Question 1(a) [3 marks]#
Define cyber security & computer security.
Answer:
| Term | Definition |
|---|---|
| Cyber Security | Protection of internet-connected systems including hardware, software, and data from cyber attacks |
| Computer Security | Protection of computer systems from theft or damage to hardware, software, or data |
Mnemonic: “Cyber Connects, Computer Contains” - Cyber security protects connected systems, computer security protects contained systems.
Question 1(b) [4 marks]#
Explain CIA triad.
Answer:
Table: CIA Triad Components
| Component | Description |
|---|---|
| Confidentiality | Ensures that information is not disclosed to unauthorized individuals or systems |
| Integrity | Maintains consistency, accuracy, and trustworthiness of data throughout its lifecycle |
| Availability | Ensures that information and resources are accessible to authorized users when needed |
graph TD
A[CIA Triad] --> B[Confidentiality]
A --> C[Integrity]
A --> D[Availability]
Mnemonic: “CIA Keeps Information Safe” - Confidentiality, Integrity, and Availability are the three key security principles.
Question 1(c) [7 marks]#
Define adversary, attack, countermeasure, risk, security policy, system resource, and threat in the context of computer security.
Answer:
Table: Key Computer Security Concepts
| Term | Definition |
|---|---|
| Adversary | Individual or group that attempts to compromise security |
| Attack | Deliberate action to exploit vulnerabilities in a system |
| Countermeasure | Action or technique that reduces a threat or vulnerability |
| Risk | Potential for loss or damage when a threat exploits a vulnerability |
| Security Policy | Rules that define acceptable use and protection of resources |
| System Resource | Any component (hardware/software/data) that needs protection |
| Threat | Potential danger that might exploit a vulnerability |
Mnemonic: “ARTISTS Create Security Problems” - Adversary, Risk, Threat, Integrity, System Resource, Threat, Security Policy.
Question 1(c OR) [7 marks]#
Explain MD5 hashing algorithm.
Answer:
MD5 Hashing Process
| Step | Description |
|---|---|
| Step 1 | Padding the message to ensure length is divisible by 512 |
| Step 2 | Dividing message into 512-bit blocks |
| Step 3 | Initializing 4 registers (A, B, C, D) with predefined values |
| Step 4 | Processing each block through 4 rounds of operations |
| Step 5 | Producing a 128-bit (16-byte) hash value as output |
MD5(message) → 128-bit hash value regardless of input size
Mnemonic: “Padding Divides Initial Processing Output” - Padding, Division, Initialization, Processing, Output.
Question 2(a) [3 marks]#
Define authentication in context of cyber security.
Answer:
Authentication is the process of verifying the identity of a user, system, or entity trying to access a resource. It confirms “you are who you say you are” through factors like:
| Authentication Factors |
|---|
| Something you know (password) |
| Something you have (card) |
| Something you are (biometrics) |
Mnemonic: “Know, Have, Are” - the three basic authentication factors.
Question 2(b) [4 marks]#
Explain public key cryptography with example.
Answer:
Public Key Cryptography Process
| Component | Description |
|---|---|
| Public Key | Shared openly, used to encrypt data |
| Private Key | Kept secret, used to decrypt data |
| Example | Alice encrypts message with Bob’s public key → Only Bob can decrypt with his private key |
sequenceDiagram
Alice->>Bob: Encrypt with Bob's Public Key
Bob->>Alice: Decrypt with Bob's Private Key
Mnemonic: “Public Protects, Private Proves” - Public key encrypts, private key decrypts.
Question 2(c) [7 marks]#
Explain working of packet filter and application proxy.
Answer:
Table: Packet Filter vs Application Proxy
| Feature | Packet Filter | Application Proxy |
|---|---|---|
| Layer | Network layer | Application layer |
| Inspection | IP headers, ports | Content analysis |
| Operation | Allows/blocks packets based on rules | Acts as intermediary between client and server |
| Performance | Faster, less resource-intensive | Slower, more resource-intensive |
| Security Level | Lower, header-based analysis | Higher, content-based analysis |
Mnemonic: “PATCH” - Packet filters Address Traffic, Content proxies Handle applications.
