Skip to main content
  1. Resources/
  2. Study Materials/
  3. Information & Communication Technology Engineering/
  4. ICT Semester 4/
  5. Cyber Security (4353204)/

Cyber Security (4353204) - Winter 2024 Solution

14 mins· ·
Study-Material Solutions Cyber-Security 4353204 2024 Winter
Milav Dabgar
Author
Milav Dabgar
Experienced lecturer in the electrical and electronic manufacturing industry. Skilled in Embedded Systems, Image Processing, Data Science, MATLAB, Python, STM32. Strong education professional with a Master’s degree in Communication Systems Engineering from L.D. College of Engineering - Ahmedabad.
Table of Contents

Question 1(a) [3 marks]
#

Define cyber security & computer security.

Answer:

  • Cyber Security: Protection of internet-connected systems including hardware, software, and data from cyber threats. It focuses on defending networks, devices, and programs from unauthorized digital attacks.
  • Computer Security: Protection of individual computer systems and data from theft, damage, or unauthorized access. It focuses on safeguarding the physical computer hardware and the software installed on it.

Mnemonic: “Cyber Circles Networks, Computer Covers Machines”

Question 1(b) [4 marks]
#

Explain CIA triad.

Answer: The CIA triad represents the three fundamental principles of information security:

PrincipleDescription
ConfidentialityEnsures that sensitive information is accessible only to authorized parties
IntegrityGuarantees that data remains accurate and unaltered during storage and transmission
AvailabilityEnsures systems and data are accessible when needed by authorized users

Diagram:

graph TD
    A[CIA Triad] --> B[Confidentiality]
    A --> C[Integrity]
    A --> D[Availability]

Mnemonic: “CIA Keeps Information Properly Accessible”

Question 1(c) [7 marks]
#

Define adversary, attack, countermeasure, risk, security policy, system resource, and threat in the context of computer security.

Answer:

TermDefinition
AdversaryIndividual or group that attempts to exploit vulnerabilities for malicious purposes
AttackDeliberate action to compromise security by exploiting vulnerabilities in a system
CountermeasureControls implemented to mitigate or eliminate security vulnerabilities
RiskPotential for loss or damage when a threat exploits a vulnerability
Security PolicyDocumented rules that define acceptable use and protection requirements
System ResourceHardware, software, data, or network components that require protection
ThreatPotential danger that might exploit a vulnerability to breach security

Diagram:

CouAndtveeRrrimsseakarsyureSeVcuulrTnihetrryeaabPtiolliitcyySysteAmttRaecskource

Mnemonic: “ARTSVSC: All Resources Typically Secure Various System Components”

Question 1(c OR) [7 marks]
#

Explain MD5 hashing algorithm.

Answer: MD5 (Message Digest 5) is a widely used cryptographic hash function that produces a 128-bit (16-byte) hash value:

  1. Input Processing: Message is padded and divided into 512-bit blocks
  2. Initialization: Sets up four 32-bit registers with fixed values
  3. Compression: Processes message in 16-word blocks through four rounds of operations
  4. Output: Produces 128-bit digest as final hash value

Diagram:

graph LR
    A[Input Message] --> B[Padding]
    B --> C[Divide into Blocks]
    C --> D[Process Blocks]
    D --> E[Four Processing Rounds]
    E --> F[128-bit Output Hash]

  • Weakness: Not collision-resistant; shouldn’t be used for security-critical applications
  • Usage: File integrity verification and non-security critical applications

Mnemonic: “Pad, Divide, Process, Output - Don’t Use For Security!”

Question 2(a) [3 marks]
#

Define authentication in context of cyber security.

Answer: Authentication is the process of verifying the identity of a user, system, or entity before granting access to resources:

  • Confirms: “You are who you claim to be”
  • Verifies: Identity using credentials (passwords, biometrics, tokens)
  • Precedes: Authorization (what you can access after authentication)

Mnemonic: “Verify Before Entry”

Question 2(b) [4 marks]
#

Explain public key cryptography with example.

