MD Iqubal Ahmad, 29 PDF
MD Iqubal Ahmad, 29 PDF
Q1. what is cyber security ,what are the basis need of cyber security
Q3. what is cyber attack , what are the difference type of cyber
attack?
Types of Cyberattacks:
• Malware: Malicious software (like viruses, worms, Trojans) designed to
damage, disrupt, or gain unauthorized access to systems.
• Phishing: Fraudulent attempts (typically via email) to trick individuals
into revealing sensitive information, like passwords or credit card
numbers.
• Ransomware: A type of malware that encrypts a victim’s data and
demands payment (ransom) for its release.
• Denial-of-Service (DoS) / Distributed Denial-of-Service (DDoS):
Overloading a system or network with traffic, making it unavailable to
users.
• Man-in-the-Middle (MitM): Intercepting and altering communications between two
parties without their knowledge, often to steal data.
• SQL Injection: Exploiting vulnerabilities in a website’s database to insert malicious
code and gain access to sensitive data.
• Zero-Day Exploit: Attacking a software vulnerability that is unknown to the software
maker, before a patch or fix is available.
• Credential Stuffing: Using stolen usernames and passwords from previous
breaches to gain access to accounts on other platforms.
• Social Engineering: Manipulating people into divulging confidential information or
performing actions that compromise security.
Disadvantages of Phishing:
ANS. Session Hijacking is a cyberattack where an attacker takes control of a user’s active
session by stealing or predicting the session ID, allowing them to impersonate the user.
Mitigation:
Q6. what is virus ? what is worm . what are the difference between virus and
worm.
ANS. Virus:
Worm:
Q7. what is trojan horse ? what are the difference between backdoor and
trojan horse.
A threat is any potential danger or event that can exploit vulnerabilities in a system,
network, or application to cause harm, damage, or unauthorized access.
Q9. WHAT are the advantage and disadvantage of antivirus . write down the
block diagram of antivirus ?
Disadvantages of Antivirus:
+------------------------+
| User Interaction |
+------------------------+
|
v
+-------------------------+
| Real-Time Scanning | <--- Monitors files in real-time
+-------------------------+
|
+--------------------+------------------+
| |
v v
+-------------------+ +------------------+
| Signature-Based | | Heuristic-Based | <--- Detects unknown threats
| Detection | | Detection |
+-------------------+ +------------------+
| |
v v
+-------------------+ +---------------------+
| File Scanning | | Behavior Monitoring | <--- Identifies suspicious actions
+-------------------+ +---------------------+
| |
v v
+------------------+ +---------------------+
| Quarantine Area | | User Alerts/Logs | <--- Notifies user of threats
+------------------+ +---------------------+
|
v
+---------------------+
| Malware Removal | <--- Removes detected malware
+---------------------+
|
v
+---------------------+
| Update Mechanism | <--- Keeps virus definitions up-to-date
+---------------------+
Penetration testing (also known as pen testing) is the practice of simulating a cyberattack
on a system, network, or application to identify vulnerabilities that could be exploited by
attackers. The goal is to find weaknesses before malicious hackers can exploit them.
Public Key Infrastructure (PKI) is a framework that uses cryptographic key pairs (public
and private keys) to enable secure communication and authentication.
PKI is commonly used for SSL/TLS encryption, email encryption, and digital signatures.
A firewall is a security system designed to monitor and control incoming and outgoing
network traffic based on predefined security rules. It acts as a barrier between a trusted
internal network and untrusted external networks (like the internet).
A digital signature is a cryptographic technique used to verify the authenticity and integrity
of a digital message or document. It ensures that the message has not been altered and
confirms the identity of the sender.
1. Authentication: Confirms the identity of the sender, ensuring the message came
from the claimed source.
2. Integrity: Ensures that the message or document has not been altered in transit.
Any change would invalidate the signature.
3. Non-repudiation: Prevents the sender from denying their signature on the
document, providing legal proof of origin.
Each type of hacker differs in intent, methods, and legality, ranging from ethical
professionals to malicious criminals.