SIC Question Paper Solution
SIC Question Paper Solution
SIC Question Paper Solution
Availability: Information protection ensures that Risk assessment: Identifying potential risks and This includes intrusion detection and prevention
Explain with example. data is available when needed. For example, online vulnerabilities to an organization's assets and systems, security information and event
Information protection, also known as cybersecurity or retailers must ensure that their websites are data is the first step in building a security management systems, and security analytics.
information security, is crucial in computing because it available 24/7 to avoid losing customers or program. A risk assessment helps to prioritize Incident response: An incident response plan
helps to safeguard sensitive data from unauthorized revenue. security measures based on the likelihood and outlines the procedures for responding to a
access, use, disclosure, modification, or destruction. Compliance: Information protection is often impact of a security incident. security incident, including containment,
The importance of information protection can be required by laws, regulations, and standards to Policies and procedures: Establishing security investigation, and recovery. The plan should be
understood in various ways: ensure that data is handled appropriately. For policies and procedures helps to define the regularly tested and updated to ensure it is
Confidentiality: Information protection ensures that example, the General Data Protection Regulation rules and guidelines for security practices effective.
only authorized individuals or entities have access to (GDPR) in Europe requires organizations to within an organization. These policies and Training and awareness: Security training and
confidential information. For example, financial protect personal data and provide certain rights procedures should be regularly reviewed and awareness programs help to educate employees
institutions need to protect customers' personal and to individuals. updated to reflect changing risks and about security risks and best practices. This
financial data from unauthorized access to prevent Explain various components used to build a technology. includes security awareness training, phishing
identity theft or fraud. security program. This includes authentication mechanisms such simulations, and ongoing communication and
Integrity: Information protection helps to ensure the A security program typically consists of several as passwords, multi-factor authentication, and education.
accuracy, consistency, and reliability of data. For components that work together to protect an access management systems.
example, healthcare providers must ensure the organization's assets and data. Security monitoring: Security monitoring
integrity of patient data to avoid medical errors that Access controls: Access controls ensure that only involves the use of tools and processes to
could lead to harm or loss of life. authorized individuals have access to sensitive detect, prevent, and respond to security
data and resources. incidents.
What are the three recognized variants of malicious Trojan horses: Mobile Trojan horses are disguised Write a short note on Network-Layer Attack. Ping of Death: Ping of Death involves sending This includes measures such as incident
mobile code? Explain. as legitimate apps or files but contain malicious A network-layer attack is a type of cyber attack oversized ping packets that can cause buffer response plans, backups, and disaster
The three recognized variants of malicious mobile code that can harm the device or steal sensitive that targets the network layer of the OSI overflow or crash the target system. recovery procedures. Reactive security also
code are viruses, worms, and Trojan horses: data. They often require user interaction to model, which is responsible for routing data SYN Flood: SYN Flood involves flooding a server involves monitoring for and responding to
install, such as downloading a malicious app from between different networks. Network-layer with fake TCP connection requests, security alerts or breaches.
Viruses: Mobile viruses are self-replicating programs a third-party source or clicking on a phishing link. attacks can disrupt the flow of legitimate overwhelming its resources and causing a denial
that infect other programs or files and spread traffic and cause denial of service (DoS) or of service. Proactive security: Proactive security is a
through shared devices or networks. They can cause These types of malicious mobile code can be used distributed denial of service (DDoS) attacks. ICMP Flood: ICMP Flood involves sending a high preventative approach that focuses on
various types of damage, including data loss, device to gain unauthorized access to devices or Some common types of network-layer attacks volume of Internet Control Message Protocol reducing the risk of security incidents
crashes, and unauthorized access. networks, steal personal or financial data, conduct include: (ICMP) packets to a target, causing network before they occur. This includes measures
espionage or sabotage, or launch distributed IP Spoofing: IP Spoofing involves manipulating congestion and making it unavailable. such as risk assessments, vulnerability
Worms: Mobile worms are similar to viruses but can denial of service (DDoS) attacks. To protect the source IP address of a packet to hide the Explain the two most common approaches of scans, penetration testing, and security
spread rapidly through networks or wireless against these threats, mobile users should use identity of the attacker or impersonate a security. awareness training. Proactive security also
connections without the need for a host program. antivirus software, keep their operating system trusted source. This can be used to bypass Reactive security: Reactive security is a defensive involves implementing security controls
They can cause significant damage to networks and and apps up to date, avoid downloading apps or filters or access restricted resources. approach that focuses on responding to security and policies to prevent or mitigate security
devices by consuming bandwidth, deleting files, or files from untrusted sources, and be cautious incidents after they occur. incidents.
opening backdoors for remote access. when clicking on links or attachments in emails or
messages.
Explain the best practices for network defence. Monitoring network activity: Use intrusion Explain three D’s of security. Defense: Defense refers to the ability to prevent Instead, organizations should focus on
Implementing strong authentication: Ensure that detection and prevention systems (IDS/IPS) and The three D's of security are: security incidents from occurring in the first place. implementing a comprehensive security
strong and unique passwords are used for all user security information and event management This involves implementing security controls, such program that combines preventative
accounts and that multi-factor authentication is (SIEM) tools to monitor network activity and Deterrence: Deterrence refers to measures as firewalls, access controls, and encryption, to measures with incident response and
enabled wherever possible to prevent unauthorized detect potential threats or breaches. that discourage potential attackers from protect against known vulnerabilities and prevent disaster recovery procedures. This includes
access. Conducting regular backups: Regularly backup attempting to breach security defenses. unauthorized access to sensitive data or systems. regularly assessing and updating security
Keeping software up to date: Ensure that all software, critical data and test the backup and recovery Examples of deterrence include visible security Explain the statement that “Achieving 100 controls and policies, implementing
including operating systems, applications, and procedures to ensure they are effective in the measures, such as surveillance cameras, percent protection against all conceivable
security awareness training for users, and
security tools, is kept up to date with the latest event of a security incident. warning signs, or security personnel, that attacks is an impossible job”
staying up to date with the latest security
patches and updates to address known User awareness training: Train users on security make it clear that security is being taken The statement "Achieving 100 percent protection
threats and best practices.
vulnerabilities. best practices, such as identifying phishing emails seriously. against all conceivable attacks is an impossible
Using encryption: Use encryption for sensitive data in and not sharing passwords, to help prevent social job" means that it is impossible to completely
transit and at rest to prevent unauthorized access or engineering attacks. Detection: Detection refers to the ability to eliminate all potential security risks and protect
interception. Regularly testing and updating security policies: identify and respond to security incidents as against all possible cyber attacks.
