiality, integrity, and
availability.
1. Man in the Middle: The attacker puts himself in the communication between the sender
and the receiver. This is done to eavesdrop and impersonate to steal data.
2. Phishing: Here, the attacker will act as a trusted entity to perform malicious activities
such as getting usernames, passwords, and credit card numbers.
3. Rogue Software: It is a fraudulent attack where the attacker fakes a virus on the target
device and offers an anti-virus tool to remove the malware. This is done to install
malicious software into the system.
4. Malware: Malware is a software that is designed to attack the target system. The
software can be a virus, worm, ransomware, spyware, and so on.
5. Drive-by Downloads: The hacker takes advantage of the lack of updates on the OS, app,
or browser, which automatically downloads malicious code to the system.
6. DDoS: This is done to overwhelm the target network with massive traffic, making it
impossible for the website or the service to be operable.
7. Malvertising: Malvertising refers to the injections of maleficent code to legitimate
advertising networks, which redirect users to unintended websites.
8. Password Attacks: As the name suggests, here, the cyber hacker cracks credentials like
passwords
Data leakage means the unauthorized transmission of data from an organization to an external
recipient. The mode of transmission can be electronic, physical, web, email, mobile data, and
storage devices, such as USB keys, laptops, and optical media.
A port scan helps you determine the ports that are open, listening, or closed on a network.
Administrators use this to test network security and the system’s firewall strength. For
hackers, it is a popular reconnaissance tool to identify the weak point to break into a system.
Some of the common basic port scanning techniques are:
1. UDP
2. Ping scan
3. TCP connect
4. TCP half-open
5. Stealth scanning
10. Explain brute force attack and the ways to prevent it.
A brute force attack is a hack where the attacker tries to guess the target password by trial and
error. It is mostly implemented with the help of automated software used to login with
credentials.
Hashing Encryption
A one-way function where you cannot Encrypted data can be decrypted to the original
decrypt the original message text with a proper key
Used to verify data Used to transmit data securely
Used to send files, passwords, etc. and to Used to transfer sensitive business information
search
12. What is the difference between vulnerability assessment (VA) and penetration
testing (PT)?
Secure Socket Layer is a security protocol that is used for the purpose of encryption. It
ensures privacy, data integrity, and authentication in the network like online transactions.
A server that is secured uses the Secure Socket Layer (SSL) protocol to encrypt and decrypt
data to protect it from unauthorized access.
Physical layer: This layer allows the transmission of raw data bits over a physical
medium.
Data link layer: This layer determines the format of the data in the network.
Network layer: It tells which path the data will take.
Transport layer: This layer allows the transmission of data using TCP/UDP protocols.
Session layer: It controls sessions and ports to maintain the connections in the network.
Presentation layer: Data encryptions happen in this layer, and it ensures if the data is in
usable/presentable format.
Application layer: This is where the user interacts with the application.
1. When you make a VPN connection, your device routes the Internet connection to the
VPN’s private server, instead of your Internet Service Provider (ISP).
2. During this transmission, your data is encrypted and sent through another point on the
Internet.
3. When it reaches the server, the data is decrypted.
4. The response from the server reaches the VPN where it is encrypted, and it will be
decrypted by another point in the VPN.
5. At last, the data, which is decrypted, reaches you.
BlackHatHackers
A Black Hat Hacker uses his/her hacking skills to breach confidential data without
permission. With the obtained data, the individual performs malicious activities such as
injecting malware, viruses, and worms.
WhiteHatHackers
A White Hat Hacker uses his/her hacking skills to break into a system but with the
permission of the respective organizations. They are professionals known as Ethical Hackers.
They hack the system to identify its vulnerability and to fix it before a hacker takes advantage
of it.
GreyHatHackers
A Grey Hat Hacker has the characteristics of both a Black Hat Hacker and a White Hat
Hacker. Here, the system is violated with no bad intention, but they do not have the essential
permission to surf the system, so it might become a potential threat at any time.
Patch management has to be done immediately once the updates to the software is released.
All the network devices in the organization should get patch management in less than a
month.
BIOS being hardware, setting it up with a password locks the operating system. There are
three ways to reset the BIOS password:
1. you need to unplug the PC and remove the CMOS battery in the cabinet for 15–30
minutes. Then, you can put it back.
