Cyber Security IMP Questions-1-17
Cyber Security IMP Questions-1-17
BETCK105I/205I
Note: Answer any FIVE full questions, choosing at least ONE question from each MODULE.
*Bloom’s
Module -1 Taxonomy Marks
Level
Q.01 a Define computer crime. Discuss about Cyberpunk and Cyber warfare L2 8
• Cyberpunk: The term cyberpunk could mean something like " anarchy via
machines", or "machines/ computer Rebel moment"
• The two basic aspects of cyberpunk are technology and individualism.
• It is a genre of science fiction set in a lawless subculture of oppressive
society dominated by computer technology.
BETCK105I/205I
The following are the crimes against property and against organization
Cybercrime against property
• The ITA 2000 was framed after the United Nation General Assembly
Resolution in January 30, 1997.
• ITA adopting the Model Law on Electronic Commerce (E-Commerce)
adopted by Commission on the United Nations International Trade Law.
• A total cybercrime was registered under the IT Act in 2007 compared to
142 cases registered 2006.
• Under the IPC in to, 339 cases were recorded in 2007 compared
noteworthy to 311 cases in 2006. The laws, crime details and punishment
details given in table below.
BETCK105I/205I
Section Ref. & Chapter of Crime Punishment
Title the Act &
Title
Sec. 43 (Penalty CHAPTER Damage to Compensation for 1 crore
for damage to IX computer system,
computer) Penalties
and
Adjudicati
on
Sec. 66 CHAPTER Hacking (with Fine of 2 lakhs and
(Hacking with XI intent or imprisonment for 3 years
computer Offences knowledge)
system)
Sec. 67 CHAPTER Publication of Fine of 1 lakh
(Publishing of XI obscene material imprisonment of 5 years
information Offences in electronic form and double Conviction on
which is second offence
obscene in
electronic form
Sec. 68 (Power CHAPTER Not complying Fine up to 2 lakhs
of controller to XI with directions of imprisonment of 3 years
give directions) Offences controller.
Sec. 70 CHAPTER Attempting or Imprisonment up to 10
(Protected XI securing access to years.
system Offences computer without
his/her
knowledge,
Sec. 72 (Penalty CHAPTER Attempting or Fine up to 1 lakh and
for breach of XI securing access to imprisonment up to 2 years
confidentiality Offences computer for
and privacy) breaking
confidentiality
Sec. 73 (Penalty CHAPTER Publishing false Fine up to 1 lakh or
for publishing XI digital signature imprisonment up to 2 years
Digital Offences or both
Signature
Certificate false
in certain
particulars)
Sec. 74 CHAPTER Publication of imprisonment up to 2 years
(Publication for XI Digital Signatures and Fine up to 1 lakh
fraudulent Offences for fraudulent
purpose) purpose
OR
Q.02 a Who are cybercriminals? Discuss the three groups of cybercriminals L3 8
Cybercriminals are those who conduct act such as child pornography; credit card
fraud, cyber stalking, defame another online; gaining unauthorised access to a
computer system; ignoring copyright, software licensing and Trademark protection;
overriding encryption to make illegal copies; software piracy and stealing another's
identity to perform criminal acts.
They can be categorised into three groups that reflect their motivation.
BETCK105I/205I
We have three types of Cybercriminals
BETCK105I/205I
• 4. No imputation is said to be harm a person's reputation and less that
imputation directly or indirectly in the estimation of the others Louis the
moral or intellectual character of that person, his cast.
• Liable is written defamation on slander is oral defamation
Module-2
Q. 03 a What is Social Engineering? Discuss Human Based Social Engineering with a L3 8
suitable example
• social engineering Is a Technique to influence and persuasion to device
people to obtain the information or perform some action.
• A social engineer uses telecommunications or inter net to get them to
do something that is against the security practices and/or policies of
the organization.
• Social Engineering involves gaining sensitive information or
unauthorized access privileges by building inappropriate trust
relationship with insiders.
• It is an art of exploiting the trust of people.
• The goal of SE is to fool someone into providing valuable
information or access to that information.
• Social Engineering studies human behavior so that people will help
because of the desire to be helpful, the attitude to trust people, and
fear of getting into trouble.
• An example is calling a user and pretending to be someone from the
service desk working on a network issue; the attacker then proceeds
to ask question about what the user is working on, what files shares
he/she uses, what his/her password is and so on.
• Example: Talking to an employee of a company, in the name of
technical support from the same office. While taking with the
employee the attacker will collect the confidential information such
as name of the company, username and password etc.
BETCK105I/205I
SE take the advantages of the fact that most people are basically helpful, so they are
harmless to tell someone who appears to be lost where the computer room is located.
Or pretending some one as employee or valid user on the system.