Network segmentation: Implement network Regularly test and update security policies and they occur. This involves implementing tools There will always be new and evolving threats,
segmentation to limit the impact of a security breach procedures to ensure they are effective and up to and processes, such as intrusion detection and attackers will constantly find new ways to
by isolating critical assets or data from the rest of the date with the latest security risks and compliance systems (IDS), that monitor network activity circumvent existing security measures.
network. requirements. and alert security teams to potential threats. Additionally, the cost and resources required to
achieve 100 percent protection would be
prohibitive and could negatively impact business
operations.
Write a note on Threat Vector. For example, if a common threat vector is phishing Two common types of application layer attacks This can be done through brute force attacks, Each layer provides a different type of
Threat vector refers to the method or path that a emails, organizations may implement email filters are buffer overflows and password cracking: dictionary attacks, or social engineering. To protection, and if one layer is breached, the
threat actor uses to gain unauthorized access to a and user awareness training to prevent users from Buffer overflows: A buffer overflow occurs prevent password cracking, organizations should next layer provides an additional layer of
system or network. It can include various attack clicking on malicious links or attachments. when an attacker sends more data to an enforce strong password policies, implement defense.
methods, such as malware, phishing emails, social Similarly, if vulnerabilities in software are a application than it is designed to handle, multi-factor authentication, and train users on The Onion Model typically includes multiple
engineering, or exploiting vulnerabilities in software or potential threat vector, organizations may causing the application to crash or behave how to recognize and avoid phishing emails and layers of security controls, such as firewalls,
systems. implement regular patching and vulnerability unpredictably. This can allow an attacker to other social engineering tactics. intrusion detection systems, antivirus
Understanding the potential threat vectors that an scanning to address these risks. execute malicious code or gain control of the Explain the Onion Model. software, access controls, and encryption.
organization may face is important in building a What are Application layer attacks? Explain affected system. The Onion Model, also known as the Defense in By layering these controls, organizations
comprehensive security program. By identifying the following Application layer attacks: To prevent buffer overflows, developers should Depth Model, is a security concept that involves can create a comprehensive security
different ways in which an attacker may try to breach i) Buffer overflows ii) Password cracking implement proper input validation and bounds layering multiple security controls to protect program that helps to minimize the risk of
security defenses, organizations can implement Application layer attacks are cyber attacks that checking in their code to ensure that against potential threats. security incidents and reduce their impact
appropriate security controls and policies to prevent target the application layer of the network stack. applications can handle data inputs safely. when they occur.
or mitigate these threats. These attacks can exploit vulnerabilities in Password cracking: Password cracking involves The model is based on the idea of an onion, with The Onion Model is widely used in the
application code, protocols, or services to gain using automated tools or techniques to guess each layer representing a different level of security industry as a best practice for
unauthorized access, steal data, or disrupt system or crack user passwords. security controls. The outermost layer is the first designing and implementing security
operations. line of defense and the innermost layer is the last controls. It provides a flexible framework
line of defense. that can be adapted to meet the specific
security needs of different organizations and
environments.
List and explain the steps to create a Security Defense Implement security controls: Implement security
Plan. controls to protect the identified assets and
The steps to create a Security Defense Plan can vary mitigate the identified risks. This includes firewalls,
depending on the organization and the specific intrusion detection systems, antivirus software,
security needs, but the following are some general access controls, and encryption.
steps that can be used:
Monitor and maintain security controls: Regularly
Identify assets: Identify the critical assets, data, and monitor and maintain security controls to ensure
systems that need protection, and prioritize them they are effective and up-to-date. This includes
based on their value and importance to the conducting vulnerability scans, penetration
organization. testing, and security audits.
Assess risks: Conduct a risk assessment to identify Train employees: Provide security awareness
potential threats and vulnerabilities that could affect training to employees to help them recognize and
the identified assets, and evaluate the likelihood and avoid security threats, and to ensure they
potential impact of each risk. understand and follow the organization's security
policies and procedures.
Develop security policies and procedures: Develop
policies and procedures to address the identified risks Respond to incidents: Develop an incident
and vulnerabilities. This includes defining acceptable response plan to respond to security incidents, and
use policies, access controls, incident response plans, ensure that employees are trained to follow the
and disaster recovery plans. plan in the event of an incident.
