Professional Documents
Culture Documents
Ques On 2: Common Types of User Authentication Include
Ques On 2: Common Types of User Authentication Include
Strong Security: Biometric traits are difficult to forge or steal, making them
inherently more secure than passwords or tokens.
Convenience: Users don't need to remember passwords or carry physical
tokens; their biometric traits are always with them.
Enhanced User Experience: Biometric authentication can streamline the
login process, improving user experience and reducing friction.
Non-repudiation: Biometric authentication provides strong evidence of an
individual's identity, enhancing accountability and reducing the risk of
repudiation.
Ques on 3
A digital signature is a cryptographic technique used to verify the
authenticity and integrity of digital messages, documents, or transactions. It
serves as a digital equivalent of a handwritten signature or a stamped seal
on a paper document.
Ques on 5
Packet Sniffing
When any data has to be transmitted over the computer network, it is
broken down into smaller units at the sender’s node called data
packets and reassembled at receiver’s node in original format. It is
the smallest unit of communication over a computer network. It is also
called a block, a segment, a datagram or a cell. The act of capturing data
packet across the computer network is called packet sniffing. It is similar
to as wire tapping to a telephone network. It is mostly used by crackers
and hackers to collect information illegally about network. It is also used
by ISPs, advertisers and governments. ISPs use packet sniffing to track all
your activities such as:
who is receiver of your email
what is content of that email
what you download
sites you visit
what you looked on that website
downloads from a site
streaming events like video, audio, etc.
Advantages:
Network troubleshooting
Security analysis
Network optimization
Protocol analysis
Disadvantages:
Privacy violations:
Legal issues:
Resource usage:
Complexity
Spoofing
Spoofing is a type of attack in which hackers gain access to the victim’s
system by gaining the trust of the victim (target user) to spread the
malicious code of the malware and steal data such as passwords and PINs
stored in the system.In Spoofing, psychologically manipulating the victim
is the main target of the hacker.
Working:
Scanning: Hackers use ARP spoofing tools to scan the IP and MAC
addresses of hosts.
Selection and Launching: Hackers select their target and then send ARP
packets over the local network containing the hacker’s MAC address and
the target’s IP address.
Accessing: Once the ARP cache on the host on the local network is
corrupted. Then the data the host wants to send to the victim is sent to
the hacker instead of the victim. Hackers can steal data or launch other
attacks from here.
Question 6
Port Scanning is the name of the technique used to identify available
ports and services on hosts on a network. Security engineers sometimes
use it to scan computers for vulnerabilities, and hackers also use it to
target victims. It can be used to send connection requests to target
computers and then track ports. Network scanners do not actually harm
computers; instead, they make requests that are similar to those sent by
human users who visit websites or connect to other computers using
applications like Remote Desktop Protocol (RDP) and Telnet. A port scan
is performed by sending ICMP echo-request packets with specific flags
set in the packet headers that indicate the type of message being
transmitted
Types of Ports:
IP spoofing
IP spoofing, also known as "IP address spoofing", is the process of
sending Internet Protocol (IP) packets with a fake source IP
address in order to mimic another computer system.
Cybercriminals can use IP spoofing to carry out harmful acts
without being detected. It's possible that someone will steal your
data, infect your device with malware, or crash your server.
Question 7
DOS DDOS
DOS Stands for Denial of service DDOS Stands for Distributed Denial of
attack. service attack.
DOS Attacks are Easy to trace. DDOS Attacks are Difficult to trace.
Ques on 8
Tunnel Mode:
In Tunnel Mode, the entire original IP packet is encapsulated in a
new IP packet. The new packet is then encrypted and sent over
the network.
This mode is used when two entire networks need to be
connected over a public network, such as the Internet.
In Tunnel Mode, the entire IP packet, including the original source
and destination addresses, is encrypted, providing end-to-end
security.
Transport Mode:
When comparing Tunnel Mode and Transport Mode, one key difference
is the level of encryption provided. Tunnel Mode provides end-to-end
security by encrypting the entire IP packet, while Transport Mode only
encrypts the payload of the packet.
Another difference is the use case: Tunnel Mode is used for connecting
entire networks, while Transport Mode is used for host-to-host
communication.
The choice between Tunnel Mode and Transport Mode depends on the
specific requirements of the network and the level of security desired.
Ques on 9
A firewall is a network security device or so ware that monitors and controls
incoming and outgoing network traffic based on predetermined security rules. It
acts as a barrier between a trusted internal network and untrusted external
networks, such as the internet, to protect against unauthorized access, malicious
ac vi es, and cyber threats.
Firewalls can be implemented in various forms, including hardware appliances,
so ware applica ons, or a combina on of both. They operate at different layers
of the OSI (Open Systems Interconnec on) model, providing protec on at
different levels of the network stack.
Types of firewalls based on their characteris cs and deployment methods:
Ques on 10
Benefits of IDS
Detects malicious activity
Improves network performance
Compliance requirements
Provides insights
Question 11
Question 12
SQL injection usually occurs when you ask a user for input, like their
username/userid, and instead of a name/id, the user gives you an SQL
statement that you will unknowingly run on your database.