Skip to main content
  1. Resources/
  2. Study Materials/
  3. Information Technology Engineering/
  4. IT Semester 6/
  5. Cyber Security & Digital Forensics (4361601)/

Cyber Security and Digital Forensics (4361601) - Summer 2024 Solution

·
Study-Material Solutions Cyber-Security 4361601 2024 Summer
Milav Dabgar
Author
Milav Dabgar
Experienced lecturer in the electrical and electronic manufacturing industry. Skilled in Embedded Systems, Image Processing, Data Science, MATLAB, Python, STM32. Strong education professional with a Master’s degree in Communication Systems Engineering from L.D. College of Engineering - Ahmedabad.
Table of Contents

Question 1(a) [3 marks]
#

Describe CIA triad with example.

Answer:

CIA Triad Comparison Table:

ComponentDefinitionExample
ConfidentialityEnsures data is accessible only to authorized usersBank account details should only be viewed by account holder
IntegrityEnsures data remains accurate and unmodifiedMedical records must not be altered without authorization
AvailabilityEnsures systems and data are accessible when neededATM services must be available 24/7 for customers

Mnemonic: “Can I Access” - Confidentiality, Integrity, Availability


Question 1(b) [4 marks]
#

Explain Public key and Private Key cryptography.

Answer:

Key Differences Table:

AspectPublic Key CryptographyPrivate Key Cryptography
Keys UsedTwo keys (public + private)Single shared key
Key DistributionPublic key can be shared openlyKey must be shared secretly
SpeedSlower encryption/decryptionFaster operations
SecurityHigher security, no key sharing problemLower security due to key distribution

Key Points:

  • Public Key: Uses asymmetric encryption with key pairs
  • Private Key: Uses symmetric encryption with shared secrets
  • Digital Signatures: Public key enables non-repudiation
  • Key Management: Private key requires secure distribution

Mnemonic: “PASS” - Public Asymmetric, Symmetric Secret


Question 1(c) [7 marks]
#

Explain various security services and security mechanism.

Answer:

Security Services Table:

ServicePurposeMechanism Example
AuthenticationVerify user identityPasswords, Biometrics
AuthorizationControl access permissionsAccess Control Lists
ConfidentialityProtect data privacyEncryption (AES, RSA)
IntegrityEnsure data accuracyDigital signatures, Hashing
Non-repudiationPrevent denial of actionsDigital certificates
AvailabilityEnsure service accessibilityFirewalls, Backup systems

Security Mechanisms:

  • Encryption: Transforms plaintext to ciphertext
  • Digital Signatures: Provides authentication and integrity
  • Access Control: Restricts unauthorized access
  • Audit Trails: Monitor and log security events

Mnemonic: “ACIANA” - Authentication, Confidentiality, Integrity, Authorization, Non-repudiation, Availability


Question 1(c) OR [7 marks]
#

Explain MD5 hashing algorithm.

Answer:

MD5 Algorithm Process:

flowchart TD
    A[Input Message] --> B[Padding]
    B --> C[Append Length]
    C --> D[Initialize MD Buffer]
    D --> E[Process in 512-bit blocks]
    E --> F[128-bit Hash Output]

MD5 Characteristics Table:

PropertyValue
Hash Size128 bits (16 bytes)
Block Size512 bits
Rounds64 rounds
Security StatusCryptographically broken

Key Features:

  • One-way Function: Cannot reverse hash to original
  • Fixed Output: Always produces 128-bit hash
  • Avalanche Effect: Small input change creates large output change
  • Collision Vulnerable: Multiple inputs can produce same hash

Mnemonic: “MD5 FORB” - Message Digest 5, Fixed Output, Rounds 64, Broken security


Question 2(a) [3 marks]
#

What is firewall? List out types of firewall.

Answer:

Firewall Definition: Network security device that monitors and controls incoming/outgoing traffic based on predetermined rules.

Firewall Types Table:

TypeOperation LevelExample
Packet FilteringNetwork Layeriptables
Stateful InspectionSession LayerCisco ASA
Application GatewayApplication LayerProxy servers
Next-Gen FirewallMultiple LayersPalo Alto

Mnemonic: “PSAN” - Packet, Stateful, Application, Next-gen


Question 2(b) [4 marks]
#

Define: HTTPS and describe working of HTTPS.