Define authentication. Explain two parts of Verification: Verification involves proving that the Role-based access control (RBAC): RBAC is a Discretionary access control (DAC): DAC is a less When a user wants to send a message to
authentication. person or system presenting the identifier is who widely used authorization system that assigns strict authorization system that allows users to another user, they encrypt the message
Authentication is the process of verifying the identity they claim to be. This can be done using a variety roles to users based on their job functions or grant or restrict access to resources based on using the recipient's public key. The
of a user or system before granting access to a of methods, such as passwords, biometrics, smart responsibilities. Each role is associated with a their discretion. In DAC, users are typically recipient can then decrypt the message
resource or service. It is a critical component of cards, or security tokens. The verification process set of permissions that determine what actions assigned ownership of resources and can grant or using their private key. This ensures that
security and helps to ensure that only authorized typically involves comparing the presented the user is allowed to perform. restrict access to those resources as they see fit. only the recipient is able to read the
individuals or systems are able to access sensitive identifier to a stored record of the identifier and Attribute-based access control (ABAC): ABAC is message, as only they have access to the
information or resources. verifying that they match. a more flexible authorization system that uses Explain public key Cryptography. private key.
a combination of attributes, such as user Public key cryptography is a type of encryption
There are two parts to authentication: Explain the authorization systems. attributes and resource attributes, to that uses a pair of keys to secure communication Public key cryptography is widely used for
Authorization systems are used to determine determine access. This allows for more fine- between two parties. The keys are generated in secure communication over the internet,
Identification: Identification involves presenting a what actions a user or system is allowed to grained control over access permissions. such a way that one key, called the public key, such as in HTTPS, SSH, and SSL/TLS
unique identifier, such as a username or email address, perform once they have been authenticated. Mandatory access control (MAC): MAC is a can be freely distributed to anyone, while the protocols. It is also used for digital
to the system. This identifier is used to distinguish the Authorization is typically based on a set of strict authorization system that is typically other key, called the private key, is kept secret by signatures, where a sender signs a message
user or system from others and initiate the predefined rules and permissions that determine used in high-security environments, such as the owner. using their private key to prove its
authentication process. which resources or services a user or system is government and military systems. In MAC, authenticity and integrity.
allowed to access, and what actions they are access is based on a set of predefined rules
allowed to perform on those resources. and labels that are assigned to users and
resources.
What are the three primary categories of storage Storage Area Network (SAN): SAN is a storage Integrity risks can have serious consequences Explain Database-Level Security. such as personally identifiable information,
infrastructure in modern storage security? Discuss. infrastructure that provides block-level storage to for organizations, including financial loss, Database-level security refers to the various by scrambling the data using cryptographic
The three primary categories of storage infrastructure multiple servers and applications. SAN uses a damage to reputation, and legal liabilities. For measures taken to protect the integrity, algorithms. Backups and recovery
in modern storage security are: dedicated network of storage devices and example, if a company's financial data is confidentiality, and availability of data stored mechanisms are used to protect against
Direct Attached Storage (DAS): DAS is a storage switches to provide high-speed access to storage compromised due to a cyberattack or system within a database. This type of security is data loss due to system failures, disasters,
infrastructure that connects directly to a server or resources. SAN is typically used in large enterprise error, it could lead to incorrect financial implemented at the database level, which or cyberattacks. Auditing tools are used to
computer, without the need for a network. DAS can environments where high-performance, scalable reporting and potential legal consequences. includes the database server, database monitor and track database activities and
be in the form of internal hard drives, external hard storage solutions are required. management system, and the underlying detect potential security breaches.
drives, or solid-state drives. DAS is typically used for Write a short note on integrity risks. To mitigate integrity risks, organizations should database files.
small-scale storage needs and is not recommended Integrity risks refer to the potential threats or implement a range of security measures and
for larger, enterprise-level applications. vulnerabilities that could compromise the best practices, such as access controls, data Database-level security involves several
Network Attached Storage (NAS): NAS is a storage accuracy, consistency, and reliability of data or backup and recovery procedures, and regular components, including access controls, data
infrastructure that connects to a network and systems. These risks can arise from various software updates and patches. They should also encryption, backups and recovery, and auditing.
provides storage services to multiple users and sources, including human error, system failures, implement mechanisms to detect and respond Access controls are used to restrict access to the
applications. NAS is typically used in small to medium- software bugs, and cyberattacks. to integrity breaches, such as monitoring tools, database and ensure that only authorized users
sized businesses and provides a centralized storage incident response plans, and employee training can view or modify data. Data encryption is used
solution that is easy to manage and access. programs. to protect the confidentiality of sensitive data,
Explain certificate-based authentication in detail. If the digital certificate is verified, the RBAC provides a more granular and flexible Write a note on symmetric key cryptography. Symmetric key cryptography is commonly
Certificate-based authentication is a type of network/system can then establish a secure approach to access control, as it allows Symmetric key cryptography is a type of used for encrypting data at rest, such as
authentication that uses digital certificates to verify connection with the user/device, and the organizations to define roles and assign encryption that uses the same key to both files and databases. It is also used for
the identity of users or devices accessing a network or user/device is granted access. This authentication permissions based on the specific needs of the encrypt and decrypt data. This means that both encrypting data in transit, such as in virtual
system. It involves the use of public key cryptography process is highly secure because it uses public key organization. This approach makes it easier to the sender and receiver of encrypted information private networks (VPNs) and secure socket
to establish trust between the user/device and the cryptography, which is resistant to hacking and manage access control across large and must have access to the same secret key in order layer (SSL) connections.
network/system. interception. complex environments, as permissions can be to communicate securely.
assigned and revoked based on changes in job To ensure the security of data transmitted
In this authentication process, a user or device is Write a note on Role-based Authorization duties or responsibilities. In symmetric key cryptography, the sender using symmetric key cryptography, the
issued a digital certificate by a trusted third-party (RBAC). RBAC also provides a higher level of security, encrypts a message using a secret key, and the secret key must be protected from
organization known as a Certificate Authority (CA). Role-based authorization (RBAC) is a type of as it allows organizations to limit access to receiver decrypts the message using the same unauthorized access. This is typically
The digital certificate contains the user/device's access control mechanism used in computer resources based on job duties and key. This type of encryption is fast and efficient, achieved using various security measures,
public key, as well as other identifying information, systems and networks to restrict access to responsibilities, rather than individual users. as the same key is used for both encryption and such as access controls, encryption of the
and is signed by the CA using their private key. When resources based on a user's role or job function This reduces the risk of unauthorized access decryption. However, symmetric key key itself, and regular key rotation.
the user/device attempts to access the within the organization. In RBAC, users are and potential security breaches. cryptography is less secure than other encryption
network/system, they present their digital certificate assigned roles or permissions based on their job RBAC can be implemented using various tools methods, as the key must be shared between the
to the network/system, which then verifies the duties or responsibilities, and access to resources and technologies, such as Active Directory, sender and receiver.
authenticity of the certificate by checking it against is granted based on these roles. LDAP, and other directory services. It can also
the CA's public key. be integrated with other security technologies,
such as multi-factor authentication, to provide
an even higher level of security.
