Skip to main content
  1. Resources/
  2. Study Materials/
  3. Information & Communication Technology Engineering/
  4. ICT Semester 4/
  5. Cyber Security (4353204)/

Cyber Security (4353204) - Winter 2024 Short Solution

10 mins· ·
Study-Material Solutions Cyber-Security 4353204 2024 Winter
Milav Dabgar
Author
Milav Dabgar
Experienced lecturer in the electrical and electronic manufacturing industry. Skilled in Embedded Systems, Image Processing, Data Science, MATLAB, Python, STM32. Strong education professional with a Master’s degree in Communication Systems Engineering from L.D. College of Engineering - Ahmedabad.
Table of Contents

Question 1(a) [3 marks]
#

Define cyber security & computer security.

Answer:

TermDefinition
Cyber SecurityProtection of internet-connected systems including hardware, software, and data from cyber attacks
Computer SecurityProtection of computer systems from theft or damage to hardware, software, or data

Mnemonic: “Cyber Connects, Computer Contains” - Cyber security protects connected systems, computer security protects contained systems.

Question 1(b) [4 marks]
#

Explain CIA triad.

Answer:

Table: CIA Triad Components

ComponentDescription
ConfidentialityEnsures that information is not disclosed to unauthorized individuals or systems
IntegrityMaintains consistency, accuracy, and trustworthiness of data throughout its lifecycle
AvailabilityEnsures that information and resources are accessible to authorized users when needed
graph TD
    A[CIA Triad] --> B[Confidentiality]
    A --> C[Integrity]
    A --> D[Availability]

Mnemonic: “CIA Keeps Information Safe” - Confidentiality, Integrity, and Availability are the three key security principles.

Question 1(c) [7 marks]
#

Define adversary, attack, countermeasure, risk, security policy, system resource, and threat in the context of computer security.

Answer:

Table: Key Computer Security Concepts

TermDefinition
AdversaryIndividual or group that attempts to compromise security
AttackDeliberate action to exploit vulnerabilities in a system
CountermeasureAction or technique that reduces a threat or vulnerability
RiskPotential for loss or damage when a threat exploits a vulnerability
Security PolicyRules that define acceptable use and protection of resources
System ResourceAny component (hardware/software/data) that needs protection
ThreatPotential danger that might exploit a vulnerability

Mnemonic: “ARTISTS Create Security Problems” - Adversary, Risk, Threat, Integrity, System Resource, Threat, Security Policy.

Question 1(c OR) [7 marks]
#

Explain MD5 hashing algorithm.

Answer:

MD5 Hashing Process

StepDescription
Step 1Padding the message to ensure length is divisible by 512
Step 2Dividing message into 512-bit blocks
Step 3Initializing 4 registers (A, B, C, D) with predefined values
Step 4Processing each block through 4 rounds of operations
Step 5Producing a 128-bit (16-byte) hash value as output
MD5(message) → 128-bit hash value regardless of input size

Mnemonic: “Padding Divides Initial Processing Output” - Padding, Division, Initialization, Processing, Output.

Question 2(a) [3 marks]
#

Define authentication in context of cyber security.

Answer:

Authentication is the process of verifying the identity of a user, system, or entity trying to access a resource. It confirms “you are who you say you are” through factors like:

Authentication Factors
Something you know (password)
Something you have (card)
Something you are (biometrics)

Mnemonic: “Know, Have, Are” - the three basic authentication factors.

Question 2(b) [4 marks]
#

Explain public key cryptography with example.

Answer:

Public Key Cryptography Process

ComponentDescription
Public KeyShared openly, used to encrypt data
Private KeyKept secret, used to decrypt data
ExampleAlice encrypts message with Bob’s public key → Only Bob can decrypt with his private key
sequenceDiagram
    Alice->>Bob: Encrypt with Bob's Public Key
    Bob->>Alice: Decrypt with Bob's Private Key

Mnemonic: “Public Protects, Private Proves” - Public key encrypts, private key decrypts.

Question 2(c) [7 marks]
#

Explain working of packet filter and application proxy.

