0% found this document useful (0 votes)
10 views

CSDF PDF

Uploaded by

Rishu Singh
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

CSDF PDF

Uploaded by

Rishu Singh
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Prac cal 1: Tracking and Inves ga ng Emails (Email Header Analysis)

Summary:
This prac cal focuses on analyzing email headers to understand the structure and key fields that
provide informa on about the email’s origin, path, and authen city. By examining fields such as
“Received,” “From,” “Message-ID,” and “Return-Path,” we can trace the sender’s IP address and
iden fy poten al signs of email spoofing or phishing.

Viva Ques ons and Answers:

1. What is the purpose of analyzing an email header?


To trace the email’s origin and verify its authen city, iden fying spoofing or phishing a empts.
2. What informa on does the ‘Received’ field provide?
It shows the email’s path through servers, indica ng where it originated and its route.
3. Define email spoofing.
Email spoofing is forging the sender’s address to make it appear from a trusted source.
4. What does the ‘From’ field indicate?
It shows the sender’s email address, but it can be forged and is not always reliable.
5. How does the ‘Message-ID’ field help in inves ga ons?
It provides a unique iden fier for tracking individual emails.
6. What is the purpose of the ‘Return-Path’ field?
Specifies where undeliverable emails (bounces) should be sent, offering sender clues.
7. What is SPF, and why is it important?
SPF (Sender Policy Framework) verifies that the sender’s IP is authorized by the domain owner,
detec ng spoofing.
8. Explain DKIM and its func on.
DKIM (DomainKeys Iden fied Mail) uses cryptographic signatures to verify email integrity.
9. What is the significance of ‘Authen ca on-Results’?
Displays results of SPF, DKIM, and DMARC checks, indica ng if the email passed these verifica ons.
10. How can the origina ng IP address of an email be iden fied?
By checking the first ‘Received’ field in the header.

Prac cal 2: CAPTCHA Genera on and Verifica on

Summary:
In this prac cal, we implemented a program to generate and verify CAPTCHA images. CAPTCHAs are
used as a security measure to differen ate between human users and bots by presen ng tasks
difficult for automated systems.

Viva Ques ons and Answers:

1. What is the purpose of CAPTCHA?


CAPTCHA prevents automated bots from accessing systems by requiring users to solve human-
detectable tasks.
2. What are common types of CAPTCHAs?
Text-based, image-based, audio CAPTCHAs, and reCAPTCHA.
3. How does CAPTCHA protect against bots?
Bots typically struggle to interpret distorted images or audio, ensuring only humans can solve them.
4. What is reCAPTCHA?
reCAPTCHA is an advanced CAPTCHA system by Google, o en using image recogni on tasks to verify
users.
5. Why is CAPTCHA verifica on important?
It prevents abuse from automated bots that might exploit website resources or spam systems.
6. How does CAPTCHA benefit websites?
It improves security, reduces spam, and protects resources by allowing only human interac ons.
7. What programming libraries can be used for CAPTCHA genera on?
Python libraries like CAPTCHA or Pillow can be used for genera ng and verifying CAPTCHAs.
8. What is the difference between CAPTCHA and reCAPTCHA?
reCAPTCHA o en involves machine learning, whereas tradi onal CAPTCHA uses sta c images or
audio challenges.
9. Explain CAPTCHA accessibility issues.
CAPTCHAs can be challenging for visually or hearing-impaired users, requiring alterna ve verifica on
methods.
10. How can CAPTCHA effec veness be measured?
By its success in preven ng bot access while maintaining user-friendliness for humans.

Prac cal 3: Retrieving Permanently Deleted Files

Summary:
This prac cal demonstrates a computer forensic process for recovering files that were permanently
deleted. Using recovery tools, it’s possible to restore data from storage devices, aiding in digital
inves ga ons.

Viva Ques ons and Answers:

1. What is file recovery?


It’s the process of restoring deleted files from storage devices.
2. Which tools are commonly used for file recovery?
Tools like Recuva, TestDisk, and FTK Imager.
3. How are files recovered if they’re permanently deleted?
Deleted files can o en be restored unless overwri en on the storage device.
4. What is data carving in recovery?
Data carving reconstructs files from raw data on storage media without file system metadata.
5. Explain metadata and its role in recovery.
Metadata contains file details like mestamps and loca on, aiding in iden fying deleted files.
6. What challenges exist in file recovery?
Overwri en or corrupted files are hard to recover, as data may be par ally or fully lost.
7. What are some file recovery techniques?
Techniques include scanning for fragments, metadata analysis, and using backup files.
8. Explain the role of file signatures in recovery.
Signatures help iden fy specific file types, allowing for data carving without file system metadata.
9. How can SSDs affect file recovery?
SSDs o en perform TRIM opera ons, which permanently erase deleted data blocks.
10. What is the significance of file recovery in digital forensics?
It helps inves gators retrieve evidence from deleted files in cases of cybercrime.

