BIS Question Answer Bank
BIS Question Answer Bank
Non-repudiation – This guarantees that a party in a communication cannot deny having sent or
received a message. It ensures accountability by providing proof of origin and delivery, typically using
digital signatures and cryptographic methods. Non-repudiation is essential in legal and financial
transactions to prevent disputes.
Or
Differentiate data confidentiality and data integrity. [W-2022]
(3Marks)
[ANS]
4. Define Security attacks and describe any two attacks in detail. [S-
2024] (3,7Marks)
[ANS]
Security attacks refer to the risks that threaten a system's security. These are unauthorized or illegal actions
aimed at government, corporate, or private IT assets to destroy, modify, or steal sensitive data.
Security attacks are categorized into:
1. Active Attacks
2. Passive Attacks
3. Denial of Service (DoS) Attacks
1. Active Attacks
An active attack involves the modification of transmitted data or the creation of new false data streams.
These attacks actively alter the system’s integrity and can cause direct harm.
Types of Active Attacks:
1. Masquerade Attack
o Occurs when an entity pretends to be another entity to gain unauthorized access.
o Example: An attacker captures authentication credentials and reuses them to impersonate a
legitimate user.
Passive Attack
A passive attack is an attack where the attacker attempts to learn or make use of information from
a system without affecting system resources. Since these attacks do not alter or damage data, they are
difficult to detect.
Types of Passive Attacks:
1. Release of Message Contents
o In this type of attack, a mail message, phone call, or any transmitted message is
intercepted or listened to by an unauthorized entity.
o Example: A hacker secretly listens to a private phone conversation.
2. Traffic Analysis
o Involves observing the pattern of communication between a sender and receiver. The
attacker analyses the frequency, length, and timing of messages to gain insights.
o Example: An attacker monitors encrypted emails between two parties to determine
communication patterns.
UNIT – 2
1 Construct a PlayFair Matrix with the key “TRUST” and encrypt the message “BE CONFIDENT IN
YOURSELF”. [W,S-2024, W2023] (7 Marks)
2 Encrypt the plain text “THIS IS A SECRET MESSAGE” using a Rail Fence with 3 rails. [W,S-2024]
(7 Marks)
3 Differentiate between symmetric key cryptography and
asymmetric key cryptography. [W 2024] (4Marks)
[ANS]
Text Steganography – Hiding data in text by changing formatting, replacing words, or using random
characters.
Image Steganography – Hiding data in images by modifying pixels.
Video Steganography – Hiding data inside a video stream (images and sounds).
Audio Steganography – Embedding secret messages in audio files by altering their binary sequences.
Network Steganography – Also called protocol steganography, it hides data within network traffic
patterns
Substitution Techniques
Substitution techniques involve replacing letters with other letters, numbers, or symbols. The original
characters of the plaintext are replaced according to a specific rule to form the ciphertext
Types of Substitution Ciphers:
1. Monoalphabetic Cipher
o Each letter in the plaintext is replaced by another letter based on a fixed substitution rule.
o Example: If letter A is replaced by G, every A in the plaintext will always be replaced by G.
o Example Ciphers:
▪ Caesar Cipher (Each letter is shifted by a fixed number).
2. Polyalphabetic Cipher
o Uses multiple substitution alphabets, meaning the same letter may be replaced by different
letters at different positions.
o Example: The letter A may be replaced by C in one place and by N in another.
o Example Ciphers:
▪ Vigenère Cipher (Uses a keyword to change substitutions at different positions).
Examples of Substitution Ciphers:
1. Caesar Cipher
2. Playfair Cipher
3. Hill Cipher
4. One-Time Pad
Transposition Techniques
Transposition techniques rearrange the order of characters in the plaintext without changing their identity.
Instead of substituting letters, the position of letters is changed to create the ciphertext.
Types of Transposition Ciphers:
A) Rail Fence Cipher
• The plaintext is written in a zig-zag pattern and then read row by row.
B) Columnar Transposition Cipher
• The plaintext is written in columns, then rearranged based on a key.
✔ Difference:
• Substitution Ciphers: Change the actual letters in the text.
• Transposition Ciphers: Only change the order of the letters.
DES is a symmetric-key block cipher used for data encryption. It was developed by IBM and later
adopted by NIST as a standard encryption method.
type: Block cipher (encrypts data in fixed-size blocks).
Block Size: 64-bit.