Answer:

HTTPS Definition: HTTP Secure - encrypted version of HTTP using SSL/TLS protocols.

HTTPS Working Process:

sequenceDiagram
    participant C as Client
    participant S as Server
    C->>S: 1. HTTPS Request
    S->>C: 2. SSL Certificate
    C->>S: 3. Verify & Send Session Key
    S->>C: 4. Encrypted Communication

Key Components:

  • SSL/TLS: Provides encryption layer
  • Digital Certificates: Verify server identity
  • Port 443: Default HTTPS port
  • End-to-end Encryption: Protects data in transit

Mnemonic: “HTTPS SDP4” - Secure, Digital certs, Port 443


Question 2(c) [7 marks]
#

Give explanation of active attack and passive attack in detail.

Answer:

Attack Types Comparison:

AspectActive AttackPassive Attack
DetectionEasily detectableDifficult to detect
System ImpactModifies system/dataOnly observes data
ExamplesDoS, Man-in-middleEavesdropping, Traffic analysis
PreventionFirewalls, IDSEncryption, Physical security

Active Attack Types:

  • Masquerade: Impersonating authorized user
  • Replay: Retransmitting valid data transmissions
  • Modification: Altering message contents
  • Denial of Service: Preventing legitimate access

Passive Attack Types:

  • Traffic Analysis: Studying communication patterns
  • Eavesdropping: Monitoring communications
  • Footprinting: Gathering system information

Mnemonic: “Active MRMD, Passive TEF” - Masquerade/Replay/Modify/DoS, Traffic/Eavesdrop/Footprint


Question 2(a) OR [3 marks]
#

What is digital signature? Explain digital signature properties.

Answer:

Digital Signature: Cryptographic mechanism providing authentication, integrity, and non-repudiation.

Properties Table:

PropertyDescription
AuthenticationVerifies sender identity
IntegrityEnsures message unchanged
Non-repudiationPrevents sender denial
UnforgeableCannot be created without private key

Mnemonic: “AINU” - Authentication, Integrity, Non-repudiation, Unforgeable


Question 2(b) OR [4 marks]
#

Define: Trojans, Rootkit, Backdoors, Keylogger

Answer:

Malware Types Table:

TypeDefinitionPrimary Function
TrojansMalicious code disguised as legitimate softwareProvide unauthorized access
RootkitSoftware hiding presence of other malwareConceal malicious activities
BackdoorsSecret entry point bypassing securityRemote unauthorized access
KeyloggerRecords user keystrokesSteal passwords/sensitive data

Mnemonic: “TRBK” - Trojans hide, Rootkits conceal, Backdoors bypass, Keyloggers record


Question 2(c) OR [7 marks]
#

Explain Secure Socket Layer.

Answer:

SSL Architecture:

graph TD
    A[Application Layer] --> B[SSL Record Protocol]
    B --> C[SSL Handshake Protocol]
    B --> D[SSL Change Cipher]
    B --> E[SSL Alert Protocol]
    C --> F[TCP Layer]
    D --> F
    E --> F

SSL Components Table:

ComponentFunction
Record ProtocolProvides basic security services
Handshake ProtocolEstablishes security parameters
Change CipherSignals encryption changes
Alert ProtocolHandles error conditions

SSL Process:

  • Handshake: Negotiate security parameters
  • Authentication: Verify server identity
  • Key Exchange: Establish session keys
  • Encryption: Secure data transmission

Mnemonic: “SSL RHCA-HAKE” - Record/Handshake/Change/Alert, Handshake/Auth/Key/Encrypt


Question 3(a) [3 marks]
#

Explain in detail cybercrime and cybercriminal.

Answer:

Definitions Table:

TermDefinition
CybercrimeCriminal activities carried out using computers/internet
CybercriminalIndividual who commits crimes using digital technology

Cybercriminal Types:

  • Script Kiddies: Use existing tools without deep knowledge
  • Hacktivists: Motivated by political/social causes
  • Organized Crime: Professional criminal groups
  • State-sponsored: Government-backed attackers

Mnemonic: “SSHT” - Script kiddies, State-sponsored, Hacktivists, Teams organized


Question 3(b) [4 marks]
#

Describe cyber stalking and cyber bullying in detail.

