Mid - Term - Amrita Vishwa Vidyapeetham (Answer Key)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Amrita Vishwa Vidyapeetham

Amrita School of Computing, Coimbatore

B.Tech Degree Examinations - Sept 2024

First Semester

Computer Science and Engineering (Cyber Security)

24CYS101 Cybersecurity Essentials

Answer Key

1. Explain the following: (10 Marks)

(a) Denial of Service (DoS) vs Social Engineering

Denial of Service (DoS):

- A DoS attack aims to make a network service unavailable to users by overwhelming it with traffic or
requests, causing legitimate users to be unable to access the service.

Social Engineering:

- Social engineering exploits human psychology rather than technical vulnerabilities. Attackers
manipulate individuals into divulging confidential information, such as passwords or bank details,
often through phishing emails or phone calls.

(b) MAN vs WAN

MAN (Metropolitan Area Network):

- Covers a larger geographic area than a local area network (LAN) but smaller than a wide area
network (WAN). Typically spans a city or a campus, connecting multiple LANs.

WAN (Wide Area Network):

- Covers broad geographic areas, often connecting multiple MANs or LANs over long distances. The
Internet is the largest example of a WAN.

(c) Cyberstalking vs Cyberbullying

Cyberstalking:

- Involves repeated, targeted harassment using electronic means. The goal is to intimidate or control
the victim, often leading to severe emotional distress.

Cyberbullying:

- Involves aggressive behavior intended to harm or intimidate individuals, typically among peers. It
can include spreading rumors, sending threatening messages, or sharing embarrassing content.

(d) Confidentiality vs Integrity

Confidentiality:

- Ensures that sensitive information is accessed only by authorized individuals, preventing


unauthorized access or disclosure.
Integrity:

- Refers to the accuracy and reliability of data. It ensures that information is not altered or tampered
with during storage or transmission.

(e) Router vs Switch

Router:

- A device that connects different networks and directs data packets between them based on their IP
addresses. Routers can connect LANs to WANs and manage traffic between different networks.

Switch:

- A device that connects devices within the same network (LAN) and uses MAC addresses to forward
data only to the intended recipient. Switches operate at the Data Link layer of the OSI model.

2. Explain the role of hash functions in ensuring data integrity. How is it different from encryption? (3
Marks)

Role of Hash Functions:

- Hash functions take input data and produce a fixed-size string of characters, which is unique to that
specific input. If the input data changes, the hash will change as well, allowing users to verify data
integrity.

Difference from Encryption:

- Hashing** is a one-way function that generates a unique hash value for data, ensuring integrity but
not confidentiality. Encryption, on the other hand, transforms data into a secure format that can only
be read or decrypted by authorized parties, ensuring confidentiality.

3. Discuss the role of ransomware in cyber attacks. How does it work, and what steps can users take
to protect themselves from ransomware? (3 Marks)

Role of Ransomware:

- Ransomware is a type of malware that encrypts a user’s files, rendering them inaccessible until a
ransom is paid to the attacker. It can cause significant data loss and financial damage.

How it Works:

1. Infection: Typically spreads through phishing emails, malicious downloads, or vulnerabilities in


software.

2. Encryption: Once installed, it encrypts files on the victim’s system.

3. Ransom Note: The attacker demands payment, usually in cryptocurrency, to provide a decryption
key.

Protection Steps:

- Regularly back up data to an external drive or cloud service.


- Use robust antivirus and anti-malware software.

- Keep operating systems and software updated to patch vulnerabilities.

- Be cautious with email attachments and links.

4. Explain the working of Network Address Translation (NAT) in a network. (3 Marks)

Network Address Translation (NAT):

- NAT is a process used in routers to translate private IP addresses within a local network to a public
IP address for external communication.

Working:

1. Outgoing Traffic: When a device sends data to the internet, NAT changes the source IP address
from the private IP of the device to the public IP of the router.

2. Incoming Traffic: When a response is received, NAT translates the public IP back to the private IP of
the device that initiated the request.

3. Port Mapping: NAT keeps track of active connections through port numbers, ensuring that the
correct data is sent to the right device.

5. Explain how Message Authentication Code (MAC) ensures both integrity and authenticity. (3
Marks)

Message Authentication Code (MAC):

- A MAC is a short piece of information used to authenticate a message and ensure its integrity.

How it Works:

- It uses a secret key along with the message data to produce a hash value. This hash value is sent
along with the message.