Key Size: 64-bit (only 56 bits are used, 8 bits are for error checking).
Encryption Process:
• Uses two permutations (P-boxes):
1. Initial Permutation (IP) – Scrambles data before encryption.
2. Final Permutation (FP) – Rearranges data after encryption.
• 16 Feistel Rounds: Data is split into two halves and processed multiple times for security
Key Features of DES
• Feistel Cipher Structure with 16 rounds.
• Block Size: 64-bit.
• Key Length: 64-bit (only 56 bits used for encryption; 8 bits are for error checking).
Components of DES
1. Round Function – Performs encryption in each of the 16 rounds.
2. Key Schedule – Generates 16 subkeys from the main key.
3. Initial and Final Permutations (IP & FP):
o These are Permutation Boxes (P-boxes) that shuffle data.
o IP (Initial Permutation) rearranges bits before encryption.
o FP (Final Permutation) restores the order after encryption.
o They do not add security, only structure the data.
Input Data (Plaintext) → Initial Permutation (IP) → 16 Rounds of Encryption → Final
Permutation (FP) → Encrypted Data (Ciphertext)
Round Function
The DES function f applies a 48-bit key to the rightmost 32 bits to produce a 32-bit output.
The round-key generator creates sixteen 48-bit keys out of a 56-bit cipher key.
UNIT – 3
Public-key cryptosystems play a crucial role in ensuring secure communication and data protection across
various applications. Below are some key areas where public-key cryptography is widely used:
1. Secure Communication
Public-key cryptography is extensively used to establish secure communication channels over insecure
networks.
Example: Online banking and e-commerce transactions.
2. Digital Signatures
It is employed to create and verify digital signatures, ensuring the authenticity and integrity of digital
messages.
Example: Signing digital documents or emails to prove the identity of the sender.
3. Email Encryption
Public-key cryptography is utilized to encrypt emails and authenticate the sender’s identity.
Example: Pretty Good Privacy (PGP) and S/MIME protocols for secure email communication.
4. Virtual Private Networks (VPNs)
It is used to establish secure connections between remote users and private networks over the internet.
Example: VPNs and other VPN protocols like OpenVPN and IPsec.
5. Secure Chat and Messaging Apps
Public-key cryptography ensures the confidentiality and integrity of messages in secure chat and messaging
applications.
Example: Signal, WhatsApp, and Telegram implement end-to-end encryption.
6. Secure File Transfer
It secures file transfers by encrypting files before transmission and decrypting them at the destination.
Example: SFTP (Secure File Transfer Protocol) and encrypted file attachments in emails.
7. Key Exchange Protocols
Public-key cryptography is used in key exchange protocols to establish shared secret keys for symmetric
encryption.
Example: Diffie-Hellman and RSA key exchange protocols.
✔ Also Known as Asymmetric Key Infrastructure – Uses a key pair for encryption and decryption.
✔ Ensures Secure Data Exchange – Allows users to securely exchange data over an untrusted network
using public and private key cryptography.
✔ Consists of a Key Pair – Includes a Private Key and a Public Key.
✔ Private Key Must Be Kept Secret – Only the owner should have access to it.
✔ Public Key Needs to Be Distributed – Shared openly for encryption and verification purposes.
✔ Encryption and Decryption – Data encrypted with one key can only be decrypted with the other.
✔ Public Key Management Challenge – The main issue in PKI is managing public keys securely.
✔ Solution: Digital Certificates – PKI uses digital certificates to bind public keys to their owners.
✔ Secure Key Distribution – Digital certificates help securely distribute public keys in large networks.
✔ Entity – The end user of PKI services, such as:
• A person
• An organization
• A device (e.g., router)
✔ Certificate Authority (CA) – A trusted entity responsible for:
• Issuing digital certificates
• Verifying the identity of certificate holders
✔ Registration Authority (RA) – Handles:
• Identity authentication of users
• Key pair generation (public/private key creation)
• Key pair backup for security
✔ PKI Repository – A server or common database that:
• Stores and manages certificate requests, issued certificates, and keys
• Allows entities to retrieve local and CA certificates (e.g., via an LDAP server)
A Digital Signature is a cryptographic technique used to provide authentication, integrity, and non-
repudiation in digital communication.
Key Features of Digital Signatures
• ✔ Acts as a Unique Code – Enables the sender to attach a unique code that serves as a
signature.