Answer:

Table: Packet Filter vs Application Proxy

FeaturePacket FilterApplication Proxy
LayerNetwork layerApplication layer
InspectionIP headers, portsContent analysis
OperationAllows/blocks packets based on rulesActs as intermediary between client and server
PerformanceFaster, less resource-intensiveSlower, more resource-intensive
Security LevelLower, header-based analysisHigher, content-based analysis

Mnemonic: “PATCH” - Packet filters Address Traffic, Content proxies Handle applications.

Question 2(a OR) [3 marks]
#

Explain multi-factor authentication

Answer:

Multi-factor authentication (MFA) combines two or more independent credentials:

Authentication Factor Types
Knowledge factor (password)
Possession factor (security token)
Inherence factor (biometric)
Location factor (geolocation)

Mnemonic: “Multiple Keys Secure Best” - Multiple verification factors provide better security.

Question 2(b OR) [4 marks]
#

Explain the process of password verification.

Answer:

Password Verification Process

StepDescription
InputUser enters username and password
HashSystem hashes the entered password
CompareSystem compares hash with stored hash
ResultGrant or deny access based on match
flowchart LR
    A[Enter Password] --> B[Hash Input]
    B --> C[Compare with Stored Hash]
    C --> D{Match?}
    D -->|Yes| E[Grant Access]
    D -->|No| F[Deny Access]

Mnemonic: “HICS” - Hash, Input, Compare, Success/Stop.

Question 2(c OR) [7 marks]
#

List out malicious software and explain any three malicious software attacks.

Answer:

Types of Malicious Software

TypeDescription
VirusSelf-replicating code that attaches to legitimate programs
WormSelf-propagating malware that spreads through networks
TrojanDisguises as legitimate software but contains malicious code
RansomwareEncrypts victim’s files and demands payment for decryption
SpywareCollects information without user’s knowledge
AdwareDisplays unwanted advertisements
RootkitProvides persistent privileged access to a computer

Mnemonic: “VWTR-SAR” - Viruses, Worms, Trojans, Ransomware, Spyware, Adware, Rootkits attack your system.

Question 3(a) [3 marks]
#

Explain the importance of ports in cyber security.

Answer:

Ports in Cyber Security

AspectImportance
Access ControlControlling which services are accessible
Attack SurfaceFewer open ports mean smaller attack surface
Service IdentificationHelps identify running services (e.g., HTTP:80, HTTPS:443)

Mnemonic: “SAP” - Security requires controlling Access to Ports.

Question 3(b) [4 marks]
#

Explain Virtual private network.

Answer:

Virtual Private Network (VPN)

FeatureDescription
EncryptionEncrypts data in transit between client and server
TunnelingCreates secure connection through public networks
PrivacyMasks user’s IP address and location
SecurityProtects data from interception on public networks
graph LR
    A[User] -->|Encrypted Tunnel| B[VPN Server]
    B -->|Secure Access| C[Internet]

Mnemonic: “PETS” - Private Encrypted Tunnels Secure data.

Question 3(c) [7 marks]
#

Explain the impact of web security threats.

Answer:

Impact of Web Security Threats

ThreatImpact
Data BreachExposure of sensitive user information
Financial LossDirect monetary damages and recovery costs
Reputational DamageLoss of customer trust and brand value
Regulatory PenaltiesFines for non-compliance with security standards
Service DisruptionWebsite downtime and business interruption

Mnemonic: “DFRS” - Data breaches lead to Financial loss, Reputation damage, and Service disruption.

Question 3(a OR) [3 marks]
#

Explain working of digital signature.

Answer:

Digital Signature Process

StepDescription
HashCreate hash of the document
EncryptEncrypt hash with sender’s private key
AttachAttach encrypted hash to document
VerifyRecipient decrypts with sender’s public key and compares hashes
flowchart LR
    A[Document] --> B[Hash Document]
    B --> C[Encrypt Hash with Private Key]
    C --> D[Digital Signature]

Mnemonic: “HEAV” - Hash, Encrypt, Attach, Verify for digital signatures.

Question 3(b OR) [4 marks]
#

Describe HTTPS.

