Cyber Security (4353204) - Unit 1 & Unit 2 Question Bank

Important questions from Unit 1 and Unit 2 for Cyber Security (4353204)

Government Polytechnic Palanpur

Information & Communication Technology

Cyber Security (4353204) - Unit 1 & Unit 2 Question Bank

Subject Name & Code: Cyber Security (4353204)
Semester: 5
Coverage: Unit 1 & Unit 2
Question Types: Short Answer & Long Answer


Unit I: Introduction to Cyber Security & Cryptography

Important Questions from Unit 1

Question 1 [7 marks]

Explain various security attacks, mechanisms, and services associated with each layer of the OSI model.

Answer:

OSI Security Framework:

OSI Security Framework

LayerAttacksMechanismsServices
PhysicalWiretapping, JammingPhysical security, ShieldingAccess control
Data LinkMAC flooding, ARP poisoningEncryption, AuthenticationFrame integrity
NetworkIP spoofing, Routing attacksIPSec, FirewallsPacket filtering
TransportSession hijacking, SYN floodingSSL/TLS, Port securityEnd-to-end security
SessionSession replay, HijackingSession tokens, TimeoutsSession management
PresentationData corruption, Format attacksEncryption, CompressionData transformation
ApplicationMalware, Social engineeringAntivirus, User trainingApplication security

Key Security Services:

  • Authentication: Verifying user identity
  • Authorization: Controlling access permissions
  • Non-repudiation: Preventing denial of actions
  • Data integrity: Ensuring data accuracy

Mnemonic: "All People Seem To Need Data Protection"

Question 2 [3 marks]

Describe CIA triad with example.

Answer:

CIA Triad Components:

CIA Triad

ComponentDefinitionExample
ConfidentialityProtecting data from unauthorized accessPassword protection on bank accounts
IntegrityEnsuring data accuracy and completenessDigital signatures on documents
AvailabilityEnsuring systems are accessible when needed24/7 online banking services
  • Confidentiality: Only authorized users can access sensitive information
  • Integrity: Data remains accurate and unaltered during transmission
  • Availability: Systems remain operational and accessible to legitimate users

Mnemonic: "CIA Keeps Information Safe"

Question 3 [7 marks]

Explain MD5 hashing and Secure Hash Function (SHA) algorithms.

Answer:

Firewall TypeWorking
Packet FilterExamines packet headers based on predefined rules. Makes decisions based on source/destination IP addresses, ports, and protocols. Works at OSI network and transport layers. Offers high-speed filtering with low resource usage.
Application ProxyActs as intermediary between client and server applications. Processes all traffic at application layer. Creates two connections (client-to-proxy and proxy-to-server). Provides content inspection and user authentication capabilities.

Diagram:

Packet Filter vs Application Proxy

Key Differences:

FeaturePacket FilterApplication Proxy
SpeedFastSlower
SecurityBasicAdvanced
Resource UsageLowHigh
Content InspectionHeader onlyFull content

Answer:

Hash Function Comparison:

Hash Function Process

FeatureMD5SHA-1SHA-256
Output Size128 bits160 bits256 bits
Security LevelWeakWeakStrong
SpeedFastModerateSlower
Current StatusDeprecatedDeprecatedRecommended

MD5 Algorithm Process:

  1. Input Processing: Message is padded and divided into 512-bit blocks
  2. Initialization: Sets up four 32-bit registers with fixed values
  3. Compression: Processes message in 16-word blocks through four rounds of operations
  4. Output: Produces 128-bit digest as final hash value

SHA Algorithm Features:

  • Deterministic: Same input produces same hash
  • Avalanche Effect: Small input change causes major hash change
  • One-way Function: Cannot reverse hash to original data
  • Collision Resistant: Difficult to find two inputs with same hash

Applications:

  • Password storage and verification
  • Digital signatures and certificates
  • Data integrity verification

Mnemonic: "Hash Always Produces Same Output"

Question 4 [3 marks]

Explain Public key and Private Key cryptography.

Answer:

Public Key Cryptography (Asymmetric):

Public Key Cryptography

Key Characteristics:

FeaturePublic KeyPrivate Key
DistributionFreely sharedKept secret
UsageEncryption/VerificationDecryption/Signing
SecurityCan be publicMust be protected
  • Public Key: Used for encryption and signature verification
  • Private Key: Used for decryption and digital signing
  • Security: Based on mathematical complexity (RSA, ECC algorithms)

Example: In RSA encryption, if Alice wants to send Bob a message:

  1. Alice encrypts with Bob's public key
  2. Only Bob can decrypt using his private key

Mnemonic: "Public Encrypts, Private Decrypts"


Unit II: Account and Data Security

Important Questions from Unit 2

Question 5 [7 marks]

Explain working of packet filter and application proxy.