• ✔ Used When Trust is Limited – Necessary when there is no complete trust between the sender
and receiver.
• ✔ Electronic Authentication – Ensures the identity of the sender and verifies that the content
remains unchanged.
• ✔ Ensures Integrity – Guarantees that the message or document has not been altered during
transmission.
• ✔ Prevents Denial (Non-Repudiation) – The sender cannot deny having sent the message.
Properties of a Digital Signature
1. Verification of Sender, Date, and Time
o Confirms the identity of the sender and records the exact time of signing.
2. Authentication of Content
o Ensures that the content remains unchanged from the time of signing.
3. Verifiability by Third Parties
o Can be verified by independent third parties to resolve disputes regarding authenticity.
UNIT – 4
A Demilitarized Zone (DMZ) is a security barrier that separates an organization's internal network from the
internet, providing an additional layer of protection against online threats. Despite its serious-sounding
name, a DMZ is a vital tool for securing a network and preventing unauthorized access.
Understanding DMZ Functionality
• The DMZ acts as a protective wall, separating the trusted internal network from the untrusted external
network (such as the internet).
• It functions as a filter that manages requests from external users who need to access company services,
such as a website or email server.
• The primary goal of a DMZ is to allow controlled access from external sources while keeping the
internal network secure.
• DMZs are typically used in combination with firewalls to strengthen cybersecurity measures.
• By placing critical services within a DMZ, businesses can prevent direct exposure of internal systems to
potential threats.
Applications of DMZ
1. Web Servers: Hosting web servers in the DMZ enables external users to access a company’s website
without connecting to the internal network, protecting sensitive data.
2. Email Servers: Placing email servers in the DMZ ensures that external communications (such as client
emails) are processed securely before reaching the internal network.
3. FTP Servers: File Transfer Protocol (FTP) servers in the DMZ allow secure file transfers while
preventing unauthorized access to internal infrastructure.
4. DNS Servers: Domain Name System (DNS) servers in the DMZ handle external DNS requests,
isolating this critical service from the internal network to reduce attack risks.
5. Authentication Services: Placing authentication servers in the DMZ enables external users to verify
their credentials without directly accessing internal user databases, enhancing security.
6. Virtual Private Network (VPN) Servers: DMZs often host VPN servers, providing secure remote
access to internal resources while maintaining network integrity.
Advantages of DMZ
• Enhanced Security: Acts as a buffer zone, preventing unauthorized access and reducing security risks.
• Isolation of Critical Services: Web, email, and DNS servers can be segmented in the DMZ, reducing
the impact of security breaches.
• Controlled Access: Ensures restricted and monitored access to external users while protecting internal
systems.
• Secure Internet Connectivity: Proxy servers in the DMZ enable safe internet access, filtering potential
threats.
• Protection Against External Threats: By processing external requests within the DMZ, malware, hacking
attempts, and cyber threats are neutralized before reaching the internal network.
Disadvantages of DMZ
• Complex Implementation: Setting up and managing a DMZ requires advanced network security
knowledge and often specialized hardware/software.
• Potential Performance Overhead: Additional security layers may slow down communication between
external and internal networks.
• Maintenance Challenges: Regular updates and monitoring are needed to keep the DMZ effective
against evolving cyber threats.
2. Describe working and components of IDS. [W,S-2024] (4,7 marks)
An Intrusion Detection System (IDS) is a monitoring system that detects suspicious activities within a
network and generates alerts when potential threats are identified. Network administrators use these
alerts to investigate security incidents and take necessary actions to remediate threats.
Components of IDS
Sensors
• Sensors capture and collect data from the network, including monitoring traffic, packets, or log files.
• Network-based IDS (NIDS) sensors are placed at strategic points in the network to analyze data in
transit.
Analyzers
• Analyzers examine data collected by sensors.
• They use different detection techniques, such as:
o Signature-Based Detection – Matches network activity against known attack patterns.
o Anomaly Detection – Identifies deviations from normal network behavior.
o Behavioral Analysis – Observes user and system behavior to detect threats.
Database
• Stores essential information for comparison and analysis, such as:
o Known attack signatures
o Baseline network behavior
o Historical security data
• The database is continually updated to adapt to emerging threats.
Alerting System
• Generates alerts when suspicious activity is detected.
• Notifies security personnel or a Security Operations Center (SOC) to take immediate action.