Question 2(a OR) [3 marks]#
Explain multi-factor authentication
Answer:
Multi-factor authentication (MFA) combines two or more independent credentials:
| Authentication Factor Types |
|---|
| Knowledge factor (password) |
| Possession factor (security token) |
| Inherence factor (biometric) |
| Location factor (geolocation) |
Mnemonic: “Multiple Keys Secure Best” - Multiple verification factors provide better security.
Question 2(b OR) [4 marks]#
Explain the process of password verification.
Answer:
Password Verification Process
| Step | Description |
|---|---|
| Input | User enters username and password |
| Hash | System hashes the entered password |
| Compare | System compares hash with stored hash |
| Result | Grant or deny access based on match |
flowchart LR
A[Enter Password] --> B[Hash Input]
B --> C[Compare with Stored Hash]
C --> D{Match?}
D -->|Yes| E[Grant Access]
D -->|No| F[Deny Access]
Mnemonic: “HICS” - Hash, Input, Compare, Success/Stop.
Question 2(c OR) [7 marks]#
List out malicious software and explain any three malicious software attacks.
Answer:
Types of Malicious Software
| Type | Description |
|---|---|
| Virus | Self-replicating code that attaches to legitimate programs |
| Worm | Self-propagating malware that spreads through networks |
| Trojan | Disguises as legitimate software but contains malicious code |
| Ransomware | Encrypts victim’s files and demands payment for decryption |
| Spyware | Collects information without user’s knowledge |
| Adware | Displays unwanted advertisements |
| Rootkit | Provides persistent privileged access to a computer |
Mnemonic: “VWTR-SAR” - Viruses, Worms, Trojans, Ransomware, Spyware, Adware, Rootkits attack your system.
Question 3(a) [3 marks]#
Explain the importance of ports in cyber security.
Answer:
Ports in Cyber Security
| Aspect | Importance |
|---|---|
| Access Control | Controlling which services are accessible |
| Attack Surface | Fewer open ports mean smaller attack surface |
| Service Identification | Helps identify running services (e.g., HTTP:80, HTTPS:443) |
Mnemonic: “SAP” - Security requires controlling Access to Ports.
Question 3(b) [4 marks]#
Explain Virtual private network.
Answer:
Virtual Private Network (VPN)
| Feature | Description |
|---|---|
| Encryption | Encrypts data in transit between client and server |
| Tunneling | Creates secure connection through public networks |
| Privacy | Masks user’s IP address and location |
| Security | Protects data from interception on public networks |
graph LR
A[User] -->|Encrypted Tunnel| B[VPN Server]
B -->|Secure Access| C[Internet]
Mnemonic: “PETS” - Private Encrypted Tunnels Secure data.
Question 3(c) [7 marks]#
Explain the impact of web security threats.
Answer:
Impact of Web Security Threats
| Threat | Impact |
|---|---|
| Data Breach | Exposure of sensitive user information |
| Financial Loss | Direct monetary damages and recovery costs |
| Reputational Damage | Loss of customer trust and brand value |
| Regulatory Penalties | Fines for non-compliance with security standards |
| Service Disruption | Website downtime and business interruption |
Mnemonic: “DFRS” - Data breaches lead to Financial loss, Reputation damage, and Service disruption.
Question 3(a OR) [3 marks]#
Explain working of digital signature.
Answer:
Digital Signature Process
| Step | Description |
|---|---|
| Hash | Create hash of the document |
| Encrypt | Encrypt hash with sender’s private key |
| Attach | Attach encrypted hash to document |
| Verify | Recipient decrypts with sender’s public key and compares hashes |
flowchart LR
A[Document] --> B[Hash Document]
B --> C[Encrypt Hash with Private Key]
C --> D[Digital Signature]
Mnemonic: “HEAV” - Hash, Encrypt, Attach, Verify for digital signatures.