Answer:

Comparison Table:

AspectCyber StalkingCyber Bullying
TargetSpecific individual (often adult)Often minors/peers
DurationLong-term harassmentCan be one-time or repeated
IntentIntimidation, controlHumiliation, social exclusion
MethodsMonitoring, threatening messagesSocial media harassment, spreading rumors

Common Characteristics:

  • Digital Platforms: Social media, email, messaging apps
  • Anonymity: Perpetrators often hide identity
  • Psychological Impact: Causes emotional distress
  • Legal Consequences: Violates cyber laws

Mnemonic: “STAL-BULL DPAL” - Digital platforms, Psychological impact, Anonymity, Legal issues


Question 3(c) [7 marks]
#

Explain Property based classification in cybercrime.

Answer:

Property-Based Cybercrime Classification:

Crime TypeDescriptionExample
Credit Card FraudUnauthorized use of payment cardsOnline shopping with stolen cards
Software PiracyIllegal copying/distribution of softwareDownloading copyrighted software
Copyright InfringementViolating intellectual property rightsSharing movies/music illegally
Trademark ViolationsMisusing registered trademarksCreating fake brand websites

Impact Assessment:

  • Financial Loss: Direct monetary damage
  • Intellectual Property Theft: Loss of competitive advantage
  • Brand Reputation: Damage to company image
  • Legal Costs: Expenses for prosecution/defense

Prevention Measures:

  • Digital Rights Management: Protect copyrighted content
  • Secure Payment Systems: Implement fraud detection
  • Legal Enforcement: Prosecute violators
  • Public Awareness: Educate about legitimate software

Mnemonic: “CSCT-FILP” - Credit/Software/Copyright/Trademark, Financial/Intellectual/Legal/Public


Question 3(a) OR [3 marks]
#

Explain Data diddling.

Answer:

Data Diddling Definition: Unauthorized alteration of data before/during input into computer system.

Characteristics Table:

AspectDetails
MethodChanging data values slightly
DetectionVery difficult to detect
TargetFinancial/sensitive data
ImpactCumulative significant loss

Mnemonic: “DIDDL” - Data alteration, Input manipulation, Difficult detection, Dollar losses


Question 3(b) OR [4 marks]
#

Explain cyber spying and cyber terrorism.

Answer:

Comparison Table:

AspectCyber SpyingCyber Terrorism
PurposeIntelligence gatheringCause fear/disruption
TargetsGovernment, corporationsCritical infrastructure
MethodsStealth, long-term infiltrationDestructive attacks
ImpactInformation theftPhysical/economic damage

Key Characteristics:

  • Cyber Spying: State-sponsored, corporate espionage
  • Cyber Terrorism: Ideologically motivated, mass disruption
  • Common Tools: Malware, social engineering, zero-day exploits

Mnemonic: “SPY-TER IGSD” - Intelligence/Government/Stealth/Disruption, Terror/Economic/Rapid/Damage


Question 3(c) OR [7 marks]
#

Explain article section 65 and section 66 of cyber law.

Answer:

IT Act 2008 Sections:

SectionOffensePunishment
Section 65Computer source code tamperingUp to 3 years imprisonment or fine up to ₹2 lakh
Section 66Computer-related offensesUp to 3 years imprisonment or fine up to ₹5 lakh

Section 65 Details:

  • Scope: Knowingly/intentionally concealing, destroying, altering computer source code
  • Intent: When computer source code required to be kept/maintained by law
  • Application: Protects integrity of essential software systems

Section 66 Details:

  • Computer Hacking: Unauthorized access to computer systems
  • Data Theft: Downloading, copying, extracting data dishonestly
  • System Damage: Destroying, deleting, altering information
  • Service Disruption: Denying access to authorized persons

Mnemonic: “65-66 CDHD” - Code tampering, Damage, Hacking, Data theft


Question 4(a) [3 marks]
#

What is Hacking? List out types of Hackers.