Answer:

HTTPS (Hypertext Transfer Protocol Secure)

FeatureDescription
EncryptionUses SSL/TLS to encrypt communications
AuthenticityVerifies identity of the website via certificates
IntegrityEnsures data hasn’t been modified in transit
PortUses port 443 (vs HTTP’s port 80)

Mnemonic: “EAIP” - Encryption, Authenticity, Integrity, Port 443.

Question 3(c OR) [7 marks]
#

Explain social engineering, vishing and machine in the middle attack.

Answer:

Table: Attack Types and Characteristics

Attack TypeDescriptionExample
Social EngineeringManipulates people into revealing informationPretending to be IT support to get passwords
VishingVoice phishing using phone calls to trick victimsCaller claims to be from bank requesting account details
Machine in the MiddleIntercepts communication between two partiesAttacker intercepts traffic between user and website
sequenceDiagram
    User->>Attacker: Data (thinking it's the server)
    Attacker->>Server: Data (posing as the user)
    Server->>Attacker: Response
    Attacker->>User: Modified Response

Mnemonic: “SVM” - Social engineering uses Voice calls and Machines in the middle to steal data.

Question 4(a) [3 marks]
#

Match the following.

Answer:

Correct Matches

Column AColumn B
1. Denial of Service (DoS)f. Attack that disrupts network services
2. Port 443c. Default port for HTTPS
3. Secure Socket Layer (SSL)e. Predecessor of TLS for secure communication
4. Port 80b. Default port for HTTP
5. Integritya. Ensures data is not altered during transmission
6. VPN (Virtual Private Network)d. Creates a secure connection over the internet

Mnemonic: “DOS Protects Security Information Very Carefully” - DOS, Port 443, SSL, Port 80, Integrity, VPN.

Question 4(b) [4 marks]
#

List out types of hackers and explain role of each.

Answer:

Types of Hackers

TypeRole/Motivation
White HatEthical hackers who find vulnerabilities to improve security
Black HatMalicious hackers who exploit systems for personal gain
Grey HatOperate between ethical and malicious without permission
Script KiddieUnskilled individuals using existing tools without understanding

Mnemonic: “WBGS” - White, Black, Grey hackers and Script kiddies have different aims.

Question 4(c) [7 marks]
#

Explain SSH (Secure shell) protocol stack.

Answer:

SSH Protocol Stack

LayerFunction
Transport LayerProvides encryption, authentication, integrity
User Authentication LayerVerifies user identity to the server
Connection LayerManages multiple channels within a single SSH connection
ApplicationsTerminal sessions, file transfers, port forwarding
Application -> Connection -> Authentication -> Transport -> Network

Mnemonic: “TUCAN” - Transport, User authentication, Connection layer, and Applications on Network.

Question 4(a OR) [3 marks]
#

Explain foot printing in ethical hacking.

Answer:

Foot printing is the initial reconnaissance phase where hackers gather information about target systems.

MethodInformation Gathered
PassivePublic records, websites, social media
ActiveNetwork scanning, DNS queries
PurposeMap attack surface and identify vulnerabilities

Mnemonic: “PAM” - Passive and Active Methods reveal information.

Question 4(b OR) [4 marks]
#

Explain scanning in ethical hacking.

Answer:

Scanning in Ethical Hacking

Scanning TypePurpose
Port ScanningIdentify open ports and services
Vulnerability ScanningDetect known security weaknesses
Network ScanningMap network topology and hosts
OS FingerprintingDetermine operating systems in use
flowchart LR
    A[Footprinting] --> B[Scanning]
    B --> C[Enumeration]
    C --> D[Exploitation]

Mnemonic: “PVNO” - Ports, Vulnerabilities, Networks, and OS identification.

Question 4(c OR) [7 marks]
#

Describe injection attack and phishing attack.

Answer:

Table: Injection vs Phishing Attacks

FeatureInjection AttackPhishing Attack
TargetApplication codeHuman users
MethodInsert malicious code into input fieldsImpersonate trusted entities
ExampleSQL injection: ' OR 1=1 --Fake login page resembling bank website
PreventionInput validation, parameterized queriesUser education, email filters
ImpactData theft, authentication bypassCredential theft, malware installation

Mnemonic: “TIP” - Technical attacks use Injection, People-focused attacks use Phishing.