Explain any two confidentiality risks. This makes it important for organizations to have Object-level security is typically implemented Differential Backup: A differential backup only Cloud Backup: A cloud backup stores backup
Two confidentiality risks that organizations face are: strong access controls and monitoring in place to through access control mechanisms such as includes changes made since the last full backup. data in a cloud-based storage solution. It
Data Breaches: Data breaches occur when detect and prevent insider threats. role-based access control (RBAC), which grants This makes it faster and more efficient than a full provides an off-site backup solution that is
unauthorized individuals gain access to confidential access based on the user's role within the backup but may require multiple differential typically cost-effective and scalable, but may
information. This can happen due to a variety of Write a note on object-level security. organization. Other mechanisms, such as backups to be restored to a specific point in time. require a reliable internet connection for
reasons, such as hacking, phishing, or theft of devices Object-level security refers to the use of access attribute-based access control (ABAC), may backup and recovery.
containing sensitive data. Once a breach occurs, controls to restrict access to individual objects or also be used to restrict access based on a Incremental Backup: An incremental backup only
confidential information such as personally data elements within an application or database. combination of factors such as the user's includes changes made since the last backup,
identifiable information (PII) or trade secrets may be This is in contrast to other types of security location, device, or other contextual whether it was a full or incremental backup. It is
exposed, leading to legal and financial repercussions controls that apply at a higher level, such as information. the most efficient backup type as it only includes
for the affected organization. system-level or application-level security. changes made since the last backup, but can be
Explain different types of database backups. more complex to restore as it requires all
Insider Threats: Insider threats occur when individuals Object-level security can be used to protect There are several types of database backups, incremental backups to be restored in order.
within an organization intentionally or unintentionally sensitive data elements or objects within an including:
disclose confidential information. This can happen due application or database, such as personal Snapshot Backup: A snapshot backup takes a
to a variety of reasons, such as a disgruntled employee identifying information (PII), financial data, or Full Backup: This type of backup includes a point-in-time copy of the database, allowing for
seeking revenge, or an employee inadvertently sharing confidential business information. By restricting complete copy of the entire database, quick restoration to a specific point in time. It is
confidential information with unauthorized access to these objects or data elements, including all data and database objects. It is typically used for high-availability systems and
individuals. Insider threats can be particularly difficult organizations can reduce the risk of data breaches the most comprehensive backup type but can requires specialized hardware or software.
to detect and prevent, as the individuals responsible or unauthorized access to sensitive information. be time-consuming and resource-intensive.
often have legitimate access to the confidential
information they are exposing.
Explain the Cisco Hierarchical Internetworking model. Core Layer: The core layer is responsible for On the other hand, network security refers to Write a short note on hubs and switches. On the other hand, switches are intelligent
The Cisco Hierarchical Internetworking model is a transporting large volumes of data quickly and the protection of a network and its resources Hubs and switches are two types of network network devices that operate at the data
three-layer network design used to guide the efficiently. Its primary function is to provide high- against unauthorized access, misuse, or devices used to connect multiple devices in a link layer of the OSI model. They connect
development of scalable, reliable, and secure speed, non-blocking switching using technologies modification. Network security involves the network. multiple devices in a network and allow
enterprise networks. The three layers of the model such as MPLS, ATM, or Ethernet. It should also be implementation of various technologies, them to communicate with each other.
are: designed to provide redundancy and high policies, and procedures to ensure the A hub is a simple network device that operates at However, switches can differentiate
availability. confidentiality, integrity, and availability of the physical layer of the OSI model. It connects between different network devices and
Access Layer: The access layer provides network access network resources. multiple devices in a network and allows them to traffic types, allowing them to direct traffic
to end devices such as computers, printers, and Explain network availability and security. communicate with each other. However, hubs are only to the intended recipient. As a result,
phones. It includes switches and access points, and its Network availability and security are two critical Both network availability and security are not intelligent devices and cannot differentiate switches can improve network performance
primary function is to connect end devices to the components of a successful network. Network essential for a successful network. Without between different network devices or traffic by reducing congestion and minimizing
network while providing security, port-based availability refers to the ability of a network to adequate security measures, the network is types. As a result, all traffic received by the hub is unnecessary network traffic.
authentication, and VLAN assignment. provide uninterrupted access to network resources susceptible to attacks that can compromise broadcast to all connected devices, leading to
and services. This includes maintaining high levels network availability and cause network network congestion and decreased performance.
Distribution Layer: The distribution layer provides of uptime, minimizing network downtime, and downtime. Conversely, without adequate
policy-based connectivity between the access layer ensuring network performance meets service level network availability, the network may be
and the core layer. Its primary function is to control the agreements (SLAs). inaccessible to authorized users, causing
flow of network traffic, apply quality of service (QoS) productivity losses and negatively impacting
policies, and provide routing between VLANs. the organization's operations.