Answer: Public key cryptography uses two mathematically related keys for secure communication:

ComponentFunction
Public KeyShared openly and used to encrypt messages
Private KeyKept secret and used to decrypt messages

Example: In RSA encryption, if Alice wants to send Bob a message:

  1. Alice encrypts with Bob’s public key
  2. Only Bob can decrypt using his private key

Diagram:

((RASeleBcinoecdbieevre)r)PuMPberlsiKisvecaaygtKeeeyEDneccrryyppttiioonnCCiipphheerrtteexxtt

Mnemonic: “Public to Lock, Private to Unlock”

Question 2(c) [7 marks]
#

Explain working of packet filter and application proxy.

Answer:

Firewall TypeWorking
Packet FilterExamines packet headers based on predefined rules. Makes decisions based on source/destination IP addresses, ports, and protocols. Works at OSI network and transport layers. Offers high-speed filtering with low resource usage.
Application ProxyActs as intermediary between client and server applications. Processes all traffic at application layer. Creates two connections (client-to-proxy and proxy-to-server). Provides content inspection and user authentication capabilities.

Diagram:

graph LR
    A[Client] --> B[Packet Filter]
    B -->|Allowed Packets| C[Server]
    B -->|Blocked Packets| D[Dropped]

    E[Client] --> F[Application Proxy]
    F -->|New Connection| G[Server]

Mnemonic: “Packets Check Headers, Proxies Check Content”

Question 2(a OR) [3 marks]
#

Explain multi-factor authentication.

Answer: Multi-factor authentication (MFA) requires users to provide two or more verification factors to gain access to a resource:

  • Something you know: Password, PIN, security question
  • Something you have: Mobile phone, smart card, security token
  • Something you are: Fingerprint, facial recognition, voice pattern

Mnemonic: “Know, Have, Are - Triple Security”

Question 2(b OR) [4 marks]
#

Explain the process of password verification.

Answer: Password verification is the process of authenticating user credentials against stored values:

  1. User Input: User enters username and password
  2. Hash Generation: System hashes the entered password
  3. Comparison: Hash is compared with stored hash in database
  4. Access Decision: Access granted if hashes match, denied if not

Diagram:

flowchart LR
    A[User Input] --> B[Hash Function]
    B --> C[Compare Hashes]
    D[Stored Hash] --> C
    C --> E{Match?}
    E --> |Yes| F[Access Granted]
    E --> |No| G[Access Denied]

Mnemonic: “Enter, Hash, Compare, Decide”

Question 2(c OR) [7 marks]
#

List out malicious software and explain any three malicious software attacks.

Answer:

Malicious Software Types:

  • Viruses, Worms, Trojans, Ransomware, Spyware, Adware, Rootkits, Keyloggers, Bots

Three Common Attacks:

Attack TypeExplanation
RansomwareEncrypts victim’s files and demands payment for decryption key. Spreads through phishing emails, malicious downloads, or exploiting vulnerabilities. Example: WannaCry.
TrojansDisguised as legitimate software but performs malicious actions. Creates backdoors for attackers to access systems. Example: Remote Access Trojans (RATs).
SpywareCollects user information without consent. Monitors activities, keystrokes, and browsing habits. Can steal passwords and financial information.

Mnemonic: “RTS: Ransom Takes Systems, Trojans Sneak In, Spyware Steals Info”

Question 3(a) [3 marks]
#

Explain the importance of ports in cyber security.

Answer: Ports are virtual endpoints for network communications that:

  • Identify Services: Each service uses specific port numbers (HTTP:80, HTTPS:443)
  • Enable Filtering: Firewalls control traffic by allowing/blocking specific ports
  • Reduce Attack Surface: Closing unnecessary ports enhances security

Mnemonic: “Every Port Is An Entry Point”

Question 3(b) [4 marks]
#

Explain Virtual private network.

Answer: A Virtual Private Network (VPN) is a technology that:

FeatureDescription
Encrypted TunnelCreates secure connection over public networks
IP MaskingHides user’s IP address and location
Data ProtectionEncrypts data during transmission
Remote AccessEnables secure connection to private networks

Diagram:

PDuUebsvleiircceIPE=n=c=r=y=Ip=nt=te=ed=r=nT=eu=tn=n=e=l=PrPNirevitavwtaoetrekIP

Mnemonic: “Tunnel, Encrypt, Protect, Connect”

Question 3(c) [7 marks]
#

Explain the impact of web security threats.