- Upon receipt, the recipient uses the same secret key and the message to generate their own MAC.
If the computed MAC matches the received MAC, the message is deemed authentic and unaltered.

Benefits:

- Ensures integrity by verifying that the message has not been altered.

- Ensures authenticity by confirming that the message was sent by a legitimate source possessing the
secret key.

6. What is the difference between viruses and worms? Explain how each poses a threat to users’
privacy and security. (3 Marks)

Difference:
- Virus: A virus attaches itself to a host file and requires user action (like opening a file) to propagate.
It can corrupt or delete data and spread to other files and systems.

- Worm: A worm is a standalone malware that can replicate itself and spread independently across
networks without user intervention.

Threats to Privacy and Security:

- Viruses: Can corrupt files, steal personal information, and disrupt system operations, compromising
user privacy.

- Worms: Can consume bandwidth, create backdoors for other malware, and spread across networks
quickly, leading to significant data breaches and loss of privacy.

7. Describe Class A, B, and C private IP address ranges. (3 Marks)

Private IP Address Ranges:

- Class A: 10.0.0.0 to 10.255.255.255

- Supports a large number of hosts (over 16 million) and is typically used in large organizations

- Class B: 172.16.0.0 to 172.31.255.255

- Supports up to 65,536 hosts and is used in medium to large organizations.

- Class C: 192.168.0.0 to 192.168.255.255

- Supports 256 hosts and is commonly used in small networks, such as home and small business
networks.

8. Explain the role of a router in a network. How does it differ from other network devices like
switches and hubs? (4 Marks)

Role of a Router:

- A router connects multiple networks and directs data packets between them based on their IP
addresses. It determines the best path for data transmission, facilitating communication between
devices on different networks (e.g., between a home network and the internet).

Differences:

- Switch: Operates at the Data Link layer, connecting devices within the same network and using MAC
addresses to forward data to the correct device.

- Hub: A basic networking device that connects multiple Ethernet devices, making them act as a
single network segment. It broadcasts data to all ports, leading to potential data collisions.

9. What are the key components of a URL? Break down a sample URL and explain each part. (4
Marks)
Key Components of a URL:

1. Protocol: Indicates the method used to access the resource (e.g., HTTP, HTTPS).

2. Domain Name: The address of the website (e.g., www.example.com).

3. Port (optional): Specifies a port number to connect to (e.g., :80 for HTTP).

4. Path: The specific location of a resource on the server (e.g., /path/to/resource).

5. Query Parameter: Contains data sent to the server (e.g., ?id=123).

Example URL Breakdown: `https://www.example.com:443/path/to/resource?id=123#section1`

- Protocol: `https`

- Domain Name: `www.example.com`

- Port: `443`

- Path: `/path/to/resource`

- Query Parameter: `?id=123`

10. Explain the function and purpose of DHCP in a network. Outline the four key steps involved in the
DHCP process. (4 Marks)

Function and Purpose of DHCP (Dynamic Host Configuration Protocol):

- DHCP automatically assigns IP addresses and other network configuration parameters to devices on
a network, allowing them to communicate efficiently without manual configuration.

Four Key Steps in the DHCP Process:

1. DHCP Discover: The client broadcasts a request to find available DHCP servers.

2. DHCP Offer: DHCP servers respond with an offer, including an IP address and other configuration
information.

3. DHCP Request: The client selects one offer and broadcasts a request to accept it.

4. DHCP Acknowledgment: The DHCP server acknowledges the request, confirming the IP address
allocation and providing any additional configuration details.

11. Describe the function of the following

OSI layers: (10 Marks)

(a) Physical Layer

- Function: Deals with the physical connection between devices. It defines the electrical, mechanical,
and procedural standards for the transmission of raw data bits over a physical medium (e.g., cables,
switches).
(b) Data Link Layer

- Function: Provides node-to-node data transfer, error detection and correction, and defines
protocols for data frame synchronization. It includes protocols like Ethernet.

(c) Network Layer

- Function: Responsible for routing data packets between devices across different networks. It
handles logical addressing (IP addresses) and packet forwarding, including routing protocols like IP.

(d) Transport Layer

- Function: Ensures reliable data transfer between devices. It manages error detection, recovery, flow
control, and segmentation of data into smaller packets. Protocols include TCP (reliable) and UDP
(unreliable).

(e) Application Layer

- Function: Provides network services directly to applications. It facilitates user interfaces and
manages user interactions with software, enabling functions like file transfers, email, and web
browsing. Protocols include HTTP, FTP, and SMTP.

You might also like