Question 3(b OR) [4 marks]#
Describe HTTPS.
Answer:
HTTPS (Hypertext Transfer Protocol Secure)
| Feature | Description |
|---|---|
| Encryption | Uses SSL/TLS to encrypt communications |
| Authenticity | Verifies identity of the website via certificates |
| Integrity | Ensures data hasn’t been modified in transit |
| Port | Uses port 443 (vs HTTP’s port 80) |
Mnemonic: “EAIP” - Encryption, Authenticity, Integrity, Port 443.
Question 3(c OR) [7 marks]#
Explain social engineering, vishing and machine in the middle attack.
Answer:
Table: Attack Types and Characteristics
| Attack Type | Description | Example |
|---|---|---|
| Social Engineering | Manipulates people into revealing information | Pretending to be IT support to get passwords |
| Vishing | Voice phishing using phone calls to trick victims | Caller claims to be from bank requesting account details |
| Machine in the Middle | Intercepts communication between two parties | Attacker intercepts traffic between user and website |
sequenceDiagram
User->>Attacker: Data (thinking it's the server)
Attacker->>Server: Data (posing as the user)
Server->>Attacker: Response
Attacker->>User: Modified Response
Mnemonic: “SVM” - Social engineering uses Voice calls and Machines in the middle to steal data.
Question 4(a) [3 marks]#
Match the following.
Answer:
Correct Matches
| Column A | Column B |
|---|---|
| 1. Denial of Service (DoS) | f. Attack that disrupts network services |
| 2. Port 443 | c. Default port for HTTPS |
| 3. Secure Socket Layer (SSL) | e. Predecessor of TLS for secure communication |
| 4. Port 80 | b. Default port for HTTP |
| 5. Integrity | a. Ensures data is not altered during transmission |
| 6. VPN (Virtual Private Network) | d. Creates a secure connection over the internet |
Mnemonic: “DOS Protects Security Information Very Carefully” - DOS, Port 443, SSL, Port 80, Integrity, VPN.
Question 4(b) [4 marks]#
List out types of hackers and explain role of each.
Answer:
Types of Hackers
| Type | Role/Motivation |
|---|---|
| White Hat | Ethical hackers who find vulnerabilities to improve security |
| Black Hat | Malicious hackers who exploit systems for personal gain |
| Grey Hat | Operate between ethical and malicious without permission |
| Script Kiddie | Unskilled individuals using existing tools without understanding |
Mnemonic: “WBGS” - White, Black, Grey hackers and Script kiddies have different aims.
Question 4(c) [7 marks]#
Explain SSH (Secure shell) protocol stack.
Answer:
SSH Protocol Stack
| Layer | Function |
|---|---|
| Transport Layer | Provides encryption, authentication, integrity |
| User Authentication Layer | Verifies user identity to the server |
| Connection Layer | Manages multiple channels within a single SSH connection |
| Applications | Terminal sessions, file transfers, port forwarding |
Application -> Connection -> Authentication -> Transport -> Network
Mnemonic: “TUCAN” - Transport, User authentication, Connection layer, and Applications on Network.
Question 4(a OR) [3 marks]#
Explain foot printing in ethical hacking.
Answer:
Foot printing is the initial reconnaissance phase where hackers gather information about target systems.
| Method | Information Gathered |
|---|---|
| Passive | Public records, websites, social media |
| Active | Network scanning, DNS queries |
| Purpose | Map attack surface and identify vulnerabilities |
Mnemonic: “PAM” - Passive and Active Methods reveal information.
Question 4(b OR) [4 marks]#
Explain scanning in ethical hacking.
Answer:
Scanning in Ethical Hacking
| Scanning Type | Purpose |
|---|---|
| Port Scanning | Identify open ports and services |
| Vulnerability Scanning | Detect known security weaknesses |
| Network Scanning | Map network topology and hosts |
| OS Fingerprinting | Determine operating systems in use |
flowchart LR
A[Footprinting] --> B[Scanning]
B --> C[Enumeration]
C --> D[Exploitation]
Mnemonic: “PVNO” - Ports, Vulnerabilities, Networks, and OS identification.