Question 5(a) [3 marks]
#

Explain disk forensics.

Answer:

Disk Forensics

AspectDescription
PurposeRecovery and analysis of data from storage devices
ProcessCreate disk image, analyze without modifying original
FocusRecover deleted files, analyze file systems, find evidence

Mnemonic: “IPF” - Image creation, Preservation, and Forensic analysis.

Question 5(b) [4 marks]
#

Explain password cracking methods.

Answer:

Password Cracking Methods

MethodDescription
Dictionary AttackTry common words and variations
Brute ForceTry all possible character combinations
Rainbow TableUse precomputed hash tables
Social EngineeringManipulate users to reveal passwords

Mnemonic: “DBRS” - Dictionary, Brute force, Rainbow tables, and Social engineering break passwords.

Question 5(c) [7 marks]
#

Describe Remote Administration Tool (RAT).

Answer:

Remote Administration Tool (RAT)

FeatureDescription
FunctionalityProvides complete control over target system
ComponentsClient (attacker) and server (victim) components
CapabilitiesFile access, keylogging, screen capture, microphone/camera control
DeliveryOften distributed via phishing, infected software
Legitimate UseIT support and remote assistance
Malicious UseUnauthorized access and data theft
flowchart LR
    A[Attacker with Client] <-->|Control Commands| B[Victim with Server]
    B -->|Data/Information| A

Mnemonic: “FCDLM” - Full Control provides Data access through Legitimate or Malicious means.

Question 5(a OR) [3 marks]
#

List out challenges of cybercrime.

Answer:

Cybercrime Challenges

ChallengeDescription
JurisdictionCrimes cross national boundaries
AttributionDifficult to identify perpetrators
Evidence CollectionDigital evidence is volatile and easily altered
Rapid EvolutionTechniques constantly change and adapt

Mnemonic: “JAER” - Jurisdiction, Attribution, Evidence, and Rapid evolution.

Question 5(b OR) [4 marks]
#

Explain mobile forensics.

Answer:

Mobile Forensics

AspectDescription
ScopeExtracting data from mobile devices (calls, messages, location)
ChallengesDevice locks, encryption, cloud storage, frequent updates
MethodsPhysical acquisition, logical acquisition, file system acquisition
ToolsSpecialized hardware and software for data extraction

Mnemonic: “SCMT” - Scope, Challenges, Methods, and Tools for mobile forensics.

Question 5(c OR) [7 marks]
#

Explain Salami Attack, Web Jacking, Data diddling and Ransomware attack.

Answer:

Table: Types of Cyber Attacks

Attack TypeDescriptionExample
Salami AttackSmall, unnoticeable thefts over timeTaking tiny amounts from many bank accounts
Web JackingHijacking a website by taking control of URLRedirecting users to fake site by changing domain
Data DiddlingAltering data before processingChanging prices in inventory system
RansomwareEncrypts files and demands payment for keyEncrypting hospital records and demanding bitcoin

Mnemonic: “SWDR” - Salami slices, Web control, Data changes, and Ransom demands are different attack methods.

Related

Cyber Security (4353204) - Winter 2024 Solution
14 mins
Study-Material Solutions Cyber-Security 4353204 2024 Winter
Digital & Data Communication (4343201) - Winter 2024 Solution
25 mins
Study-Material Solutions Digital-Communication 4343201 2024 Winter
Digital Communication (4341102) - Winter 2024 Solution
22 mins
Study-Material Solutions Digital-Communication 4341102 2024 Winter
Java Programming (4343203) - Winter 2024 Solution
27 mins
Study-Material Solutions Java-Programming 4343203 2024 Winter
Communication Engineering (1333201) - Winter 2024 Solution
23 mins
Study-Material Solutions Communication-Engineering 1333201 2024 Winter
Linear Integrated Circuit (4341105) - Winter 2024 Solution
28 mins
Study-Material Solutions Linear-Integrated-Circuit 4341105 2024 Winter