Answer:

Hacking Definition: Unauthorized access to computer systems/networks to exploit vulnerabilities.

Hacker Types Table:

TypeMotivationActivity
White HatSecurity improvementEthical penetration testing
Black HatMalicious intentCriminal activities
Grey HatMixed motivesUnauthorized but non-malicious
Script KiddieRecognitionUsing existing tools

Mnemonic: “WBGS Hat” - White, Black, Grey, Script kiddie


Question 4(b) [4 marks]
#

Explain Vulnerability and 0-Day terminology of Hacking.

Answer:

Terminology Table:

TermDefinitionRisk Level
VulnerabilitySecurity weakness that can be exploitedMedium-High
0-Day VulnerabilityUnknown security flawCritical
0-Day ExploitAttack code for 0-day vulnerabilityCritical
0-Day AttackActive exploitation of 0-dayCritical

Key Characteristics:

  • Unknown to Vendors: No patches available
  • High Value: Sold in dark markets
  • Stealthy: Difficult to detect
  • Time-Critical: Value decreases after disclosure

Mnemonic: “0-Day UHST” - Unknown, High-value, Stealthy, Time-critical


Question 4(c) [7 marks]
#

Explain Five Steps of Hacking.

Answer:

Hacking Process Flow:

flowchart TD
    A[Information Gathering] --> B[Scanning]
    B --> C[Gaining Access]
    C --> D[Maintaining Access]
    D --> E[Covering Tracks]

Five Steps Detailed:

StepPurposeTools/Techniques
1. Information GatheringCollect target informationOSINT, Social engineering
2. ScanningIdentify live systems, portsNmap, Port scanners
3. Gaining AccessExploit vulnerabilitiesMetasploit, Custom exploits
4. Maintaining AccessEstablish persistent presenceBackdoors, Rootkits
5. Covering TracksRemove evidenceLog deletion, File cleanup

Each Step Details:

  • Information Gathering: Passive/Active reconnaissance
  • Scanning: Network mapping, vulnerability assessment
  • Gaining Access: Password attacks, buffer overflows
  • Maintaining Access: Privilege escalation, backdoor installation
  • Covering Tracks: Anti-forensics techniques

Mnemonic: “ISGMC” - Information, Scanning, Gaining, Maintaining, Covering


Question 4(a) OR [3 marks]
#

Explain any three basic commands of kali Linux with suitable example.

Answer:

Kali Linux Commands Table:

CommandPurposeExample
nmapNetwork scanningnmap -sS 192.168.1.1
netcatNetwork utilitync -l -p 4444
johnPassword crackingjohn --wordlist=passwords.txt hashes.txt

Command Details:

  • nmap: Stealth SYN scan on target IP
  • netcat: Listen on port 4444 for connections
  • john: Dictionary attack on password hashes

Mnemonic: “NNJ” - Nmap scans, Netcat listens, John cracks


Question 4(b) OR [4 marks]
#

Describe Session Hijacking in detail.

Answer:

Session Hijacking Process:

sequenceDiagram
    participant U as User
    participant A as Attacker
    participant S as Server
    U->>S: 1. Login & Get Session ID
    A->>A: 2. Capture Session ID
    A->>S: 3. Use Stolen Session ID
    S->>A: 4. Grant Access

Types and Methods:

  • Active Hijacking: Attacker actively participates
  • Passive Hijacking: Monitor and capture sessions
  • Network Level: IP spoofing, ARP poisoning
  • Application Level: Session ID prediction, XSS

Prevention Measures:

  • HTTPS: Encrypt session data
  • Session Timeouts: Limit session duration
  • IP Binding: Tie sessions to IP addresses
  • Strong Session IDs: Use unpredictable tokens

Mnemonic: “APNA-HSIS” - Active/Passive/Network/Application, HTTPS/Strong/IP/Session


Question 4(c) OR [7 marks]
#

Explain Remote Administration Tools.

Answer:

RAT Definition: Software allowing remote control of computer systems, often used maliciously.