User Interface
• Provides a platform for security administrators to:
o Configure IDS settings.
o Review alerts.
o Manage system responses.
• Enhances interaction for effective monitoring and response.
Logging and Reporting
• Maintains detailed logs of detected events for future analysis.
• Supports post-incident investigation and compliance reporting.
Response Mechanism
• Some IDS systems can initiate automated responses to mitigate threats, such as:
o Blocking malicious IP addresses.
o Adjusting firewall rules.
• Manual response options are also available for handling complex security incidents.
Update Mechanism
• Ensures the IDS stays up-to-date with the latest:
o Threat intelligence
o Attack signatures
o Software patches
• Regular updates are crucial to maintaining effective threat detection.
A firewall is a network security device or software program that monitors and filters incoming and outgoing
network traffic based on a predefined set of security rules. It acts as a barrier between a private internal
network and the public internet, ensuring that only legitimate traffic is allowed while blocking potentially
harmful data.
Functions of a Firewall:
• Firewalls are designed primarily to allow non-threatening traffic while preventing malicious traffic, thus
protecting computers from viruses and cyber threats.
• They serve as a cybersecurity tool that filters out malicious or unwanted traffic and prevents infected
software from accessing the internet.
Types of Firewalls:
1. Hardware Firewalls – These are physical network security devices that regulate traffic between
external networks and internal systems.
2. Software Firewalls – These are security programs installed on a computer or server to monitor and
control network activity.
TYPES OF FIREWALL
1. Packet-filtering Firewalls
2. Circuit-level Gateways
3. Application-level Gateways (Proxy Firewalls)
4. Stateful Multi-layer Inspection (SMLI) Firewalls
5. Next-generation Firewalls (NGFW)
6. Threat-focused NGFW
7. Network Address Translation (NAT) Firewalls
8. Cloud Firewalls
9. Unified Threat Management (UTM) Firewalls
A Packet Filtering Firewall is a network security device that operates at the network layer (Layer 3) of
the OSI model. Its primary function is to examine packets of data as they move through the network and
make decisions based on predefined security rules.
Key Functions of a Packet Filtering Firewall:
• Analyzes incoming and outgoing data packets.
• Determines whether packets should be allowed or blocked based on set rules.
• Helps control network traffic and enhances security by preventing unauthorized access.
Types of Packet Filtering:
Packet filtering can be classified into four types:
1. Dynamic Packet Filtering – Adjusts filtering rules dynamically based on network activity and
connection status.
2. Static Packet Filtering – Uses fixed, manually configured rules to filter traffic.
3. Stateless Packet Filtering – Examines each packet independently without keeping track of established
connections.
4. Stateful Packet Filtering – Monitors active connections and retains context to make more informed
filtering decisions.
Working of a Packet Filtering Firewall:
1. Packet Inspection: When data packets attempt to pass through the network, the firewall examines each
packet to identify its content and determine its legitimacy.
2. Rule Matching: The firewall checks the packet against predefined security rules, which may include
parameters such as IP addresses, port numbers, and protocols.
3. Decision Making: Based on the rules, the firewall either allows or blocks the packet, ensuring secure
network communication.
2) Application-Level Gateway
An Application-Level Gateway (ALG) firewall, also known as a Proxy Firewall, is a network security device
that operates at the application layer (Layer 7) of the OSI model. Unlike traditional packet-filtering firewalls
that work at the network layer, ALG firewalls inspect and control traffic based on specific applications and
protocols.
Key Features of an ALG Firewall:
• Examines and filters network traffic at the application layer.
• Uses proxies to mediate communication between internal users and external networks.
• Provides an additional layer of security by verifying data before allowing access.
Working of an ALG Firewall:
1. Security Checkpoint: The ALG firewall acts as a security checkpoint, standing between internal users
and the internet.
2. Traffic Inspection: It checks all incoming and outgoing traffic at the application layer to detect and
block potential threats.
3. Proxy Functionality: Instead of allowing direct communication, it uses proxies to establish secure
connections, ensuring that external traffic does not interact directly with internal network resources.
4. Application Layer Focus: Since it operates at Layer 7, it manages network applications and software,
ensuring that only verified connections are established.
5. Enhanced Security: By verifying data packets before granting access, ALG firewalls make it
significantly harder for intruders to penetrate the network or extract sensitive information.