Explain the features of firewall. VPN support: A firewall can provide virtual private Man-in-the-Middle (MitM) Attacks: In a MitM Password Attacks: Attackers can use various Outbound filtering typically involves setting
A firewall is a network security device that monitors network (VPN) support, allowing remote users to attack, an attacker intercepts and alters techniques to crack passwords used to secure up firewall rules and policies to control what
and controls incoming and outgoing network traffic securely access the network. network traffic between two parties, often wireless networks, such as brute force attacks, data can leave the network or system. This
based on predetermined security rules. Some of the Intrusion prevention: Some firewalls can also without either party knowing. Attackers can use dictionary attacks, and rainbow table attacks. can include blocking specific ports,
key features of a firewall include: include intrusion prevention systems (IPS) to this technique to steal sensitive information, Once an attacker has obtained the password, they protocols, or IP addresses that are known to
Packet filtering: A firewall can filter incoming and detect and prevent network attacks. such as login credentials or credit card can access the wireless network and potentially be associated with malicious activities.
outgoing packets based on their source and Logging and reporting: A firewall can generate logs numbers. steal sensitive information. Outbound filtering can also be used to
destination IP addresses, port numbers, and protocols. and reports on network traffic, allowing network Denial of Service (DoS) Attacks: In a DoS attack, restrict certain types of data from leaving
Application filtering: A firewall can also filter traffic administrators to monitor network activity and attackers flood a wireless network with traffic Write a note on outbound filtering. the network, such as sensitive information
based on specific application protocols, such as HTTP, identify potential security issues. to overwhelm it and make it unavailable to Outbound filtering is a security measure that or confidential data.
FTP, and SMTP. Explain the five different types of wireless legitimate users. This can disrupt business controls the flow of data leaving a network or
Stateful inspection: A firewall can track the state of attacks. operations and cause financial loss. system. It involves monitoring and controlling One of the key benefits of outbound filtering
network connections and only allow traffic that There are several types of wireless attacks that can outbound traffic to prevent unauthorized access, is that it can help prevent data exfiltration,
matches an existing connection. be used to compromise wireless networks. Here Evil Twin Attacks: Similar to rogue APs, data theft, and malware propagation. which is when sensitive data is stolen and
are five different types of wireless attacks: attackers can set up an evil twin AP to trick sent outside of the organization. Outbound
Access control: A firewall can enforce access control Rogue Access Points (APs): Attackers can set up users into connecting to it instead of the filtering can also help prevent malware from
policies to determine which network traffic is allowed rogue APs to mimic legitimate APs and trick users legitimate AP. This allows attackers to intercept propagating by blocking outbound traffic
or blocked based on user identity, device type, and into connecting to them. This allows attackers to and manipulate network traffic and steal that is associated with malware, such as
location. intercept and manipulate network traffic and steal sensitive information. command and control traffic.
sensitive information.
What are the countermeasures against the possible Monitoring: Regularly monitoring wireless Choosing the right type of antenna for a specific There are different types of NAT, including: Port Address Translation (PAT): PAT is also
abuse of wireless LAN? networks for unusual activity can help detect network application can help ensure optimal Static NAT: In this type of NAT, a public IP address known as NAT Overload. In PAT, multiple
There are several countermeasures that can be potential security threats before they can cause coverage and signal strength. is mapped to a single private IP address. This is private IP addresses are mapped to a single
implemented to prevent the possible abuse of wireless damage. Antenna positioning is also critical for achieving useful when a device on the private network public IP address by using different port
LAN, including: Firmware updates: Regularly updating firmware maximum network performance. The location needs to be accessible from the internet, such as numbers. This allows multiple devices on the
Encryption: Implementing strong encryption for wireless access points and other network of the antenna can affect signal strength, range, a web server. private network to share a single public IP
mechanisms, such as WPA2 or WPA3, can help prevent devices can help address known vulnerabilities and and interference from other wireless devices. address.
unauthorized access to wireless networks and protect improve overall network security. Antennas should be positioned in a clear line of Dynamic NAT: Dynamic NAT assigns a public IP NAT provides a layer of security by hiding
against eavesdropping. Explain the importance of antenna choice and sight, away from obstacles, and at a height that address from a pool of available addresses to a the IP addresses of devices on the private
Access control: Restricting access to wireless networks positioning. is appropriate for the application. device on the private network when it connects to network from the internet. It also allows
through the use of strong passwords, MAC address Antenna choice and positioning are important Explain in detail Network Address Translation the internet. When the device disconnects, the organizations to conserve their public IP
filtering, and other access control mechanisms can factors that can greatly impact the performance (NAT). public IP address is returned to the pool. address space, as multiple devices on the
help prevent unauthorized access. and effectiveness of wireless networks. Network Address Translation (NAT) is a private network can share a single public IP
Intrusion detection/prevention: Installing intrusion The choice of antenna can affect the range, technique used in networking to allow devices address
detection and prevention systems can help detect and directionality, and signal strength of a wireless on a private network to communicate with
prevent attacks against wireless networks, such as network. Different types of antennas have devices on the internet using a single public IP
rogue access points or denial of service attacks. different characteristics, such as omni-directional address. NAT works by modifying the source
antennas that provide a 360-degree coverage area, and destination IP addresses of network traffic
and directional antennas that focus the signal in a as it passes through a router or firewall.
specific direction.
Explain intrusion Defense System types and detection There are also different detection models used by Write a short note on Security Information and The primary benefits of SIEM are improved threat
models. IDS, including: Event Management. detection and incident response. It enables
Intrusion Detection Systems (IDS) are security tools Signature-based detection: This model uses a Security Information and Event Management security teams to quickly identify and respond to
used to detect unauthorized access to a network or database of known attack signatures to identify (SIEM) is a software solution that provides security incidents, reducing the time to detection
system. There are two types of IDS: network-based IDS and block malicious traffic. centralized security event management and log and remediation. Additionally, SIEM solutions
(NIDS) and host-based IDS (HIDS). Anomaly-based detection: This model looks for analysis. It collects, aggregates, and analyzes provide compliance reporting, enabling
NIDS monitors network traffic and looks for signs of abnormal behavior on the network or system and security events from various sources, including organizations to demonstrate compliance with
suspicious activity, such as unusual traffic patterns or alerts administrators when unusual activity is network devices, servers, and security industry regulations and best practices.
known attack signatures. Some popular NIDS include detected. appliances.
