Answer---Cyber Security--2023
Answer---Cyber Security--2023
Group-A
(Very Short Answer Type Question; 1-Mark Question)
(II) Which DDoS in mobile systems wait for the owner to trigger the cyber attack?
SMS-based DDoS
(III) Why are the factors like Confidentiality, Integrity, Availability, and Authenticity considered as
the fundamentals?
They are the core principles of information security – Confidentiality, Integrity,
Availability, and Authenticity are considered fundamental because they ensure the protection and
reliability of information.
(IV) What refers to exploring the appropriate, ethical behaviors related to the online environment
and digital media platform?
Digital Ethics
(V) What type of text is transformed with the help of a cipher algorithm?
Plaintext
(VIII) ___________ means the security of data from tampering by unidentified users.
Data Integrity
(IX) Which is a sort of independent type of malicious program that would not require any host
program?
Worm
3. Explain Data backup security, Data archival security, and Data disposal
considerations.
Data Backup Security: It involves the creation and protection of copies of critical data to ensure
its availability in case of data loss or disaster. Backup data must be encrypted, stored securely
(e.g., in a secure cloud environment or offline storage), and regularly tested for recoverability.
Data Archival Security: Archiving refers to long-term storage of inactive data. Archival security
ensures that archived data remains intact, accessible, and secure. It typically involves using
secure storage methods, encryption, and strict access controls to prevent unauthorized access or
tampering over time.
Data Disposal Considerations: When data is no longer needed, it must be disposed of securely
to prevent unauthorized access. Methods include physical destruction (e.g., shredding hard
drives) or secure deletion (e.g., overwriting data several times). Proper data disposal is crucial
to protecting sensitive information and complying with data protection regulations.
4. What is the use of policy?
A policy is a set of guidelines or principles designed to influence decisions and ensure consistent
and proper behavior within an organization. In cybersecurity, policies are crucial for:
i. Establishing clear rules regarding data access, usage, and protection.
ii. Defining roles and responsibilities for security management.
iii. Guiding employees' actions to prevent security incidents.
iv. Ensuring compliance with legal and regulatory standards (e.g., GDPR, HIPAA).
Policies provide a framework for security practices, help minimize risks, and ensure that security
measures align with the organization's overall objectives.
7. (b) Backdoor
7. (c) Trapdoor
A trapdoor is similar to a backdoor but is a hidden entry point
intentionally embedded into a program or system by the
developer (often for testing purposes). It can be used
maliciously if discovered by unauthorized users. Unlike
backdoors, which are typically installed by external attackers,
trapdoors are intentionally created by insiders (e.g.,
developers) and can be used to exploit vulnerabilities for
malicious purposes.
8. (a) Discuss the SQL Injection in detail.
SQL Injection is a code injection technique that exploits vulnerabilities in an application’s software
by inserting or "injecting" malicious SQL code into a query. This attack is possible when an
application fails to validate input data properly. The injected code can manipulate the SQL query
to gain unauthorized access to the database, retrieve, modify, or delete data. SQL Injection can also
allow attackers to execute administrative operations on the database, such as shutting down the
database or bypassing authentication systems. Preventative measures include input validation,
prepared statements, and parameterized queries.
10. (a) Name & explain the two protocols to use for E-mail Security.
i. SSL/TLS (Secure Socket Layer/Transport Layer Security): This protocol secures email
communication by encrypting the connection between email servers, preventing
eavesdropping and tampering.
ii. PGP (Pretty Good Privacy): PGP provides end-to-end email encryption by using a
combination of public-key and symmetric encryption techniques, ensuring that only the
intended recipient can read the message.
ii. Rearrange Columns by Key Order: Rearrange the columns based on the key [3, 1, 4, 2].
Column 3 becomes first, Column 1 becomes second, and so on:
E M T E
A M T E
E T P H
K A X R
iii. Read Column by Column: Read the characters column-wise to form the ciphertext:
Ciphertext: ETAKE MMTT EPXR HEAR
Final Ciphertext:
"ETAKEMTTEPXRHAR"
This is how the plaintext is encrypted using the transposition cipher. The decryption process involves
reversing the column order using the key.