Cyber Security
Q. What is Cyber Security?
Ans. The term Cyber Security is used to
refer to the security offered through
online services to protect your online
data. Cyber Security is necessary since it
helps in securing data from threats such
as data theft and also safe guards your
system from viruses.
What is Brute Force Attack?
Ans. Brute force Attack is one in which
hackers try a large number of possible
keyword or password combinations to gain
unauthorized access to system or file. Brute
force attacks are used to defeat
cryptographic scheme, such as those secured
by passwords.
Q. Why is it difficult to
perform Brute Force Attack
and write solution to Brute
Force Attack?
Ans. Brute Force Attack is Hardware
Intensive which means it consumes a lot of
processing power. Moreover it extends the
time needed to crack the code by huge
margin.
Solution to brute force attack is to use
passwords which are difficult to identify.
Make sure you does not repeat the
characters.(keep changing password)
Make longer passwords, don’t use your
name or family members name, use alpha
numeric characters.(use string of words, use
symbols)
Q. What is Data Interception
and Theft?
Ans. Normally data packets passing back
and forth between server and computer get
passed along in the normal way, from router
to router.
But with data Interception, an extra server
or router has been placed in the network so
that packets coming from the target
computer are re-directed, copied and sent
on.
The data within each packet such as
passwords or confidential information is
then extracted from the copied pack.
A defence to it would be to encrypt data
packet, the eavesdropper would then have
the extra task to do.
Q. What is Trojan Horse?
Ans. A Trojan horse is a type of malware
that downloads onto a computer disguised
as a legitimate program. A Trojan horse is so-
called due to its delivery method, which
typically sees an attacker use social
engineering to hide malicious code within
legitimate software. Trojans may allow an
attacker to access users' personal
information such as banking information,
passwords, or personal identity. It can also
delete a user's files or infect other devices
connected to the
network. Ransomware attacks are often
carried out using a Trojan.
Q. What are Solution to
Trojan Horse?
Ans. You must secure your computer with
an anti-virus software or anti-spyware
software. You should also keep them
updated always. Use a firewall. Firewalls
block unwanted connections, which can help
prevent Trojan horse viruses.
Q. What is Adware?
Ans. Adware is software that displays
unwanted (and sometimes irritating)
pop-up adverts which can appear on
your computer or mobile device. Adware
may slow down your computer and affect
browsing experience. It could also add
vulnerabilities to your computer that could
be exploited, and at times, it can collect and
send your browsing history to third parties
without your consent. It can also trick you
into installing a real malware using its ad
network.
Q. What is Solution to
Adware?
Ans.
• Scan Your Computer Using Malwarebytes
and Adware.
• Uninstall the adware.
• Scan Your Computer Weekly.
• Install Proven Antivirus Software.
Q. What is Ransomware?
Ans. Ransomware is extortion software
that can lock your computer and then
demand a ransom for its release. Depending
on the type of ransomware, either the entire
operating system or individual files are
encrypted. A ransom is then demanded from
the victim. Ransomware is often spread
through phishing emails that contain
malicious attachments or through drive-by
downloading. Drive-by downloading occurs
when a user unknowingly visits an infected
website and then malware is downloaded
and installed without the user's knowledge.
Q. What is Solution to
Ransomware?
Ans. Use anti-virus and anti-
malware software or other security policies
to block known payloads from launching,
Make frequent, comprehensive backups of
all important files and isolate them from
local and open networks.
Q. What is Social
Engineering?
Ans. Social engineering is a manipulation
technique that exploits human error to gain
private information, access, or valuables. In
cybercrime, these “human hacking” scams
tend to lure unsuspecting users into
exposing data, spreading malware infections,
or giving access to restricted systems.
Examples of social engineering range from
phishing attacks where victims are tricked
into providing confidential information,
phishing attacks where an urgent and official
sounding voice mail convinces victims to act
quickly or suffer severe consequences, or
physical tailgating attacks that rely on trust
to gain.
Q. What is Solution to Social
Engineering?
Ans. Delete any request for personal
information or passwords. Nobody should be
contacting you for your personal information
via email. Reject requests for help or offers
of help. Set your spam filters to high. Secure
your devices. Always be mindful of risks.