6. Controlled Network Access: In a network protected by an ALG firewall, only one designated server has
direct access to the internet. All other devices must route their traffic through this server, reducing
exposure to external threats.
A Host-Based Intrusion Detection System (HIDS) is a security solution designed to monitor and analyze
activities occurring on individual computer systems or hosts. Unlike Network-Based Intrusion Detection
Systems (NIDS), which focus on network traffic monitoring, HIDS operates directly on a host machine,
detecting suspicious behaviour at the operating system and application levels.
Working of HIDS
1. Data Collection
o HIDS gathers information from servers, computers, and host systems.
2. Data Types Analyzed
o Examines security logs such as authentication records.
o Analyzes operating system and application logs to identify unusual patterns.
3. Pattern Recognition
o Detects anomalies or suspicious behavior by comparing current data with previous snapshots.
4. Response Action
o Security teams can block suspicious IP addresses or take other preventive actions based on alerts.
5. Data Correlation
o Links different data sources to provide a deeper context about potential security threats.
6. Interpretation
o Helps determine whether attackers are probing for vulnerabilities (unsuccessful) or have
successfully breached the host system.
7. Alert Generation
o Issues alerts when suspicious activity is detected.
o Alerts assist in quickly identifying security issues and allow rapid responses to mitigate cyber
threats.
Advantages of HIDS
Individual Host Protection
• Focuses on securing each host system, making it effective in detecting host-specific threats.
Insider Threat Detection
• Monitors user activities on the host, identifying unauthorized or suspicious actions from inside the
organization.
System Integrity Monitoring
• Tracks critical system files and configurations, detecting unauthorized changes to maintain system
integrity.
Log Analysis
• Examines local logs and system events to identify anomalies, security incidents, or signs of compromise.
Low Network Impact
• Operates independently of network traffic analysis, reducing its impact on overall network performance.
Application-Level Monitoring
• Detects threats at the application level, monitoring software and services running on the host.
Disadvantages of HIDS
Resource Intensive
• HIDS requires significant processing power to continuously monitor and analyze activities, potentially
slowing down the host system.
High Deployment & Maintenance Overhead
• Deploying and managing HIDS on multiple hosts in large networks can be time-consuming and
resource-intensive.
Dependency on Host Integrity
• If the host is compromised, the HIDS might also be affected, reducing its reliability and effectiveness.
Limited External Threat Visibility
• HIDS is focused on the host system, meaning it may fail to detect external threats targeting the network
infrastructure.
Scalability Challenges
• Scaling HIDS across large networks is complex due to the need for individual deployment,
configuration, and management on each host.
Limited Network Traffic Coverage
• While effective at host-level monitoring, HIDS does not provide complete visibility into network-wide
attacks.
OR
6. Describe Network Based Intrusion Detection System. [W,S-2024]
(7 marks)
[ANS]
A Network Intrusion Detection System (NIDS) is a security tool designed to monitor and analyze
network traffic for suspicious activities. It helps identify potential threats, such as hacking attempts,
malware infections, and unauthorized access. When a potential security breach is detected, NIDS
generates alerts to notify administrators.
Working of NIDS
1. NIDS Function
o Monitors network traffic for signs of attacks or intrusions.
2. Operating Modes
o Passive Mode: Observes network traffic without altering or blocking it.
o Inline Mode: Can modify or block network traffic to prevent intrusions (not always
recommended).
3. Alert Generation
o When a potential threat is detected, NIDS generates an alert.
4. Alert Content
o Provides attack details, including:
▪ Type of attack
▪ Source and destination IP addresses
▪ Timestamp
5. Action Taken
o May take preventive actions, such as:
▪ Blocking the source IP
▪ Modifying network traffic
6. Data Gathering
o Collects incoming and outgoing network traffic information.
7. Sensor Placement
o Strategic deployment of sensors in areas such as:
▪ Local Area Networks (LANs)
▪ Demilitarized Zones (DMZs)
8. Detection Methods
o Signature-Based Detection: Compares network activity against known attack patterns.
o Anomaly-Based Detection: Identifies deviations from normal network behavior.
9. Alerts for Investigation
o Generates alerts when detecting suspicious activities, such as:
▪ Unusual traffic spikes
▪ Repeated unauthorized access attempts
Advantages of NIDS
Comprehensive Network Visibility
• Provides a holistic view of network traffic, detecting threats spanning multiple systems.
Centralized Monitoring
• Allows network security to be monitored from a single location, streamlining management.