Please review this format, and if it meets your requirements, I will generate the PDF for you. Let me
know if you’d like more prac cals added or specific adjustments made.
Here is the con nua on with summaries and viva ques ons for the next prac cals.

Prac cal 4: Log Capturing and Event Correla on

Summary:
This prac cal involves crea ng a program to capture system logs and analyze them for event
correla on. By correla ng events, security analysts can iden fy pa erns that may indicate security
incidents or system anomalies.

Viva Ques ons and Answers:

1. What is the purpose of log capturing?


To record system events and ac vi es, enabling monitoring and troubleshoo ng.
2. What is event correla on in cybersecurity?
It’s the process of linking related events to detect pa erns that indicate security incidents.
3. Why are logs important in cybersecurity?
Logs provide a record of ac vi es, helping to iden fy and analyze security threats.
4. What is a Security Informa on and Event Management (SIEM) system?
SIEM systems collect and correlate logs from mul ple sources to detect and respond to security
incidents.
5. Name some commonly captured log types.
System logs, applica on logs, security logs, and network logs.
6. How does log correla on improve threat detec on?
It links related events across systems to reveal suspicious pa erns missed in isolated logs.
7. What is a false posi ve in log analysis?
A benign event flagged as suspicious, leading to unnecessary alerts.
8. Why is mestamp synchroniza on important in event correla on?
Synchronizing mestamps helps accurately correlate events from mul ple systems.
9. How can log reten on policies impact security?
Reten on policies determine how long logs are kept, impac ng data availability for forensic analysis.
10. What challenges exist in log correla on?
Challenges include handling large data volumes, normalizing logs, and reducing false posi ves.

Prac cal 5: Studying the Working of Honeypots

Summary:
In this prac cal, we studied honeypots, which are decoy systems used to lure a ackers. Honeypots
gather informa on about a ackers’ tac cs and help iden fy vulnerabili es in network defenses by
observing malicious ac vi es in a controlled environment.

Viva Ques ons and Answers:

1. What is a honeypot in cybersecurity?


A honeypot is a decoy system designed to a ract a ackers and study their behavior.
2. How does a honeypot help in security?
It provides insights into a ackers’ methods and helps iden fy network vulnerabili es.
3. What types of honeypots are commonly used?
Low-interac on, high-interac on, and research honeypots.
4. What is a low-interac on honeypot?
A decoy with limited func onality, o en used to a ract and detect automated a acks.
5. What is the main goal of a high-interac on honeypot?
To engage a ackers more deeply, allowing detailed analysis of their tac cs and tools.
6. How is data collected from honeypots analyzed?
Analysts review logs and traces le by a ackers to understand their methods and intent.
7. What is a honeynet?
A network of honeypots used to study larger-scale a ack pa erns.
8. How do honeypots prevent real damage to networks?
They’re isolated from cri cal systems, limi ng a ackers to controlled environments.
9. What are some challenges in deploying honeypots?
Challenges include avoiding detec on, maintaining security, and managing false posi ves.
10. Can honeypots be used for legal evidence?
Yes, but they must be carefully managed to ensure data authen city and admissibility in court.

Prac cal 6: Repor ng Child Exploita on through NCECC

Summary:
In this mini project, we studied the process of repor ng child exploita on to the Na onal Center for
Missing and Exploited Children (NCECC). Understanding this repor ng process is essen al for
responding to online exploita on cases and suppor ng law enforcement.

Viva Ques ons and Answers:

1. What is the NCECC?


The Na onal Center for Missing and Exploited Children, which handles reports of child exploita on.
2. Why is repor ng child exploita on important?
It helps protect children from abuse and supports inves ga ons to stop offenders.
3. What types of incidents should be reported to NCECC?
Incidents involving child exploita on, abuse, trafficking, and online grooming.
4. How can individuals report cases to the NCECC?
Through the NCECC website, hotline, or mobile app.
5. What role does NCECC play in law enforcement?
It collects, analyzes, and shares informa on with law enforcement agencies to inves gate cases.
6. What is the role of digital forensics in child exploita on cases?
Digital forensics recovers evidence from devices used in exploita on, suppor ng inves ga ons.
7. Explain the importance of evidence preserva on in these cases.
Proper evidence handling ensures it remains admissible in court and maintains integrity.
8. What is grooming, and how is it related to child exploita on?
Grooming is building trust with a child to exploit them, o en involving online manipula on.
9. How can cybersecurity professionals assist in these cases?
By analyzing digital evidence, iden fying perpetrators, and securing networks from exploita on risks.
10. What challenges exist in detec ng online child exploita on?
Challenges include anonymity of offenders, encrypted communica ons, and cross-jurisdic onal
cases.

Let me know if this structure meets your needs, and I’ll create a PDF containing all the prac cals and
viva ques ons.

You might also like