Answer:

Firewall TypeWorking
Packet FilterExamines packet headers based on predefined rules. Makes decisions based on source/destination IP addresses, ports, and protocols. Works at OSI network and transport layers. Offers high-speed filtering with low resource usage.
Application ProxyActs as intermediary between client and server applications. Processes all traffic at application layer. Creates two connections (client-to-proxy and proxy-to-server). Provides content inspection and user authentication capabilities.

Diagram:

Packet Filter vs Application Proxy

Key Differences:

FeaturePacket FilterApplication Proxy
SpeedFastSlower
SecurityBasicAdvanced
Resource UsageLowHigh
Content InspectionHeader onlyFull content

Mnemonic: "Packets Check Headers, Proxies Check Content"

Question 6 [3 marks]

What is authentication? Explain different methods of authentication.

Answer:

Authentication Definition: Process of verifying user identity before granting system access.

Authentication Methods:

Authentication Methods

MethodDescriptionExample
PasswordSomething you knowPIN, passphrase
BiometricSomething you areFingerprint, iris
TokenSomething you haveSmart card, USB key
  • Single-Factor: Uses one authentication method
  • Multi-Factor: Combines multiple methods
  • Two-Factor (2FA): Uses exactly two factors

Mnemonic: "Password Biometric Token Authentication"

Question 7 [7 marks]

Explain different types of malicious software and their effect.

Answer:

Malware Classification:

Malware Classification

TypeBehaviorEffectExample
VirusAttaches to filesFile corruptionBoot sector virus
WormSelf-replicatingNetwork congestionConficker worm
TrojanDisguised malwareData theftBanking Trojans
RansomwareEncrypts filesData hostageWannaCry
SpywareMonitors activityPrivacy breachKeyloggers
AdwareShows unwanted adsPerformance degradationPop-up ads
RootkitHides presenceSystem compromiseKernel rootkits

Effects on Systems:

  • Performance: Slow system response
  • Data: Loss, corruption, or theft
  • Privacy: Unauthorized monitoring
  • Financial: Direct monetary loss

Prevention Methods:

  • Regular antivirus updates
  • Safe browsing practices
  • Email attachment caution
  • System security patches

Mnemonic: "Viruses Worms Trojans Really Steal All Resources"

Question 8 [3 marks]

What is firewall? List out types of firewalls.

Answer:

Firewall Definition: Network security device that monitors and controls incoming/outgoing traffic based on security rules.

Firewall Architecture

Types of Firewalls:

TypeFunctionLevel
Packet FilterExamines packet headersNetwork Layer
StatefulTracks connection stateTransport Layer
Application ProxyInspects application dataApplication Layer
Personal FirewallProtects individual devicesHost-based
  • Hardware Firewall: Dedicated network appliance
  • Software Firewall: Installed on individual computers
  • Cloud Firewall: Delivered as a service (FWaaS)

Mnemonic: "Firewalls Protect Networks Always"


Study Tips for Unit 1 & Unit 2

Unit 1 Focus Areas

  1. Security Fundamentals - OSI model security layers
  2. CIA Triad - Core principles of information security
  3. Cryptography Basics - Hash functions and encryption types

Unit 2 Focus Areas

  1. Network Security - Firewalls, packet filtering, proxies
  2. Authentication Systems - Methods and multi-factor authentication
  3. Malware Analysis - Types, effects, and prevention strategies

Exam Preparation Tips

  • Practice drawing network diagrams and security frameworks
  • Memorize comparison tables for different security technologies
  • Understand real-world applications of theoretical concepts
  • Focus on the working principles behind security mechanisms
  • Review mnemonics for better concept recall

Key Topics Coverage

  • Unit 1: Introduction to Cyber Security, Security Models, Cryptographic Foundations
  • Unit 2: Network Security, Authentication Mechanisms, Threat Analysis

Note: These questions cover fundamental concepts from Unit 1 and Unit 2 that are commonly asked in examinations. Practice these thoroughly for better understanding of cyber security principles.