Assignmt
Explain obout the CAI toad auggeuted fox Secity.
A) The CIA Toad:
tsiad ts one o the moct inposlaut nodel
The CIA polieiea fox tnfor motian Secusuty
shich s dosignud to quide
wtthin an organizatin,
CIA S-tonds fes:
. Confidentiality
.Tteity
B. Avaulabilrty.
Confident iality authori3e inaivi
reasna thod ony the
Confidontiality cOn iew eneitive
oY closified ntosmati
dals /syctems can notuork shold st be aecesced
Aata beirg set oves the toy to
The
wnauthorised loble
owi on -tle
by data waing dbterat toole
Caste the to o s
nfoxnation.
Irtesret and goin accegs
Irtegpity tteoitywel, t
tok abot io
TTThe net thing to suse thot dta hog no bean moifi
here is naking s failue to maintain loa
iAaa
Corouption o doda
ed.
vdeity awailohle
Avoslabiltty should be seoily
the rtwosk to dota T
Thi rbane thod syteme and
sere. Thia applie to adinistratoy shoul
to its awoulabilty.the natwok hawe a olan
ene ua upnadas,
hardwahe ake regula a natos k. Atta
snairtain pewert bottleneck n
fail- oves and DDos sende a rretwor k Olae
ks suh mpa
the notwok ata exhated. The uhoxe.,
the e2ouas aseh
to e copanies dund
rou be significart oLg a psope
buginess tool lhus vreagu
relwoxkee
on tho to. pawert such attaeke.
showld be taken
)With a net diagram explain the Loyers of
Secusity
A) Tre 4 Layes o Cybes Secuoity
The Human
Lauyes
fehimates
Secuuty
Netwosk
Secty
Endpoint
secusity
ppltcat ion
secusity
Bat secusity
Mission
Csitical Asste
7 laers o cybersecuoity should ctes on the
The
rission cxiicat assata seaking to protect
yow noel to
.Mission Csitical Asset- Thia is the dota
wsity pends cortoe pzotect
. bota Secusity - Dota sec
the stoxag and trasfes o dosa secusity cortos pxsteat
a. Applicodion Secusity- Applte atios
access to n pplicotisn on oLPplicotions access to yos
intesnal se cubit t
risston cxttical aseet,ohd the
the appltcadisn
4¬nd poivt secuity- Endpoint secwsity cottsols poect
conoction batween dowices and the ntuox k
H
cortyols pootet
s Notuoosk Secuity- Network se cusity wnathaiaed
osganigodion's otwosk cnd paevert
scens o the notosk.
6.Regimate secusity Pe sù nates Secusity consos inalul
bsth the physiead and digitad Secusity mathodologie thot
psotect the bus iner ouera.
H.The Hwman Loye Humre se the weakogt ink in
Ay cybes secusity poste. Humn secusitg corthsoa
olude phishig simulli ons and occags managemat
nission csitical oseta fson
Cortols thot po tect
te
thowats inaludig eyboa cximi-
nealigert
vado, molicious (naidos, and
3 Discuas about
o vaious Cuber Thut
A) Visuse: Sinilas to the way th common cold sepltetas itsel
epeodedly in one persons boy and te than spsead a soften
s ueh oL way thot can be eoeilu
tonamittedfom on Compudes os syten to unsthes.
woKME: ae sivnilathey sps eod tsom one
Compuces
Cosnpteh to the next by sending ttsely to allt d thoa
then
wAeA's cartata and subseguary to al of the cartts
eantarts.
Tsojans : thase maicioua pieces of softwoe inset
Horselwes indoa egi tinote poam. Often people
systena in the forn
Nolusctauly l t tojan tnto thaih an acetttises they touel
email
tricke wsero tvdo belowie
Boque secuity softuate: tht nrfeted bth vizue. he
syatesm has bean
thoct thain secusuty sttwae thot tha thet atoy
tht
acconpogig proslem aetually cauts
coees (t.
pse.das to fix the yous browstny habits cd nd
JAduwase: that tsacka Although this is
to pop up.
pobdticulan alwetisemornta you may ewen age to
snsn and oftn something pon you otthou youn coso
ts Sornotimeg foisted oan harko3.a
adware otock: This occure
Denl o swice (Dos traie, making tt tpossible
uwbsrte wtth
|dageuseto ts cortent
nfiltsotions
Social engineringsensitiue doto
thacke : a e
Phishing wsongfy obtain Uia
ushose qoo is to and csedi cad numbere
poswoxole
os mal90 to be
such the hackes caues
enasla ef lint, douonoaded and intalel.