Question 4(c OR) [7 marks]#
Describe injection attack and phishing attack.
Answer:
Table: Injection vs Phishing Attacks
| Feature | Injection Attack | Phishing Attack |
|---|---|---|
| Target | Application code | Human users |
| Method | Insert malicious code into input fields | Impersonate trusted entities |
| Example | SQL injection: ' OR 1=1 -- | Fake login page resembling bank website |
| Prevention | Input validation, parameterized queries | User education, email filters |
| Impact | Data theft, authentication bypass | Credential theft, malware installation |
Mnemonic: “TIP” - Technical attacks use Injection, People-focused attacks use Phishing.
Question 5(a) [3 marks]#
Explain disk forensics.
Answer:
Disk Forensics
| Aspect | Description |
|---|---|
| Purpose | Recovery and analysis of data from storage devices |
| Process | Create disk image, analyze without modifying original |
| Focus | Recover deleted files, analyze file systems, find evidence |
Mnemonic: “IPF” - Image creation, Preservation, and Forensic analysis.
Question 5(b) [4 marks]#
Explain password cracking methods.
Answer:
Password Cracking Methods
| Method | Description |
|---|---|
| Dictionary Attack | Try common words and variations |
| Brute Force | Try all possible character combinations |
| Rainbow Table | Use precomputed hash tables |
| Social Engineering | Manipulate users to reveal passwords |
Mnemonic: “DBRS” - Dictionary, Brute force, Rainbow tables, and Social engineering break passwords.
Question 5(c) [7 marks]#
Describe Remote Administration Tool (RAT).
Answer:
Remote Administration Tool (RAT)
| Feature | Description |
|---|---|
| Functionality | Provides complete control over target system |
| Components | Client (attacker) and server (victim) components |
| Capabilities | File access, keylogging, screen capture, microphone/camera control |
| Delivery | Often distributed via phishing, infected software |
| Legitimate Use | IT support and remote assistance |
| Malicious Use | Unauthorized access and data theft |
flowchart LR
A[Attacker with Client] <-->|Control Commands| B[Victim with Server]
B -->|Data/Information| A
Mnemonic: “FCDLM” - Full Control provides Data access through Legitimate or Malicious means.
Question 5(a OR) [3 marks]#
List out challenges of cybercrime.
Answer:
Cybercrime Challenges
| Challenge | Description |
|---|---|
| Jurisdiction | Crimes cross national boundaries |
| Attribution | Difficult to identify perpetrators |
| Evidence Collection | Digital evidence is volatile and easily altered |
| Rapid Evolution | Techniques constantly change and adapt |
Mnemonic: “JAER” - Jurisdiction, Attribution, Evidence, and Rapid evolution.
Question 5(b OR) [4 marks]#
Explain mobile forensics.
Answer:
Mobile Forensics
| Aspect | Description |
|---|---|
| Scope | Extracting data from mobile devices (calls, messages, location) |
| Challenges | Device locks, encryption, cloud storage, frequent updates |
| Methods | Physical acquisition, logical acquisition, file system acquisition |
| Tools | Specialized hardware and software for data extraction |
Mnemonic: “SCMT” - Scope, Challenges, Methods, and Tools for mobile forensics.
Question 5(c OR) [7 marks]#
Explain Salami Attack, Web Jacking, Data diddling and Ransomware attack.
Answer:
Table: Types of Cyber Attacks
| Attack Type | Description | Example |
|---|---|---|
| Salami Attack | Small, unnoticeable thefts over time | Taking tiny amounts from many bank accounts |
| Web Jacking | Hijacking a website by taking control of URL | Redirecting users to fake site by changing domain |
| Data Diddling | Altering data before processing | Changing prices in inventory system |
| Ransomware | Encrypts files and demands payment for key | Encrypting hospital records and demanding bitcoin |
Mnemonic: “SWDR” - Salami slices, Web control, Data changes, and Ransom demands are different attack methods.