RAT Functionality Table:

FunctionDescriptionRisk Level
Screen CaptureTake screenshots remotelyMedium
KeyloggingRecord keystrokesHigh
File TransferUpload/download filesHigh
Camera AccessActivate webcam/microphoneCritical

Legitimate vs Malicious Use:

AspectLegitimateMalicious
PurposeIT support, administrationEspionage, theft
ConsentUser aware and consentingInstalled without knowledge
AccessAuthorized personnel onlyUnauthorized attackers

Detection and Prevention:

  • Antivirus: Detect known RAT signatures
  • Network Monitoring: Unusual outbound connections
  • User Education: Avoid suspicious downloads
  • Firewall Rules: Block unauthorized connections

Common RATs:

  • TeamViewer: Legitimate remote access
  • DarkComet: Malicious RAT
  • Poison Ivy: Advanced persistent threat tool

Mnemonic: “RAT SKFC-ANUM” - Screen/Key/File/Camera, Antivirus/Network/User/Monitoring


Question 5(a) [3 marks]
#

Explain Mobile forensics.

Answer:

Mobile Forensics Definition: Process of recovering digital evidence from mobile devices using scientifically accepted methods.

Key Aspects Table:

AspectDescription
Data TypesCall logs, SMS, photos, app data
ChallengesEncryption, anti-forensics, variety of OS
ToolsCellebrite, XRY, Oxygen Suite
LegalChain of custody, court admissibility

Mnemonic: “DCTL” - Data types, Challenges, Tools, Legal requirements


Question 5(b) [4 marks]
#

What is Digital forensics? Write down advantages of Digital forensics.

Answer:

Digital Forensics Definition: Scientific examination of digital devices to recover and analyze evidence for legal proceedings.

Advantages Table:

AdvantageDescription
Evidence RecoveryRetrieve deleted/hidden data
Crime SolvingProvide crucial evidence for cases
Cost EffectiveCheaper than traditional investigation
Accurate ResultsScientific methods ensure reliability

Additional Benefits:

  • Time Efficient: Faster than manual investigation
  • Non-destructive: Preserves original evidence
  • Comprehensive: Analyzes multiple data sources
  • Court Acceptable: Legally admissible evidence

Mnemonic: “ECCA-TNCA” - Evidence/Crime/Cost/Accurate, Time/Non-destructive/Comprehensive/Admissible


Question 5(c) [7 marks]
#

Describe in detail Locard’s Principle of exchange in Digital Forensics.

Answer:

Locard’s Principle: “Every contact leaves a trace” - any interaction between objects results in exchange of materials.

Digital Application:

graph TD
    A[User Action] --> B[Digital Traces]
    B --> C[Log Files]
    B --> D[Registry Entries]
    B --> E[File Metadata]
    B --> F[Network Traffic]

Digital Traces Table:

ActionDigital TraceLocation
File AccessAccess timestampsFile system metadata
Web BrowsingBrowser historyBrowser databases
Email SendingEmail headersMail server logs
USB ConnectionDevice registryWindows registry

Forensic Implications:

  • Persistence: Digital traces often persist longer
  • Accuracy: Precise timestamps and data
  • Volume: Large amounts of trace evidence
  • Recovery: Deleted data can be recovered

Evidence Types:

  • Temporal: When actions occurred
  • Spatial: Where actions took place
  • Relational: Connections between entities
  • Behavioral: Patterns of user activity

Applications:

  • Criminal Cases: Prove presence/actions
  • Civil Litigation: Business disputes
  • Internal Investigations: Employee misconduct
  • Incident Response: Security breach analysis

Mnemonic: “LOCARD PVAR-TREB” - Persistence/Volume/Accuracy/Recovery, Temporal/Relational/Evidence/Behavioral


Question 5(a) OR [3 marks]
#

Explain Network forensics.

Answer:

Network Forensics Definition: Monitoring and analysis of network traffic to gather information and evidence.

Key Components Table:

ComponentFunction
Packet CaptureRecord network traffic
Traffic AnalysisExamine communication patterns
Protocol AnalysisDecode network protocols
Timeline CreationEstablish sequence of events

Mnemonic: “PTTP” - Packet capture, Traffic analysis, Timeline, Protocol analysis


Question 5(b) OR [4 marks]
#

Explain why CCTV plays an important role as evidence in digital forensics investigations.