Snort and Suricata. Heuristic-based detection: This model uses SIEM tools use advanced analytics and machine
HIDS, on the other hand, runs on individual devices artificial intelligence and machine learning learning algorithms to identify patterns of
and monitors system activity for signs of unauthorized techniques to identify patterns of behavior that behavior that may indicate a security threat.
access or malicious activity. Examples of HIDS include may indicate an attack. They can also correlate events from different
OSSEC and Tripwire. Reputation-based detection: This model uses a sources to provide a more comprehensive view
reputation database to identify and block traffic of the security posture of an organization.
from known malicious IP addresses or domains.
What are components of Voice Over IP? Explain. Gateways: A gateway is a device that connects Write a short note on Private Bank Exchange. Call processing: This is the software that manages Biba model: It is the inverse of the Bell-
Voice over IP (VoIP) is a technology that enables voice VoIP networks to other types of networks, such as Private Bank Exchange (PBX) is a telephony the call routing, voicemail, and other features. LaPadula model, as it focuses on integrity
communication over IP networks. the public switched telephone network (PSTN). system used by organizations to manage Voice messaging: This feature allows users to instead of confidentiality. The Biba model is
Endpoints: These are the devices used to initiate and internal communication. It is a private leave and receive messages when the intended based on two properties: "no read down,"
receive VoIP calls. They can be software-based, such as Security: VoIP traffic is vulnerable to security telephone network used within an recipient is not available. which means that a subject at one security
softphones running on a computer or smartphone, or threats such as eavesdropping and call organization, and it enables users to make calls Call management: This feature allows level cannot read data at a lower security
hardware-based, such as IP phones. interception. Security measures such as encryption within the organization as well as to external administrators to manage and monitor call traffic, level, and "no write up," which means that a
Call Control: This is the software that manages call and authentication are required to protect VoIP numbers. PBX systems offer a range of features usage, and system performance. subject at one security level cannot write
signaling and call setup. It includes components such traffic. such as call routing, call forwarding, voicemail, Explain different classic security models. data at a higher security level.
as a call manager and a session border controller. and conference calling. There are three classic security models:
Codec: A codec is a device or software that compresses Together, these components enable the A PBX system typically includes the following Clark-Wilson model: It is a model for
and decompresses audio signals for transmission over transmission of voice communication over IP components: Bell-LaPadula model: It defines the security policy integrity and is designed to ensure that only
IP networks. The codec is responsible for converting networks. Telephone sets: These are the devices used to in terms of confidentiality. It is based on two authorized users have access to resources
analog voice signals into digital signals that can be make and receive calls. properties: "No read up," which means that a and that those users use those resources in
transmitted over an IP network. Trunks: These are the lines that connect the PBX subject at one security level cannot read data at a an authorized manner. It uses a set of rules
Quality of Service (QoS): VoIP traffic requires high- system to the telephone company's network. higher security level, and "no write down," which and procedures to enforce this, including
quality, low-latency network connections. QoS Switching network: This is the system that means that a subject at one security level cannot the separation of duties, where no single
technologies prioritize VoIP traffic to ensure that it is connects the telephones to each other and to write data at a lower security level. person has complete control over a process
not impacted by other network traffic. the outside world. or resource, and the use of transaction logs
to ensure accountability.
Write a short note on trustworthy computing. Security: Systems must be secure against Define your security policy: The security policy Monitor and maintain the IPS: Once the IPS is An ACL contains a list of rules that specify
Trustworthy computing refers to a set of principles and unauthorized access and other forms of malicious should outline your organization's goals, deployed, you must continually monitor and which types of traffic are allowed or denied
practices that are designed to ensure that computer activity. objectives, and compliance requirements. It maintain the system to ensure it's working based on various criteria such as source and
systems are reliable, secure, and dependable. These Privacy: Systems must protect the privacy of users should also define the security controls you will correctly. This includes updating the IPS software, destination IP addresses, port numbers, and
principles and practices are used to build and maintain and their data. implement and the criteria for triggering alerts tuning the system for optimal performance, and protocols. ACLs can be used to filter
computer systems that can be trusted to perform Reliability: Systems must be reliable and able to and blocking suspicious activity. reviewing logs to detect potential threats. incoming or outgoing traffic, or both.
critical tasks without error or failure. perform critical tasks without error or failure. Develop a deployment plan: The deployment Train your staff: Finally, it's crucial to train your There are two types of ACLs: standard and
Resilience: Systems must be able to recover quickly plan should include detailed steps for installing staff on the use of the IPS and the security policies extended. Standard ACLs can only filter
The concept of trustworthy computing was developed from attacks and other forms of disruption. and configuring the IPS, including network in place. This training should include best traffic based on the source IP address, while
by Microsoft in response to the growing concern over Transparency: Systems must be transparent in topology, IPS placement, and management practices for configuring the system, reviewing extended ACLs can filter traffic based on
security and reliability in computing systems. their operation and provide clear feedback to procedures. logs, and responding to alerts. multiple criteria, such as source and
Microsoft recognized that security and reliability were users. Test your IPS: Before deploying an IPS in a Write a note on Access Control List (ACL). destination IP addresses, port numbers, and
critical issues that needed to be addressed in order to List and explain steps to a successful IPS production environment, it's essential to test Access Control List (ACL) is a set of rules that are protocols.
build and maintain the trust of customers and users. Deployment plan. the system thoroughly in a lab environment. used to define and enforce access control policies ACLs are an important component of
Identify your network infrastructure: Before This testing should include validating IPS in a network or computer system. ACLs are network security and can help prevent
Trustworthy computing involves several key principles, deploying an IPS, it's crucial to have a clear policies and ensuring the system is correctly commonly used in routers, firewalls, and other unauthorized access and protect sensitive
including: understanding of your network infrastructure, detecting and blocking threats. network devices to control the flow of traffic information. However, they must be
including all devices, endpoints, and applications. through a network. carefully configured and maintained to
ensure that they are effective and do not
inadvertently block legitimate traffic.