Identification of Network-Wide Threats
• Detects coordinated cyberattacks affecting multiple hosts simultaneously.
Scalability
• Can be expanded to cover small, medium, and large networks.
Real-Time Monitoring
• Operates continuously, allowing immediate response to security incidents.
Cost-Effective
• More affordable than deploying host-based security on every individual device.
Disadvantages of NIDS
Limited Visibility into Encrypted Traffic
• Struggles to analyze encrypted network data, reducing its effectiveness.
Inability to Monitor Host-Level Activities
• Focuses on network traffic and may miss threats originating from specific hosts.
Additional Network Overhead
• Can introduce latency and performance issues, especially in high-traffic environments.
Difficulty in Handling Complex Networks
• Challenging to deploy in cloud environments, virtualized networks, and distributed systems.
Limited Protection Against Insider Threats
• Primarily detects external threats and may not effectively identify insider attacks.
Dependency on Regular Updates
• Requires frequent updates to its threat database to recognize new cyberattacks.
UNIT – 5
1. Malware Attacks
• Malware (malicious software) includes viruses, worms, trojans, spyware, and ransomware.
• It spreads through unsafe links, phishing emails, and downloads.
• Effects: Data theft, system disruption, and complete shutdown.
2. Phishing Attacks
• Attackers send fake emails posing as a trusted source to steal sensitive data.
• Types:
o Spear Phishing: Targets specific individuals.
o Whaling: Targets high-profile executives.
3. Denial-of-Service (DoS) & Distributed Denial-of-Service (DDoS) Attacks
• DoS Attack: Overloads a system with fake requests, making it unavailable.
• DDoS Attack: Uses multiple infected devices (botnets) to crash a system.
• Example: Amazon Web Services (AWS) faced a major DoS attack in 2020.
4. Man-in-the-Middle (MitM) Attacks
• Hackers intercept communication between two parties to steal or alter data.
5. SQL Injection
• Attackers inject malicious SQL code into web forms to access databases.
• NoSQL Injection targets non-relational databases.
6. Supply Chain Attacks
• Hackers target third-party vendors to infiltrate a company’s system.
• Example: Tampering with supplier software to gain access to the main company.
Intruders and Hackers
Intruders
• Unauthorized users attempting to gain system access.
Hackers
• White Hat Hackers: Ethical security experts.
• Black Hat Hackers: Malicious attackers.
• Grey Hat Hackers: Operate between ethical and unethical hacking.
Types of Intruders
• Masquerader: Uses stolen credentials.
• Misfeasor: Authorized user misusing access.
• Clandestine User: Hides activities to avoid detection.
• Script Kiddie: Uses pre-made hacking tools.
• Cybercriminal: Engages in fraud and data theft.
• State-Sponsored Hacker: Works for government espionage.
• Hacktivist: Hacks for social or political causes.
Cybercrime refers to illegal activities carried out using digital technology, such as computers, networks, and
the internet. These crimes often target sensitive information, cause financial harm, or disrupt digital systems.
Example:
A cybercriminal might send phishing emails pretending to be your bank, tricking you into revealing your
login credentials. Once obtained, they can steal money or sell your personal information.
Common Cybersecurity Challenges
1) Unauthorized Access and Hacking
• Problem: Hackers gain access to systems, networks, or databases without permission.
• Impact: Breach of sensitive data, system disruption, and loss of integrity.
2) Malware Attacks
• Problem: Malicious software (viruses, worms, trojans, ransomware) infects and damages systems.
• Impact: Data loss, financial losses, and system corruption.
3) Phishing and Social Engineering
• Problem: Cybercriminals use deceptive tactics to trick users into revealing sensitive information.
• Impact: Identity theft, financial fraud, and unauthorized access.
4) Identity Theft
• Problem: Stolen personal information is used for fraudulent activities.
• Impact: Financial losses, damage to credit history, and legal issues for victims.
5) Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
• Problem: Attackers flood systems with fake traffic, disrupting normal operations.
• Impact: Downtime, financial losses, and reputational damage.
6) Data Breaches
• Problem: Hackers gain unauthorized access to confidential information.
• Impact: Loss of trust, legal consequences, and exposure of sensitive data.
7) Insider Threats
• Problem: Employees or trusted individuals intentionally or accidentally cause security issues.
• Impact: Data leaks, loss of intellectual property, and security breaches.