Answer: Web security threats have significant impacts on organizations and individuals:

ImpactDescription
Data BreachesExposure of sensitive information leading to financial losses and reputation damage
Financial LossDirect monetary theft, fraud, recovery costs, and regulatory fines
Operational DisruptionSystem downtime affecting business continuity and customer service
Reputation DamageLoss of customer trust and brand value after security incidents
Legal ConsequencesLitigation, regulatory penalties, and compliance violations

Diagram:

graph TD
    A[Web Security Threats] --> B[Data Breaches]
    A --> C[Financial Loss]
    A --> D[Operational Disruption]
    A --> E[Reputation Damage]
    A --> F[Legal Consequences]

Mnemonic: “DFROL: Data, Finances, Resources, Opinion, Legal”

Question 3(a OR) [3 marks]
#

Explain working of digital signature.

Answer: Digital signatures authenticate electronic documents and verify their integrity:

  1. Hash Creation: Document is hashed to create a unique digest
  2. Encryption: Sender encrypts the hash using their private key
  3. Verification: Recipient decrypts using sender’s public key
  4. Validation: Comparing decrypted hash with newly generated hash

Mnemonic: “Hash, Sign, Send, Verify”

Question 3(b OR) [4 marks]
#

Describe HTTPS.

Answer: HTTPS (Hypertext Transfer Protocol Secure) is a secure version of HTTP:

FeatureDescription
TLS/SSLUses Transport Layer Security to encrypt data
AuthenticationVerifies website identity through certificates
Data IntegrityPrevents tampering of transmitted data
Port 443Uses default port 443 instead of HTTP’s port 80

Diagram:

graph LR
    A[Browser] -->|Encrypted Data| B[TLS/SSL Layer]
    B -->|Secure Connection| C[Web Server]
    D[Certificate Authority] -->|Validates| B

Mnemonic: “Secured Pages Show Padlock”

Question 3(c OR) [7 marks]
#

Explain social engineering, vishing and machine in the middle attack.

Answer:

Attack TypeExplanation
Social EngineeringPsychological manipulation to trick users into revealing sensitive information. Exploits human trust rather than technical vulnerabilities. Common techniques include pretexting, baiting, and phishing.
VishingVoice phishing using phone calls to steal information. Attackers impersonate legitimate organizations. Often uses urgency or fear to manipulate victims.
Machine in the MiddleAttacker secretly intercepts and relays communication between two parties. Victims believe they’re communicating directly with each other. Allows attackers to steal/modify sensitive information during transmission.

Diagram:

TtthaoAillnkBMAikioacsnbceghineintheMeiaxdlcdHSlhlaeaeMcednksagAetetradtackttoTahlAiklBBniiokncbsge

Mnemonic: “SEVeM: Social Engineers Voice Messages and Mediate connections”

Question 4(a) [3 marks]
#

Match the following.

Answer:

Column AColumn B
1. Denial of Service (DoS)f. Attack that disrupts network services
2. Port 443c. Default port for HTTPS
3. Secure Socket Layer (SSL)e. Predecessor of TLS for secure communication
4. Port 80b. Default port for HTTP
5. Integritya. Ensures data is not altered during transmission
6. VPN (Virtual Private Network)d. Creates a secure connection over the internet

Mnemonic: “Disrupt HTTPS, Secure HTTP, Intact VPN”

Question 4(b) [4 marks]
#

List out types of hackers and explain role of each.

Answer:

Hacker TypeRole
White HatEthical hackers who test systems with permission to improve security
Black HatMalicious hackers who exploit vulnerabilities for personal gain or damage
Gray HatOperate between ethical and malicious; may hack without permission but disclose findings
Script KiddiesInexperienced hackers using pre-written scripts without understanding the technology

Diagram:

graph TD
    A[Hacker Types] --> B[White Hat: Protect]
    A --> C[Black Hat: Attack]
    A --> D[Gray Hat: Mixed]
    A --> E[Script Kiddie: Amateur]

Mnemonic: “White Protects, Black Attacks, Gray Mixes, Kids Script”

Question 4(c) [7 marks]
#

Explain SSH (Secure shell) protocol stack.