• Shoulder surfing
It is a technique of gathering information such as usernames and passwords by
watching over a person's shoulder while he/she logs into the system, thereby helping
an attacker to
gain access to the system.
• Dumpster diving
It involves looking in the trash for information written on pieces of paper or
computer printouts. This is a typical North American term; it is used to describe the
practice of rummaging through commercial or residential trash to find useful free
items that have been discarded.
It is also called dumpstering, binning, trashing garbing or garbage gleaning
"Scavenging is another term to describe these habits. In the UK, the practice is
referred to as "binning or "skipping and the person doing it is a "binner" or a "skipper.
BETCK105I/205I
target. The target can be individual and/or organization.
Criminal plan active and passive attacks. Active attacks are used to alter the
system or computer network.
Whereas passive attack attempts to gain information about the target. Active
attacks may affect the availability, integrity, and authenticity of data whereas
passive attacks lead to breaches of confidentiality.
BETCK105I/205I
target
The objectives are:
1. Port scanning
2. Network scanning
3. Vulnerability scanning
Port scanning:
• The act of systematically scanning a computer port.
• Support is a place where information goes into and out of a
computer port scanning identify is open doors to a computer.
• It is a similar to a test going through your neighborhood and
checking every door and window on each house to see which ones
are open and which ones are locked.
• There is no way to stop someone from port scanning your computer
while you are on the Internet because accessing internet server
open support which open the door to your computer.
Scrutinizing Phase
• It is also called as enumeration in the hacking wo rld. The object to
behind the step is to identify the following
1. The valid user accounts or groups;
2. Network resources and/or shared resources;
3. Operating System (OS) and different applications that are running on
the OS.
c List and briefly explain any six tips for safety and security while using the L2 6
computers in a cybercafé
BETCK105I/205I
3. Clear history and temporary files
Internet Explorer saves pages that you have visited in the history folder and in
temporary Internet files. Your passwords may also be stored in the browser if
that option has been enabled on the computer that you have used. therefore,
before you begin browsing, do the following in case of the browser Internet
Explorer: Go to Tools> Internet options click the Content tab > click
AutoComplete. If the checkboxes for passwords are selected, deselect them.
Click OK twice.
After you have finished browsing, you should clear the history and temporary
Internet files folders.
For this, go to Tools > Internet options again> click the General tab go to
Temporary
Internet Files > click Delete Files and then click Delete Cookies
Then, under history, click clear history. Wait for the process to finish before leaving
the computer
4. Be alert don't be a victim of Shoulder Surfing
One should have to stay alert and aware of the surroundings while using a public
computer. Snooping over the shoulder is an easy way of getting your username and
password.
5. Avoid online financial transaction
Ideally one should avoid online banking, shopping or other transactions that require
one to provide personal, confidential and sensitive information such as credit card
or bank account details. In case of urgency, one has to do it; however, one should
take the precaution of changing all the passwords as soon as possible. One should
change the passwords using a more trusted computer, such as at home and/or in
office.
6. Change password
ICICI Bank/SBI about changing the bank account/transaction passwords is the best
practice to be followed by everyone who does the online net banking.
7. Virtual Keyboard
Nowadays almost every bank has provided the virtual keyboard on their website.
The advantages of utilizing virtual keyboard is we can avoid the keylogger attack.
8. Security warnings
One should take utmost care while accessing the websites of any banks/financial
institution. The screenshot in Fig. 2.7 displays security warnings very clearly
(marked in bold rectangle), and should be followed while accessing these
financial accounts from cybercafe
OR
Q.04 a Define Cyber Stalking along with its working. Explain two types of Stalkers L3 8
Ans:
cyberstalking is the use of Internet or other electronics means to stalk or harass an
individual, a group or an organization. It may include false accusation, defamation,
slander and liable.
It also includes monitoring, identity (ID) theft, threats, vandalism, solicitation of
minors for sex, or gathering information that may be used to threaten or harass a
person.
Cyberstalking is sometimes referred to as Internet stalking, e-stalking or online
stalking.
It refers to the use of Internet or electronic communication such as e-mail or instant
messages to harass the individual.
As per Law Cyber Stalking is a punishable offence and attracts section 354 (D),
509 IPC, and section 67 under I.T. Amendment Act 2008. Information Technology
Act, 2000 (amended in 2008) - When a person publishes or sends salacious material
via electronic media is to be charged under Section 67 of the Act.
BETCK105I/205I
We have two types of stalkers namely, Online Stalkers and Offline Stalkers.
Both are criminal offenses, both are motivated by a desire to control, intimidate of
influence a victim.
A Stalker may be an online stranger or a person whom the target knows. He may be
anonymous and solicit involvement of other people online who do not even know the
target.
