Anda di halaman 1dari 2

CYBER SECURITY ASSIGNMENT

1.what is CIA triad?


Confidentiality, integrity and availability, also known as the CIA triad, is a
model designed to guide policies for information security within an organization.
The model is also sometimes referred to as the AIC triad (availability, integrity
and confidentiality) to avoid confusion with the Central Intelligence Agency. The
elements of the triad are considered the three most crucial components of security.

2.Define Authentication?
Authentication is important to any secure system, as it is key to verifying the
source of the message or that an individual is whom he or she claims. The NIGA
defines authentication as a “security measure designed to establish the validity of
a transmission message or originator or a means of verifying individual’s
authorization to receive specific categories of information”.

3.what is a botnet?
A botnet is a collection of internet-connected devices, which may include PCs,
servers, mobile devices and internet of things devices that are infected and
controlled by a common type of malware. Users are often unaware of a botnet
infecting their system.
Infected devices are controlled remotely by threat actors, often cybercriminals,
and are used for specific functions, so the malicious operations stay hidden to the
user. Botnets are commonly used to send email spam, engage in click fraud campaigns
and generate malicious traffic for distributed denial-of-service attacks.

4.define steganography?
Steganography is data hidden within data. Steganography is an encryption technique
that can be used along with cryptography as an extra-secure method in which to
protect data.
Steganography techniques can be applied to images, a video file or an audio file.
Typically, however, steganography is written in characters including hash marking,
but its usage within images is also common. At any rate, steganography protects
from pirating copyrighted materials as well as aiding in unauthorized viewing.

5. List the types of attackers?


* Denial-of-service(DoS) and distributed denial-of-service (DDoS) attacks
* Man-in-the-middle(MitM) attack
* Phishing and spear phishing attacks
* Drive-by attack
* Password attack
* SQL injection attack
* Cross-site scripting
* Eavesdropping attack
* Birthday attack
* Malware attack

6.What is a virtual private network?


A virtual private network(VPN) extends a private network across a public network,
and enables user to send and receive data across shared or public networks as if
their computing devices are directly connected to the private network. Applications
running on the computing device, e.g., a laptop, desktop, smart phone, across a VPN
may therefore benefit from the functionality, security and management of the
private network. Encryption is a common though not an inherent part of a VPN
connection.

7.Define DoS attack?


A denial-of-service (DoS) is any type of attack where the attackers (hackers)
attempt to prevent legitimate users from accessing the service. In a DoS attack,
the attacker usually sends excessive messages asking the network or server to
authenticate requests that have invalid return addresses. The network or server
will not be able to find the return address of the attacker when sending the
authentication approval, causing the server to wait before closing the connection.
When the server closes the connection, the attacker sends more authentication
messages with invalid return addresses. Hence, the process of authentication and
server wait will begin again, keeping the network or server busy.

8.What are the features of proxy server?


Proxy servers traditionally provide three main functions:
* Firewall and network data filtering support
* Netwok connection sharing
* Data caching

9.write the structure of pdf file.


A PDF contains 4 sections:
Header, defines the version of PDF specification
Body, the actual content that will be displayed.
Cross-reference table, a table for PDF viewers to quickly access different objects.
Trailer, defines other meta info of a PDF file.

10.Define network security and information security?


Network security:
Network security is protection of the access to files and directions in a computer
network against hacking misuse and unauthorized changes to the system.
Information security:
The state of being protected against the unauthorized use of information,
especially electronic data, or the measures taken to achieve this.

CH.MANIKANTHA

17131A0217

Anda mungkin juga menyukai