KEMBAR78
Cyber Security Assignment Answers | PDF | Security | Computer Security
0% found this document useful (0 votes)
42 views3 pages

Cyber Security Assignment Answers

Uploaded by

jip224292
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views3 pages

Cyber Security Assignment Answers

Uploaded by

jip224292
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Cyber Security Assignment Answers

1. Cyberspace refers to the virtual environment of interconnected digital technologies, primarily involving the

internet, networks, computers, and software systems. It includes all forms of digital communication and

information exchange.

2. Key components include hardware (servers, routers), software (OS, browsers), networks (LAN, WAN),

protocols (TCP/IP), and data.

3. Communication technologies enable interaction via email, social media, VoIP, etc., enabling real-time data

exchange.

4. Internet is the global network of computers. The World Wide Web is a service on the internet that uses

browsers and hyperlinks.

5. Elements include physical infrastructure, IP addressing, DNS, IXPs, and governance bodies like ICANN.

6. Internet governance is technical/policy coordination; cyberspace regulation includes laws, enforcement,

and rights protection.

7. The Internet society shapes communication, commerce, education, and entertainment, influencing daily life

and culture.

8. Mechanisms include cyber laws, international regulations, and data protection policies to ensure safe

digital interactions.

9. Cybersecurity protects systems and data from threats. Its goals are confidentiality, integrity, and

availability.

10. Cybersecurity prevents identity theft, fraud, and data loss, ensuring safe online interactions and

infrastructure protection.

11. Issues: frequent attacks, APTs, lack of awareness, skills shortage, and evolving threats.

12. Categories: hacking, malware, phishing, identity theft, cyberstalking, and data breaches.

13. Methods: phishing emails, exploit kits, fake software, malicious links, and RDP exploits.

14. Attacks: phishing, vishing, smishing, pretexting, baiting-each manipulates human behavior to gain access.

Page 1
Cyber Security Assignment Answers

15. Zero Day: unknown vulnerability exploited. Zero Click: no user action required. Both are stealthy and

dangerous.

16. Steps: collect evidence, file complaint at cybercrime.gov.in, visit police, file FIR, cooperate in

investigation.

17. Methods: spoofed emails, infected attachments, exploit vulnerabilities, use cryptocurrency for ransom.

18. Offenses under IT Act: hacking, identity theft, cyber terrorism, obscene content-penalties include

imprisonment and fines.

19. Agencies: CERT-In, MeitY, NCIIPC, DRDO, DSCI, Cyber Crime Cell, C-DAC, NASSCOM.

20. Checklist: written complaint, ID proof, evidence, contact/device info, FIR copy, online complaint ref.

21. Social networks focus on user connections and interactions, unlike e-commerce or forums.

22. Types: networking (FB), microblogging (X), photo/video (Instagram), professional (LinkedIn), forums

(Reddit).

23. Features vary by platform (media type, length, audience, purpose).

24. Monitoring tracks mentions, trends, feedback for brand reputation and customer engagement.

25. Hashtags group topics, increase reach, and facilitate discovery.

26. Viral content spreads fast due to emotional impact, simplicity, timing, and influencer sharing.

27. A hashtag (#) categorizes content and aids discoverability.

28. Social media marketing increases visibility via engagement, ads, and brand storytelling.

29. Concerns: data misuse, tracking, identity theft. Protect via strong settings, passwords, and limited

sharing.

30. Challenges: algorithms, competition, feedback. Opportunities: wide reach, low cost, direct engagement.

31. E-Commerce is online buying/selling. It enables global reach, reduces costs, and streamlines business.

32. Components: website, catalog, cart, payment gateway, logistics, customer support.

Page 2
Cyber Security Assignment Answers

33. Security elements: encryption, authentication, fraud detection, secure payments, audits.

34. Digital payment enables quick and secure E-Commerce transactions.

35. Stakeholders: consumers, merchants, payment gateways, banks, regulators.

36. Modes: cards, UPI, wallets, AEPS, USSD.

37. Frauds: phishing, fake apps, QR scams. Prevent with verification and 2FA.

38. Endpoint security protects user devices from breaches and is key for data integrity.

39. Firewalls block unauthorized traffic; antivirus removes malware. Together they ensure protection.

40. Backups restore lost data after attacks. Best practices: automation, encryption, off-site storage.

41. Precautions: use trusted sources, verify apps, avoid pirated software, scan files.

42. Device security policy defines rules for secure usage, reducing risk of breaches.

43. Best practices: strong passwords, 2FA, updates, training, antivirus, backups.

44. Firewalls control traffic; antivirus stops malware. Combined, they provide robust defense.

45. Wi-Fi security: WPA3/WPA2, strong password, hide SSID, firmware updates, MAC filtering.

Page 3

You might also like