Answer: SSH (Secure Shell) protocol stack provides secure remote access and file transfers:

LayerFunction
Transport LayerHandles encryption, server authentication, and data integrity
User Authentication LayerVerifies client identity using passwords, keys, or certificates
Connection LayerManages multiple channels within a single SSH connection

Key Features:

  • Strong encryption (AES, 3DES)
  • Public key authentication
  • Data integrity checking
  • Port forwarding and tunneling

Diagram:

graph TD
    A[SSH Protocol Stack] --> B[Transport Layer]
    A --> C[User Authentication Layer]
    A --> D[Connection Layer]
    B --> E[Encryption & Server Authentication]
    C --> F[Client Identity Verification]
    D --> G[Channel Management]

Mnemonic: “Transport Secures, Users Authenticate, Connections Multiplex”

Question 4(a OR) [3 marks]
#

Explain foot printing in ethical hacking.

Answer: Footprinting is the first phase of ethical hacking where information is gathered about the target:

  • Purpose: Collecting data about network, systems, and organization
  • Methods: WHOIS lookup, DNS analysis, social media research
  • Outcomes: Identifying potential entry points and vulnerabilities

Mnemonic: “Gather Before Attack”

Question 4(b OR) [4 marks]
#

Explain scanning in ethical hacking.

Answer: Scanning is the process of actively probing a target system to identify live hosts, open ports, and services:

TechniquePurpose
Port ScanningIdentifies open ports and running services
Vulnerability ScanningDetects known security weaknesses
Network MappingDiscovers network topology and devices
OS FingerprintingDetermines operating system versions

Diagram:

VuOPlSpSonceAeteancrerntvnanPiitbeovciirreealtslisties--PRreopbley---->-Target

Mnemonic: “PONS: Ports Open, Network Services”

Question 4(c OR) [7 marks]
#

Describe injection attack and phishing attack.

Answer:

Attack TypeDescription
Injection AttackInserts malicious code into vulnerable applications. Common types include SQL injection, command injection, and XSS. Exploits poor input validation. Can lead to data theft, modification, or destruction. Prevented through input sanitization and parameterized queries.
Phishing AttackSocial engineering attack using fake websites/emails. Attempts to steal credentials, financial information, or install malware. Often mimics trusted organizations. Contains urgent call-to-action to create panic. Prevented through education, email filtering, and multi-factor authentication.

Diagram:

graph TD
    A[Injection Attack] --> B[Input Vulnerable Application]
    B --> C[Execute Malicious Code]
    C --> D[Access Database/System]

    E[Phishing Attack] --> F[Send Fraudulent Message]
    F --> G[User Clicks Malicious Link]
    G --> H[Steal Credentials/Data]

Mnemonic: “Inject Code, Phish People”

Question 5(a) [3 marks]
#

Explain disk forensics.

Answer: Disk forensics is the examination of storage media to recover, analyze, and preserve digital evidence:

  • Purpose: Recover deleted files, analyze file systems, and establish timelines
  • Methods: Bit-by-bit imaging, hash verification, and specialized tools
  • Applications: Criminal investigations, corporate security incidents, data recovery

Mnemonic: “Recover, Analyze, Present”

Question 5(b) [4 marks]
#

Explain password cracking methods.

Answer:

MethodDescription
Brute ForceTries all possible character combinations systematically
Dictionary AttackUses list of common words and variations
Rainbow TablePre-computed tables of password hashes for quick lookup
Social EngineeringManipulates users to reveal passwords

Diagram:

graph TD
    A[Password Cracking] --> B[Brute Force]
    A --> C[Dictionary Attack]
    A --> D[Rainbow Table]
    A --> E[Social Engineering]

Mnemonic: “BDRS: Brute Dictionary Rainbow Social”

Question 5(c) [7 marks]
#

Describe Remote Administration Tool (RAT).