SAL niection a e netuok thret that irute
volicious code to nfiltrte eybe vulnohbilitiec
n dote systes.
Man-nthe-middle tacke; nwewe a third potcty
exploiting comwwni catirg batweay
tercep tng ond
psive Nst ony does
Ao entities thot should semoin be
eaues dxopping otu b to o (nfoxmat ion can changsd
4)Wyite abod Cycy ber Security Requlations (IT Aet)
A)A Cyber secuoàty xegotion compsises disectives that
Satequatd intowot ion technalogy and comptes systems
with the pupose o foscivg conpanies and osgaigation
to psotet thei syeteny for aybes ottaeke ike visuss
woY Ma, Tsojan hoyses and cortxo s t e n attoe ta
Thee are weros e s e e owailaale to Psevent
Cuber ottacks
cubes Secuity mesras ine lude firewals, nti-vixs
sotwae, intxws; on datecion cnd psevevtion sustee
csAusae,
encsyption ond dogin possu>ds.
Tss au fie psedoinant o s to cavea Lohen tt
Comss to cybe secuoity
Infoyrotion Techroloay Acty 2000
Tian cybes lauss he govened by the Inoxmatias
E.
Ad pernned doon baek 2000. The picipal
Techrolog is to eiabk egal inelusi
otter veiabk
kptus oft this Aet
of xeal
venens to elomeehca, facili tating segistyat ian
time ecovds with the Govenmad
the Peianent of Inda, highlill
The ItA, nated by
punishmants nd penatia safe guading
tha gievous and e-conoro seetoss.
ebankig,
the egouesnce, on,guilding the entire
The IT Aet is the salien
Tndian abercvimas xigoxoualy
gislat ion to qoven
5. brfy explain alout Maion, miki on and Ohedava q NSP.
Au:
Natonal tyber Seunty Rdiy uhamork hy Depatment
oh Elechoni and Infomatieo, Technolof |t cuims at protectmg
he publie and privct injras huctu trom uberattacks The poticy
atso ivclunds to
aafequand informalion, such as pexoral infomati or
finanial and ban king ingomm ation and sovereiqn data:
Thes oes
paxti cuatly selev ant in
Seasity Aqeny (NcA uaky thad cggtd the US qOvesnment
agpncus spyung on Indian es wh0 have no
technical Jde qucods aint it.
UISION:
To build a and ssilunt cyberspoce tor itizens
busines and qovenent and alo to protet anyone fom
intervering in wyev's piuaey
MISSION
To pmotect inomaton ond injomation ingrcutuctue in
yherspau, build tapabilties to prew ent and eupond to cyber
thead, 9edu velnnabiliitius and
nitnimie cmaa from cyber
inúcert
hrough a
com binaton of iutitutional shucteus
peorde, prouMes technotoqy,
, and Looperaton
OBIEIVE
Munisty e tomm unialiony and Inbrmaton Tech nalogy defens
objectwes CU folloux
To rente
eio sytem in the courty
qenaate and tonfidene in IT
ade quat uut and tonqidene tytem and
twaciona in uyhet space and dhehy enhanu ado phon
in all secton of the
th eLonomy
-T0 Cveate an mwtane tromeoork tor tu
policis and promotuon and enabling actions for
for complianu to qohal
4tuoity ttandaids and beut pactices by oay o con fom y
ases ment (Preluet, proeM, teehnoloH 4 reoe)
To
shengthen the Requlatoy Fraeucork or ensving o
SE CUE CNBER SPACE FCOSysTEN.
To enhane and Creale Nbtiona and Crctoral
mechanim -for
to T
obtaining hauqie nformatin xegading
ingastuctua
thrects
Acenaios tor esporueeoton
and
manaqsment hqh fte ctive precictie ,preverlie,
protetive 3S ore and RlONen action
6. frplain in detat the Diqitad Forensics Life yce
DIGITAL FORE NSIS LIFE CYCLE
loluctron Exariunatuon
DAnali rortiny
Media Deto Intomalion videnu
Cottectróo:
The fixt step in tHhe foensic prass u so idutly pokto
Soures e dato and atquis doto hom 4hem
franinatuon:
has been Lotteded ,Jhe nert pha! s to
dado, whith inolues ssing and erhacrg the selant piecc
intormatn fom the coleted deda This phae ray also iniolue
bpaning o iti gatg oc: opli cation teatuastd thstuou chte
and code, uch as doto compresion ,encry ptuon ard ats conto
mechanisms
Analy:
One
tla selutant inomatön has been ortatd, th aralft
should Atudy and anal the da do draw conclusiors tom d
The -foundeto a mhodica arpra to soch
appioprmate condusons baud on the
that no
condiusion can yd
Caporting
prom e perang ond inomation xtrg
a. Alterratie trplanain ken a ingormation xgudig
euent
incomplite , it may ol be peibls to cuive at a
dekinithe explaratuon ef what hapend. elhen an evet ha
tuwo OY mete plauible explanateon ,each
methocitas
approach to ctanmt to oT clispove ooch
posibla esp lanahon thad s proposd.