Write a note on H.323 protocol that includes: ii) Purpose: The purpose of the H.323 protocol is to v) Recommendations: To ensure the security of
i) Governing Standard ii) Purpose iii) Function iv) provide a standard for multimedia communication communication over H.323, it is recommended
Known Compromises and Vulnerabilities v) over packet-based networks like the internet. to implement encryption, firewall protection,
Recommendations iii) Function: H.323 protocol enables and intrusion detection systems. Users should
H.323 is an ITU-T protocol that governs the standard communication between two or more devices over also ensure that their software and hardware
for multimedia communication over the internet. It an IP network by providing a set of specifications are up to date with the latest security patches
includes audio, video, and data conferencing services. for multimedia communication protocols. It and updates. Additionally, users should limit
The H.323 protocol is widely used for Voice over IP defines how audio, video, and data are transmitted the number of network ports open for H.323
(VoIP) and videoconferencing. over the network. communication to reduce the attack surface.
iv) Known Compromises and Vulnerabilities:
i) Governing Standard: The H.323 protocol has several known
H.323 is governed by the International vulnerabilities and compromises, including packet
Telecommunication Union-Telecommunication sniffing, denial of service attacks, and the
Standardization Sector (ITU-T). transmission of malicious code. Some of these
vulnerabilities are caused by poor implementation
of the protocol.
Define virtual machine. How is hypervisor What is cloud computing? State and explain the Platform as a Service (PaaS): It provides a Explain the application security practices and Code analysis and testing: Developers
responsible for managing all guest OS installations on types of cloud services. platform for customers to develop, run, and decisions that appear in most secure should use tools such as static code analysis
a VM server? Cloud computing is the delivery of on-demand manage their own applications without having development lifecycle. and dynamic application security testing
A virtual machine (VM) is a software-based emulation computing resources, such as servers, storage, to worry about the underlying infrastructure. Secure development lifecycle (SDL) is a set of (DAST) to identify vulnerabilities and
of a computer system that allows multiple operating applications, and services, over the internet. It PaaS provides tools, libraries, and services to practices and decisions that ensure the security of weaknesses in the application code.
systems (OS) to run on a single physical machine. The allows organizations to use these resources as help developers build and deploy applications. applications throughout the software Authentication and authorization: The
hypervisor, also known as a virtual machine monitor needed, without having to invest in and maintain Software as a Service (SaaS): It delivers development process. application should use strong authentication
(VMM), is responsible for managing all guest OS their own infrastructure. software applications over the internet, Threat modeling: This practice involves identifying and authorization mechanisms to control
installations on a VM server by providing a layer of The types of cloud services are: allowing customers to access and use them potential security threats and vulnerabilities in access to sensitive resources and data.
software abstraction between the physical hardware Infrastructure as a Service (IaaS): It provides through a web browser or mobile app. SaaS the application design, architecture, and code, Encryption: Sensitive data should be
and the VMs. virtualized computing resources, such as servers, eliminates the need for customers to install, and taking steps to mitigate them. encrypted in transit and at rest to prevent
The hypervisor creates and manages VMs, allocating storage, and networking, over the internet. configure, and maintain software on their own Secure coding: Developers should follow secure unauthorized access.
resources such as CPU, memory, and storage to each Customers can use these resources to create their computers. coding practices such as input validation, output Access controls: Access to system resources
VM as needed. It also provides a virtualized hardware own IT infrastructure, such as running applications encoding, and error handling to prevent common and data should be restricted based on the
environment to the guest OS, allowing the OS to or hosting websites. security vulnerabilities such as SQL injection, principle of least privilege, which means
operate as if it were running on a physical machine. cross-site scripting (XSS), and buffer overflows. granting users only the permissions they
The hypervisor also isolates each VM from other VMs need to perform their tasks.
and from the host OS, providing a secure environment
for each VM to operate in.
Explain the reasons for remote administration Compliance requirements: Many industries and Write a note Custom Remote Administration. Improved efficiency: Custom remote
security. What are advantages of web remote organizations are subject to regulatory Custom remote administration refers to the administration solutions can automate routine
administration? requirements that mandate the protection of development and deployment of a customized tasks and workflows, reducing the time and effort
Remote administration security is important to protect sensitive data and resources, including those remote administration solution to meet specific required to manage systems and resources.
against unauthorized access and ensure the accessed via remote administration interfaces. business needs. This can include creating
confidentiality, integrity, and availability of critical Advantages of web remote administration include: custom user interfaces, integrating with Enhanced security: Custom remote
data and resources. The following are some reasons Accessibility: Web remote administration allows existing systems, and automating tasks to administration solutions can incorporate
why remote administration security is important: administrators to manage systems and resources improve efficiency and reduce errors. advanced security features such as two-factor
Protection against external threats: Remote from anywhere with an internet connection, authentication, role-based access control, and
administration interfaces are often accessible over the reducing the need for physical access to the The benefits of custom remote administration encryption to protect against unauthorized access
internet, making them vulnerable to attacks such as system. include: and data breaches.
brute-force attacks, denial-of-service attacks, and Ease of use: Web-based interfaces are often more
malware. user-friendly and intuitive than traditional Tailored to specific needs: Custom remote Better integration: Custom remote administration
Protection against internal threats: Remote command-line interfaces, reducing the learning administration solutions can be designed to solutions can be integrated with existing systems
administration interfaces can also be targeted by curve for new administrators. meet the unique needs of a business, ensuring and workflows, reducing the need for manual data
insiders who have legitimate access to the system but Centralized management: Web remote that the solution is optimized for the specific entry and improving data accuracy.
may abuse their privileges to gain unauthorized access administration allows administrators to manage requirements of the organization.
or steal sensitive information. multiple systems and resources from a central
location, improving efficiency and reducing the risk
of errors.