2. You can use third-party software such as CmosPwd and Kiosk.
3. You can run the below commands from the MS-DOS prompt with the help of the debug
tool. For this method to work, you need to have access to the OS installed.
Debug
o 70 2E
o 71 FF
quit
This will reset all BIOS configurations, and you need to re-enter the settings for it.
In the Man-in-the-Middle attack, the hacker eavesdrops on the communication between two
parties. The individual then impersonates another person and makes the data transmission
look normal for the other parties. The intent is to alter the data, steal personal information, or
get login credentials for sabotaging communication.
Distributed denial-of-service attack overwhelms the target website, system, or network with
huge traffic, more than the server’s capacity. The aim is to make the server/website
inaccessible to its intended users. DDoS happens in the below two ways:
Flooding attacks: This is the most commonly occurring type of DDoS attack. Flooding
attacks stop the system when the server is accumulated with massive amounts of traffic that it
cannot handle. The attacker sends packets continuously with the help of automated software.
Crash attacks: This is the least common DDoS attack where the attacker exploits a bug in
the targeted system to cause a system crash. It prevents legitimate users from accessing email,
websites, banking accounts, and gaming sites.
Cross-site scripting also known as XSS attack allows the attacker to pretend as a victim user
to carry out the actions that the user can perform, in turn, stealing any of the user’s data. If the
attacker can masquerade as a privileged victim user, one can gain full control over all the
application’s data and functionality. Here, the attacker injects malicious client-side code into
web services to steal information, run destructive code, take control of a user’s session, and
perform a phishing scam.
Address Resolution Protocol is a communication protocol of the network layer in the OSI
model. Its function is to find the MAC address for the given IP address of the system. It
converts the IPv4 address, which is 32-bit, into a 48-bit MAC address.
It refers to restricting users from accessing a set of services within the local area network.
The main aim is to stop the source from providing access to destination nodes via ports. Since
all applications run on the ports, it is necessary to block the ports to restrict unauthorized
access, which might violate the security vulnerability in the network infrastructure.
31. What are the protocols that fall under the TCP/IP Internet layer?
Application NFS, NIS, SNMP, telnet, ftp, rlogin, rsh, rcp, RIP, RDISC, DNS, LDAP,
Layer and others
Transport Layer TCP, SCTP, UDP, etc.
Internet IPv4, ARP, ICMP, IPv6, etc.
Data Link Layer IEEE 802.2, PPP, etc.
Physical Layer Ethernet (IEEE 802.3), FDDI, Token Ring, RS-232, and others
A botnet, which is also known as a robot network, is a malware that infects networks of
computers and gets them under the control of a single attacker who is called a ‘bot herder.’ A
bot is an individual machine that is under the control of bot herders. The attacker acts as a
central party who can command every bot to perform simultaneous and coordinated criminal
actions.
The botnet is a large-scale attack since a bot herder can control millions of bots at a time. All
the botnets can receive updates from the attacker to change their behavior in no time.
When two users have the same password, it will result in the creation of the same password
hashes. In such a case, an attacker can easily crack the password by performing a dictionary
or brute-force attack. To avoid this, a salted hash is implemented.
A salted hash is used to randomize hashes by prepending or appending a random string (salt)
to the password before hashing. This results in the creation of two completely different
hashes, which can be employed to protect the users’ passwords in the database against the
attacker.
SecureSocketsLayer(SSL)
It employs encryption algorithms to keep any sensitive data that is sent between a client and a
server by scrambling the data in transit. This helps prevent hackers from reading any data,
such as credit card details and personal and other financial information; it is done by keeping
the Internet connection secure.
TransportLayerSecurity(TLS)
TLS is the successor of SSL. It is an improved version protocol that works just like SSL to
protect the information transfer. However, to provide better security, both TLS and SSL are
often implemented together.
36. What is 2FA, and how can it be implemented for public websites?
1. Install firewalls
2. Rotate passwords frequently
3. Do not click on or download from unknown sources
4. Get free anti-phishing tools
5. Do not provide your personal information on an unsecured/unknown site
40. Explain SQL injection. How to prevent it?
SQL injection is an injection attack where an attacker executes malicious SQL commands in
the database server, including MySQL, SQL Server, or Oracle, that runs behind a web
application. The intent is to gain unauthorized access to sensitive data such as client
information, personal information, intellectual property details, and so on. In this attack, the
attacker can add, modify, and delete records in the database, which results in the data
integrity loss of an organization.