b. Audone Coniidutuon khDoing te
data or information til be shaun is imporlot.
C Ationabls Infomation eportrg auo ineldes iderdying atonab
ingmeton qaind fom data thot may allow analyt to coluet
new
he challegu Computes fnensics
the
Diglal fonensics has been deln
tocal the
desived ord proven methds
scianh ;caly validhdton aralys,
identcabicn -
Collec presevatico
evidence denivafive
inderpelafen and pesenlabron dq kal
4he ne constuclioo
fcm digi tal Soune s to oci lilabe
Criminal
found to be
thee chalenq Compesen
fonensics Ahe
Technita chatlerg
digad chaserges
Resounce
Ttchaital
Challer
challengus
ge
Aorensic epeas se
oTensie tools or
o
Crimirale Chiminals
chrede evidence ogai nt
collecngSuch tools o 4yoces then
Called
Crime foren sic this
shich Consideeo
Anti forensies technique
io fovensies cO0r
chalng into the
Ati forensics aoe
.
encmypion : fox
ertuning
intorabion b bidd en om ao
keeping Con also
uroabhorig pesson. Ubtorturabely
be
Cainiale to hide -thei
Csimes.
Dalo iding io
chune d cala inside 4he
hde
Crinirals
slorage meolium i ivisi ble orm by cig ydem
ommande pgams
Covert channel
rolocol ahich alh:
atfocken to byass intusion desecdion echrique
bven 4ho netoork
hde daßo
Jonisdiciora Con Cenns, ard ock
darclaudhe lolerabional Legication Compl'ade
-Hhe Segal acepk fonensice
The ate
guidelns ard sandards
t. Abeence
b haia, hee OTe
Colledoo evideno.
oorling the gudeins thei Ocon.
,)672
Linitalion hdian tidence
The the melhod Colecion
e-evidernce focuces the resenial'on
evidence the by Corlidate
Schsecoion
pe
the chalag Ciose incve Qes
he ro dalo
data
inease s ard he bndeo to aralyg Such hge
because
i's also increa6irg a dglal feenee upet
dig tal euidene Sensitve Compaucd o
evidene cauiy dtoppas
clalerg
t. chong Hebnology
Vokume ond eplicalt on
tonqdendiay , ovailalbibty bnd nhgily
The
elechanie db tumed easly onijpulalel
ane
8. lhat man
b
() Valnevabilily
oeaknecs in a
Vaberabi:y he gops
Syelon fhaf make thntods poccbe ad tempi
acfons to erploi4 hem.
Assef :
An Ases ang dab, deice
4ho is
Comparent
orgonjaliont yskre
Corlains Gen si hve
valvabe - ten because
cho. oY Can be
-to Qccecs Such infemaben
incident Has
Tt: is arny
)Acfve attocks, Passive attacke
cohich a
Aclive atfacks : 4 is a nelcodt
dato on th
hocer
dasa
mate
en nocee
donqs
to the
SCate
fausie atac elatvey
coith
chusfahsn ppetne, bul
qelalive e0se, ponlcalaly
ercayple
|(v) Cgben Allack, Cybn Cime lourckd by ogtr
Cyb AHack: 31 or
Cormpukns agair
one
Cnimials ueg reboork s
dafa et o.cbvty
1i Csimira
ime by ybe
hal
4o deal ney
hackens ccho
Oiminals
Coth a
vokes caeaing P podes
serden's ldenti4y
hde he
Saunce adchess to
Corvronly used in Cben atlats
fonensice: araly sing diqlal
and
is a pceas o endiocing9
oflen involing ntcovesing
delesed
evidence Ocdivifias
Aacing dqta
evidene : tronsnitted in birong orro
eBoved
inqonabion Court.
Con be oud
bo neied
roble phones esc.
hond he
Compdes
Chain Qurstody doceumerds the
Cunaltered o
it's
eviderce , encuring
kordbng
colleclon o tourt pecnlation