Cyber Security (4353204) - PA1 September 2025 Solution

Solution guide for Cyber Security (4353204) PA1 September 2025 exam

Government Polytechnic Palanpur

Information & Communication Technology

Progressive Assessment I (September - 2025) - Solutions

Semester: 5
Subject Name & Code: Cyber Security (4353204)
Date: 04/09/2025
Time: 11:30 AM TO 12:30 PM
Total Marks: 20


Question 1: Answer the following questions [10 Marks]

Question 1(a) [7 marks]

Explain various security attacks, mechanisms, and services associated with each layer of the OSI model.

Answer:

OSI Security Framework:

OSI Security Framework

LayerAttacksMechanismsServices
PhysicalWiretapping, JammingPhysical security, ShieldingAccess control
Data LinkMAC flooding, ARP poisoningEncryption, AuthenticationFrame integrity
NetworkIP spoofing, Routing attacksIPSec, FirewallsPacket filtering
TransportSession hijacking, SYN floodingSSL/TLS, Port securityEnd-to-end security
SessionSession replay, HijackingSession tokens, TimeoutsSession management
PresentationData corruption, Format attacksEncryption, CompressionData transformation
ApplicationMalware, Social engineeringAntivirus, User trainingApplication security

Key Security Services:

  • Authentication: Verifying user identity
  • Authorization: Controlling access permissions
  • Non-repudiation: Preventing denial of actions
  • Data integrity: Ensuring data accuracy

Mnemonic: "All People Seem To Need Data Protection"

Question 1(b) [3 marks]

Describe CIA triad with example.

Answer:

CIA Triad Components:

CIA Triad

ComponentDefinitionExample
ConfidentialityProtecting data from unauthorized accessPassword protection on bank accounts
IntegrityEnsuring data accuracy and completenessDigital signatures on documents
AvailabilityEnsuring systems are accessible when needed24/7 online banking services
  • Confidentiality: Only authorized users can access sensitive information
  • Integrity: Data remains accurate and unaltered during transmission
  • Availability: Systems remain operational and accessible to legitimate users

Mnemonic: "CIA Keeps Information Safe"


Question 2: Answer the following questions [10 Marks]

Question 2(a) [7 marks]

Explain working of packet filter and application proxy.

Answer:

Firewall TypeWorking
Packet FilterExamines packet headers based on predefined rules. Makes decisions based on source/destination IP addresses, ports, and protocols. Works at OSI network and transport layers. Offers high-speed filtering with low resource usage.
Application ProxyActs as intermediary between client and server applications. Processes all traffic at application layer. Creates two connections (client-to-proxy and proxy-to-server). Provides content inspection and user authentication capabilities.

Diagram:

Packet Filter vs Application Proxy

Key Differences:

FeaturePacket FilterApplication Proxy
SpeedFastSlower
SecurityBasicAdvanced
Resource UsageLowHigh
Content InspectionHeader onlyFull content

Mnemonic: "Packets Check Headers, Proxies Check Content"

Question 2(b) [3 marks]

What is authentication? Explain different methods of authentication.

Answer:

Authentication Definition: Process of verifying user identity before granting system access.

Authentication Methods:

Authentication Methods

MethodDescriptionExample
PasswordSomething you knowPIN, passphrase
BiometricSomething you areFingerprint, iris
TokenSomething you haveSmart card, USB key
  • Single-Factor: Uses one authentication method
  • Multi-Factor: Combines multiple methods
  • Two-Factor (2FA): Uses exactly two factors

Mnemonic: "Password Biometric Token Authentication"


Alternative Set Questions

Alternative Q1: Answer the following questions [10 Marks]

Alternative Q1(a) [7 marks]

Explain MD5 hashing and Secure Hash Function (SHA) algorithms.

Answer:

Hash Function Comparison:

Hash Function Process

FeatureMD5SHA-1SHA-256
Output Size128 bits160 bits256 bits
Security LevelWeakWeakStrong
SpeedFastModerateSlower
Current StatusDeprecatedDeprecatedRecommended

MD5 Algorithm Process:

  1. Input Processing: Message is padded and divided into 512-bit blocks
  2. Initialization: Sets up four 32-bit registers with fixed values
  3. Compression: Processes message in 16-word blocks through four rounds of operations
  4. Output: Produces 128-bit digest as final hash value

SHA Algorithm Features:

  • Deterministic: Same input produces same hash
  • Avalanche Effect: Small input change causes major hash change
  • One-way Function: Cannot reverse hash to original data
  • Collision Resistant: Difficult to find two inputs with same hash

Applications:

  • Password storage and verification
  • Digital signatures and certificates
  • Data integrity verification

Mnemonic: "Hash Always Produces Same Output"

Alternative Q1(b) [3 marks]

Explain Public key and Private Key cryptography.

Answer:

Public Key Cryptography (Asymmetric):

Public Key Cryptography

Key Characteristics:

FeaturePublic KeyPrivate Key
DistributionFreely sharedKept secret
UsageEncryption/VerificationDecryption/Signing
SecurityCan be publicMust be protected
  • Public Key: Used for encryption and signature verification
  • Private Key: Used for decryption and digital signing
  • Security: Based on mathematical complexity (RSA, ECC algorithms)

Example: In RSA encryption, if Alice wants to send Bob a message:

  1. Alice encrypts with Bob's public key
  2. Only Bob can decrypt using his private key

Mnemonic: "Public Encrypts, Private Decrypts"

Alternative Q2: Answer the following questions [10 Marks]

Alternative Q2(a) [7 marks]

Explain different types of malicious software and their effect.

Answer:

Malware Classification:

Malware Classification

TypeBehaviorEffectExample
VirusAttaches to filesFile corruptionBoot sector virus
WormSelf-replicatingNetwork congestionConficker worm
TrojanDisguised malwareData theftBanking Trojans
RansomwareEncrypts filesData hostageWannaCry
SpywareMonitors activityPrivacy breachKeyloggers
AdwareShows unwanted adsPerformance degradationPop-up ads
RootkitHides presenceSystem compromiseKernel rootkits

Effects on Systems:

  • Performance: Slow system response
  • Data: Loss, corruption, or theft
  • Privacy: Unauthorized monitoring
  • Financial: Direct monetary loss

Prevention Methods:

  • Regular antivirus updates
  • Safe browsing practices
  • Email attachment caution
  • System security patches

Mnemonic: "Viruses Worms Trojans Really Steal All Resources"

Alternative Q2(b) [3 marks]

What is firewall? List out types of firewalls.

Answer:

Firewall Definition: Network security device that monitors and controls incoming/outgoing traffic based on security rules.

Firewall Architecture

Types of Firewalls:

TypeFunctionLevel
Packet FilterExamines packet headersNetwork Layer
StatefulTracks connection stateTransport Layer
Application ProxyInspects application dataApplication Layer
Personal FirewallProtects individual devicesHost-based
  • Hardware Firewall: Dedicated network appliance
  • Software Firewall: Installed on individual computers
  • Cloud Firewall: Delivered as a service (FWaaS)

Mnemonic: "Firewalls Protect Networks Always"


Legend:

  • CO1, CO2: Course Outcomes
  • A: Apply level
  • U: Understand level