UNIT 1 UNIT 2 UNIT 3 UNIT 4 UNIT 5
What are the importance of information protection? Define authentication. Explain two parts of Explain the Cisco Hierarchical Internetworking Explain intrusion Defense System types and Define virtual machine. How is hypervisor
Explain with example. authentication. model. detection models. responsible for managing all guest OS
Explain various components used to build a security Explain the authorization systems. Explain network availability and security. Write a short note on Security Information and installations on a VM server?
program. Explain public key Cryptography. Write a short note on hubs and switches. Event Management. What is cloud computing? State and explain
What are the three recognized variants of malicious What are the three primary categories of storage What are components of Voice Over IP? Explain. the types of cloud services.
mobile code? Explain. infrastructure in modern storage security? Explain the features of firewall. Write a short note on Private Bank Exchange. Explain the application security practices
Write a short note on Network-Layer Attack. Discuss. Explain different classic security models. and decisions that appear in most secure
Explain the two most common approaches of Explain the five different types of wireless Write a short note on trustworthy computing. development lifecycle.
security. Write a short note on integrity risks. attacks. List and explain steps to a successful IPS Explain the reasons for remote
Explain the best practices for network defence. Explain Database-Level Security. Deployment plan. administration security. What are
Explain three D’s of security. Explain certificate-based authentication in detail. What are the countermeasures against the advantages of web remote administration?
Explain the statement that “Achieving 100 percent possible abuse of wireless LAN? Write a note on H.323 protocol that includes:
protection against all conceivable attacks is an Write a note on Role-based Authorization (RBAC). i) Governing Standard ii) Purpose Write a note Custom Remote
impossible job” Explain the importance of antenna choice and iii) Function iv) Known Compromises and Administration.
Write a note on Threat Vector. Write a note on symmetric key cryptography. positioning. Vulnerabilities v) Recommendations
What are Application layer attacks? Explain following Explain the security considerations for
Application layer attacks: Explain any two confidentiality risks. Explain in detail Network Address Translation Write a note on Access Control List (ACL). choosing a secure site location.
i) Buffer overflows ii) Password cracking (NAT).
Explain the Onion Model. Write a note on object-level security. Explain the reference monitor concept and Explain the different factors for securing
List and explain the steps to create a Security Defense Write a note on outbound filtering. windows security reference monitor the assets with physical security devices.
Plan. Explain different types of database backups.
Explain the security considerations for choosing a Environmental considerations: The location should Explain the different factors for securing the Surveillance: Video cameras and other Maintenance: Regular maintenance and
secure site location. be chosen to minimize the impact on the assets with physical security devices. surveillance devices can be used to monitor and testing of physical security devices should be
Choosing a secure site location is an important part of environment, including considerations such as Securing assets with physical security devices record activity around the assets. This can help conducted to ensure that they are
physical security planning. The following are some noise pollution, air pollution, and waste disposal. involves a combination of various factors to deter potential threats and provide evidence in functioning properly and provide the
security considerations that should be taken into Proximity to critical infrastructure: The site should provide an effective security solution. The the event of a security incident. desired level of security.
account when choosing a secure site location: be located close to critical infrastructure such as following are some factors that should be Intrusion detection: Intrusion detection devices
power grids, telecommunications networks, and considered when selecting and deploying such as motion sensors and alarms can be used to
Natural disasters: The location should be chosen to transportation hubs to ensure reliable and efficient physical security devices: detect unauthorized access or tampering with the
minimize the risk of natural disasters such as floods, access. Risk assessment: A comprehensive risk assets.
earthquakes, and hurricanes. The site should also be Access to emergency services: The site should be assessment should be conducted to identify Environmental controls: Devices such as
evaluated for potential fire hazards and the availability located in an area with easy access to emergency potential threats and vulnerabilities to the temperature sensors and humidity sensors can be
of fire suppression systems. services such as police, fire, and medical services. assets being protected. This will help determine used to monitor environmental conditions and
Compliance requirements: The location should the appropriate level of security and the types prevent damage to the assets.
Physical security: The site should be secure from meet regulatory compliance requirements for the of devices needed. Redundancy: Redundant physical security devices
physical threats such as theft, vandalism, and industry or organization, including requirements Access control: Access control devices such as should be used to ensure that there is no single
terrorism. This may include fencing, security cameras, for physical security, environmental impact, and card readers, biometric scanners, and door point of failure in the security system.
guards, and access control systems. access to critical infrastructure. locks should be used to restrict access to the
assets to authorized personnel only.
Explain Locks and Entry Controls that should be considered while securing assets with physical security devices.
Locks and entry controls are important physical security devices that should be considered when securing assets. The following are some locks and entry controls that can be used to enhance physical security:
Deadbolts: Deadbolts are a type of lock that cannot be forced open easily. They provide an additional layer of security to traditional lock and key systems.
Smart locks: Smart locks use technology such as biometrics, key cards, or electronic codes to provide access control. They can be monitored and controlled remotely, making them useful for controlling access to assets in
different locations.
Access control systems: Access control systems use a combination of devices such as card readers, biometric scanners, and door locks to restrict access to authorized personnel only.
Security doors: Security doors are designed to resist forced entry and are often made of reinforced materials such as steel or aluminum.
Turnstiles: Turnstiles are used to control access to a particular area by allowing only one person to enter at a time. They are often used in high-security environments such as prisons or military bases.
Mantraps: Mantraps are small rooms that require a person to enter one door and be verified before being allowed to enter another door. They are useful for providing additional security at entry points.