Online Stalkers Offline Stalkers
They aim to start the interaction The stalker may begin the attack using
with the victim directly with the traditional methods such as following the
help of s victim, watching the daily routine of the victim,
Internet. E-Mail and chat rooms etc. Searching on message boards/newsgroups.
are the most popular Personal websites, and people finding services
communication medium to get or websites are most common ways to gather
connected with the victim, information
rather than using traditional about the victim using the Internet. The victim
instrumentation like telephone is not aware that the Internet has been used to
cell phone. The stalker perpetuate an attack against them.
makes sure that the victim
recognizes the attack attempted
on him/her. The stalker can
make use of
a third party to harass the victim.
b Differentiate between passive attacks and active attacks L2 6
BETCK105I/205I
The victim does not The victim gets informed
Victim get informed in a in an active attack.
passive attack.
Tracking Comparatively easy It is difficult to track, it
to trace. does not leave the any
traces of the attacker's
interference.
Example of Spying, War Session hijacking, Man-
attacks driving, in the middle (MITM),
Eavesdropping, impersonation, DoS,
Dumpster diving, DDoS etc.,
Foot printing,
Traffic analysis
c Define Bot and Botnet. With a diagram, explain how Botnets create business? L3 6
Ans:
Bot: “An automated program for doing some particular task, often over a network”.
A botnet (also known as a zombie army) is a number of internet computer that, although
their owners are unaware of it, have been set up to forward transmissions (including spam
or viruses)
Any such computer is called as a zombie-in effect, a computer “robot” or “bot” that
servers the wishes of some master spam or virus originator.
Most computers compromised in this way are home based. According to a report from
Russian based Kaspersky labs botnets– not spam, viruses, or worms– currently pose the
biggest threat to the Internet.
Botnet is a network of computers infected with a malicious program that allows
cybercriminals to control the infected machines remotely without the user's
knowledge.
Module-3
BETCK105I/205I
Q. 05 a What are hardware key loggers and Anti key loggers? List the advantages of L2 8
using anti loggers
Hardware Keyloggers
Antikeylogger
BETCK105I/205I
2. Speed up access to resource. It is used to cache the webpages
from a web server.
3. Specialized proxy servers are used to filter unwanted content such
as advertisement
4. Proxy server can be used as IP address multiplexer to enable to
connect number of computers on the internet, whichever has only
one IP address.
Advantages of Proxy server is that its cache memory can serve all users.
BETCK105I/205I
c What is a Backdoor? Discuss any four examples of Backdoor Trojans L2 6
Ans:
OR
BETCK105I/205I
Q. 06 a Discuss various types of Viruses categorized based on attacks on L3 8
various elements of the system.
Ans:
Generators are not viruses but purpose to hide actual viruses under the
cloak of polymorphism. It is difficult to detect polymorphic virus with
the help of an antivirus program.First Polymorphic generator was the
Mutation Engine (MtE). Other Polymorphic generators are Dark Angel’s
Multiple Encryptor (DAME), Darwinian Genetic Mutation Engine
(DGME), Dark Slayer Mutation Engine (DSME), MutaGen,
Guns’nRoses Polymorphic Engine (GPE), and Dark Slayer Confusion
Engine (DSME)
BETCK105I/205I
b What is Phishing? How Phishing works? L3 6
Ans:
• While checking electronic mail (E-Mail) one day a user finds a message
from the bank threatening him/her to close the bank account if he/she does
not reply immediately.
• Although the message seems to be suspicious from the contents of the
message, it is difficult to conclude that it is a fake/false E-Mail.
• Examples: stealing personal and financial data - and can infect systems with
viruses and also a method of online ID theft in various cases.
• Fake email using other reputed companies or individual identity
• People associate phishing with E-mail message that spoof or mimic banks
credit card companies or other business such as Amazon, and eBay
1. Planning: Criminals called as phisher, decide the target & determine how
to get E-mail address
2. Setup: Once phishers know which business/business house to spoof and
who their victims are, they create methods for delivering the message & to
collect the data about the target.
3. Attack: Phisher sends a phony message that appears to be from a reputed
source
4. Collection: Phisher record the information of victims entering into web
pages or pop-up window
5. Identity theft and fraud: Phisher use Information that they have gathered
to make illegal purchases and commit fraud.
Recently more and more organisation/Institute provides greater online access for
their customers and hence criminals are successfully using phishing techniques to
steal personal information and conduct ID theft at global level.
• This is the warliest form of DoS attack and is also known as ping
flood. Attacker sending number of ping packets, using ping
command, which result into more traffic than victim can handle.
• This requires the attacker to have faster network connection than the
victim
• It is very simple to launch, but Prevention is difficult