Answer: A Remote Administration Tool (RAT) is software that enables remote control of a computer system:

AspectDescription
FunctionalityProvides complete control over target system including file access, screen viewing, and keylogging
DeploymentOften installed through phishing, bundled with legitimate software, or via exploited vulnerabilities
ArchitectureClient-server model where server runs on victim’s machine and client is controlled by attacker
Legitimate UsesIT support, remote work, and system administration
Malicious UsesUnauthorized surveillance, data theft, and sabotage

Diagram:

(CRFVoAiWKSimTleeccpebyrtuScbeiteSaoemerymanrvsretdre)mCDoanttarol(ACRtoAtmTapcuCktleeirrent)

Mnemonic: “RCASD: Remote Control Access Steals Data”

Question 5(a OR) [3 marks]
#

List out challenges of cybercrime.

Answer: Major challenges in combating cybercrime include:

  • Jurisdiction Issues: Crimes crossing international boundaries
  • Technical Complexity: Constantly evolving attack methods
  • Attribution Problems: Difficulty identifying perpetrators
  • Evidence Collection: Volatile and easily altered digital evidence

Mnemonic: “JTAE: Jurisdictions, Technology, Attribution, Evidence”

Question 5(b OR) [4 marks]
#

Explain mobile forensics.

Answer: Mobile forensics is the science of recovering digital evidence from mobile devices:

AspectDescription
Data TypesCall logs, messages, location data, photos, app data
ChallengesEncryption, diverse operating systems, anti-forensic techniques
MethodsPhysical extraction, logical acquisition, file system analysis
ToolsCellebrite UFED, Oxygen Forensic, Magnet AXIOM

Diagram:

graph LR
    A[Mobile Device] --> B[Data Acquisition]
    B --> C[Data Analysis]
    C --> D[Evidence Reporting]

Mnemonic: “GEAR: Get Evidence, Analyze, Report”

Question 5(c OR) [7 marks]
#

Explain Salami Attack, Web Jacking, Data diddling and Ransomware attack.

Answer:

Attack TypeDescription
Salami AttackSeries of minor theft actions that go unnoticed individually. Often involves modifying financial transactions by taking small amounts. Cumulative effect can be significant over time. Example: Rounding bank transactions and collecting fractions.
Web JackingHijacking a website by changing its content or redirecting to fake site. Involves domain theft or DNS manipulation. Used for distributing malware or collecting sensitive information.
Data DiddlingUnauthorized modification of data before/during input to system. Changes are typically small and hard to detect. Affects data integrity and can lead to wrong business decisions.
RansomwareMalware that encrypts victim’s files and demands payment for decryption. Typically spreads through phishing or exploiting vulnerabilities. Notable examples include WannaCry and Ryuk.

Diagram:

graph TD
    A[Attack Types] --> B[Salami: Small Thefts]
    A --> C[Web Jacking: Site Hijacking]
    A --> D[Data Diddling: Alter Input]
    A --> E[Ransomware: Encrypt & Extort]

Mnemonic: “SWDR: Small slices, Websites hijacked, Data altered, Ransom demanded”

Related

Cyber Security (4353204) - Winter 2024 Short Solution
10 mins
Study-Material Solutions Cyber-Security 4353204 2024 Winter
Digital & Data Communication (4343201) - Winter 2024 Solution
25 mins
Study-Material Solutions Digital-Communication 4343201 2024 Winter
Digital Communication (4341102) - Winter 2024 Solution
22 mins
Study-Material Solutions Digital-Communication 4341102 2024 Winter
Java Programming (4343203) - Winter 2024 Solution
27 mins
Study-Material Solutions Java-Programming 4343203 2024 Winter
Communication Engineering (1333201) - Winter 2024 Solution
23 mins
Study-Material Solutions Communication-Engineering 1333201 2024 Winter
Linear Integrated Circuit (4341105) - Winter 2024 Solution
28 mins
Study-Material Solutions Linear-Integrated-Circuit 4341105 2024 Winter