Question:- Explain the MITM attack. How to prevent it?
Answer:- In the Man-in-the-Middle attack, the hacker eavesdrops on the communication between two parties. The individual then impersonates another person and makes the data transmission look normal for the other parties. The intent is to alter the data, steal personal information, or get login credentials for sabotaging communication. These are a few ways to prevent a MITM attack: 1. Public key pair based authentication 2. Virtual private network 3. Strong router login credentials 4. Implement a well-built Intrusion Detection Systems (IDS) like firewalls. 5. Strong WEP/WPA encryption on access points
Question:- Explain the DDoS attack. How to prevent it?
Answer:- Distributed denial-of-service attack overwhelms the target website, system, or network with huge traffic, more than the server’s capacity. The aim is to make the server/website inaccessible to its intended users. DDoS happens in the below two ways: Flooding attacks: This is the most commonly occurring type of DDoS attack. Flooding attacks stop the system when the server is accumulated with massive amounts of traffic that it cannot handle. The attacker sends packets continuously with the help of automated software. Crash attacks: This is the least common DDoS attack where the attacker exploits a bug in the targeted system to cause a system crash. It prevents legitimate users from accessing email, websites, banking accounts, and gaming sites. To prevent a DDoS attack, you have to: Configure firewalls and routers Recognize the spike in traffic Consider front-end hardware Empower the server with scalability and load balancing Use anti-DDoS software
Question:- Explain the XSS attack. How to prevent it?
Answer:- Cross-site scripting also known as XSS attack allows the attacker to pretend as a victim user to carry out the actions that the user can perform, in turn, stealing any of the user’s data. If the attacker can masquerade as a privileged victim user, one can gain full control over all the application’s data and functionality. Here, the attacker injects malicious client-side code into web services to steal information, run destructive code, take control of a user’s session, and perform a phishing scam. Here are the ways to prevent an XSS attack: Cross-check user’s input Sanitize HTML Employ anti-XSS tools Use encoding Check for regular updates of the software
Question:- What is an ARP, and how does it work?
Answer:- Address Resolution Protocol is a communication protocol of the network layer in the OSI model. Its function is to find the MAC address for the given IP address of the system. It converts the IPv4 address, which is 32-bit, into a 48-bit MAC address. How ARP works: It sends an ARP request that broadcasts frames to the entire network. All nodes on the network receive the ARP request. The nodes check whether the request matches with the ARP table to find the target’s MAC address. If it does not match, then the nodes silently discard the packet. If it matches, the target will send an ARP response back to the original sender via unicast.
Question:- What is port blocking within LAN?
Answer:- It refers to restricting users from accessing a set of services within the local area network. The main aim is to stop the source from providing access to destination nodes via ports. Since all applications run on the ports, it is necessary to block the ports to restrict unauthorized access, which might violate the security vulnerability in the network infrastructure.
Question:- What are the protocols that fall under the TCP/IP Internet layer?
Answer:- • Application Layer: NFS, NIS, SNMP, telnet, ftp, rlogin, rsh, rcp, RIP, RDISC, DNS, LDAP, and others • Transport Layer: TCP, SCTP, UDP, etc. • Internet: IPv4, ARP, ICMP, IPv6, etc. • Data Link Layer: IEEE 802.2, PPP, etc. • Physical Layer: Ethernet (IEEE 802.3), FDDI, Token Ring, RS-232, and others
Question:- What is a botnet?
Answer:-
Question:- What is a botnet?
Answer:- A botnet, which is also known as a robot network, is a malware that infects networks of computers and gets them under the control of a single attacker who is called a ‘bot herder.’ A bot is an individual machine that is under the control of bot herders. The attacker acts as a central party who can command every bot to perform simultaneous and coordinated criminal actions. The botnet is a large-scale attack since a bot herder can control millions of bots at a time. All the botnets can receive updates from the attacker to change their behavior in no time.
Question:- What are salted hashes?
Answer:- When two users have the same password, it will result in the creation of the same password hashes. In such a case, an attacker can easily crack the password by performing a dictionary or brute-force attack. To avoid this, a salted hash is implemented. A salted hash is used to randomize hashes by prepending or appending a random string (salt) to the password before hashing. This results in the creation of two completely different hashes, which can be employed to protect the users’ passwords in the database against the attacker.
Question:- Explain SSL and TLS.
Answer:- • Secure Sockets Layer (SSL) It employs encryption algorithms to keep any sensitive data that is sent between a client and a server by scrambling the data in transit. This helps prevent hackers from reading any data, such as credit card details and personal and other financial information; it is done by keeping the Internet connection secure. • Transport Layer Security (TLS) TLS is the successor of SSL. It is an improved version protocol that works just like SSL to protect the information transfer. However, to provide better security, both TLS and SSL are often implemented together.
Question:- What is data protection in transit vs data protection at rest?
Answer:- • Data Protection in Transit • Data is transmitted across devices or networks • Protects the data in transit with SSL and TLS • You must protect the data in transit since it can become vulnerable to MITM attacks, eavesdropping, etc. • Data Protection at Rest • Data is stored in databases, local hard drives, or USBs • Protects the data at rest with firewalls, antiviruses, and good security practices • You should protect the data at rest to avoid possible data breaches even when stolen or downloaded
Question:- What is 2FA, and how can it be implemented for public websites?
Answer:- Two-factor authentication (2FA) requires a password, along with a unique form of identification like a login code via text message (SMS) or a mobile application, to verify a user. When the user enters the password, he/she is prompted for the security code to log in to the website. If the code mismatches, the user will be blocked from entering the website. Examples of 2FA: Google Authenticator, YubiKey, Microsoft Authenticator, etc.
Question:- What do you mean by Cognitive Cybersecurity?
Answer:- Cognitive Cybersecurity is a way of using human-like thought mechanisms and converting them to be used by Artificial Intelligence technologies in cyber security to detect security threats. It is to impart human knowledge to the cognitive system, which will be able to serve as a self-learning system. This helps identify the threats, determine their impact, and manifest reactive strategies.
Question:- What is the difference between VPN and VLAN?
Answer:- • Virtual Private Network • Provides secure remote access to a company’s network resources • A network service • Companies wishing to connect with their remote employees will use a VPN • Virtual Local Area Network • Used to group multiple computers that are geographically in different domains into the same geographical broadcast domain • A way of subnetting the network • Companies wishing to employ traffic control and easier management will use a VLAN