Answer:

CCTV Evidence Value:

AspectImportance
Visual ProofDirect evidence of events
TimestampPrecise time correlation
Location VerificationProves presence at scene
Behavior AnalysisShows actions and intent

Digital Forensics Integration:

  • Metadata Extraction: Camera settings, timestamps
  • Video Enhancement: Improve image quality
  • Format Analysis: Understand compression artifacts
  • Authentication: Verify video integrity

Legal Considerations:

  • Chain of Custody: Maintain evidence integrity
  • Court Admissibility: Follow legal procedures
  • Privacy Rights: Respect surveillance laws
  • Technical Validation: Prove authenticity

Mnemonic: “VTLB-MFAC” - Visual/Timestamp/Location/Behavior, Metadata/Format/Authentication/Chain


Question 5(c) OR [7 marks]
#

Explain phases of Digital forensic investigation.

Answer:

Digital Forensic Investigation Phases:

flowchart TD
    A[Identification] --> B[Preservation]
    B --> C[Analysis]
    C --> D[Documentation]
    D --> E[Presentation]

Phase Details Table:

PhaseActivitiesTools/Methods
IdentificationLocate potential evidence sourcesInitial assessment, Scene survey
PreservationSecure evidence without alterationImaging, Hash verification
AnalysisExamine evidence for relevant dataForensic software, Manual review
DocumentationRecord findings and proceduresReports, Screenshots, Logs
PresentationPresent findings to stakeholdersCourt testimony, Expert reports

Detailed Activities:

1. Identification Phase:

  • Evidence Sources: Computers, phones, servers, network logs
  • Scope Definition: Determine investigation boundaries
  • Legal Authorization: Obtain warrants/permissions
  • Initial Photography: Document scene condition

2. Preservation Phase:

  • Bit-by-bit Imaging: Create exact copies
  • Hash Calculation: Verify integrity (MD5, SHA)
  • Chain of Custody: Maintain evidence trail
  • Write Protection: Prevent evidence modification

3. Analysis Phase:

  • Data Recovery: Retrieve deleted files
  • Keyword Searching: Find relevant information
  • Timeline Analysis: Reconstruct events
  • Pattern Recognition: Identify suspicious activities

4. Documentation Phase:

  • Methodology Recording: Document procedures used
  • Evidence Cataloging: List all findings
  • Screenshot Capture: Visual evidence documentation
  • Report Preparation: Comprehensive investigation report

5. Presentation Phase:

  • Expert Testimony: Court appearances
  • Visual Aids: Charts, diagrams, demonstrations
  • Technical Translation: Explain complex concepts
  • Cross-examination: Answer defense questions

Quality Assurance:

  • Peer Review: Second examiner verification
  • Tool Validation: Ensure software accuracy
  • Procedure Adherence: Follow standard protocols
  • Continuous Training: Keep skills current

Legal Considerations:

  • Admissibility Rules: Meet court standards
  • Privacy Protection: Respect individual rights
  • International Law: Cross-border investigations
  • Professional Ethics: Maintain objectivity

Mnemonic: “IPADP-ESLR-HTVC-MSCR-ETVI” - Identification/Preservation/Analysis/Documentation/Presentation with detailed sub-activities

Related

Computer Networks & Data Communication (4361101) - Summer 2024 Solution
Study-Material Solutions Computer-Networks 4361101 2024 Summer
Linear Integrated Circuit (4341105) - Winter 2024 Solution
28 mins
Study-Material Solutions Linear-Integrated-Circuit 4341105 2024 Winter
Antenna & Wave Propagation (4341106) - Winter 2024 Solution
21 mins
Study-Material Solutions Antenna Wave-Propagation 4341106 2024 Winter
Electronics Devices & Circuits (1323202) - Winter 2024 Solution
14 mins
Study-Material Solutions Electronics 1323202 2024 Winter
Elements of Electrical & Electronics Engineering (1313202) - Winter 2024 Solution
13 mins
Study-Material Solutions Electrical-Electronics 1313202 2024 Winter
Microprocessor and Microcontroller (4341101) - Winter 2024 Solution
23 mins
Study-Material Solutions Microprocessor 4341101 2024 Winter