Professional Documents
Culture Documents
Topic Definations
Topic Definations
Remember, while these strategies can help mitigate the risk of DoS attacks, it's essential to regularly
review and update your security measures to adapt to evolving attack techniques.
Virus Types:
Viruses are malicious software programs that replicate and spread by attaching themselves to other
files or programs. They can cause harm to computer systems. Some common types of viruses include:
a) File Infector Viruses: These viruses infect executable files and spread when the infected file is
executed.
b) Macro Viruses: Macro viruses infect files that contain macros, such as documents and spreadsheets.
c) Boot Sector Viruses: Boot sector viruses infect the boot sector of storage devices and execute when
the infected device is accessed.
d) Polymorphic Viruses: Polymorphic viruses have the ability to change their code and appearance to
avoid detection by antivirus software.
e) Worms: While not strictly viruses, worms are self-replicating programs that can spread across
networks without the need for human interaction.
Forms of Malware:
Malware refers to malicious software designed to harm or exploit computer systems. It encompasses
various types of threats, including:
a) Viruses: Malicious software programs that replicate and spread by attaching themselves to other
files or programs.
b) Trojans: Malware disguised as legitimate software that tricks users into executing them, often
leading to unauthorized access or system compromise.
c) Ransomware: Malware that encrypts files or locks users out of their systems, demanding a ransom
payment for restoration.
d) Spyware: Malware that secretly gathers information about a user's activities, such as keystrokes,
website visits, or personal data.
e) Adware: Malware that displays unwanted advertisements, often bundled with legitimate software
downloads.
f) Rootkits: Malicious software that provides unauthorized access and control over a system while
hiding its presence from users and security software.
Remember, prevention is key, so it's important to follow good security practices and exercise caution
when browsing the internet, opening attachments, or downloading files.
Types of Cryptography:
There are two main types of cryptography:
a) Symmetric Cryptography: In symmetric cryptography, the same secret key is used for both
encryption and decryption. It is efficient but requires secure key distribution among communicating
parties.
b) RSA: RSA is an asymmetric encryption algorithm based on the mathematical properties of large
prime numbers. It is commonly used for key exchange, digital signatures, and secure communication.
c) Elliptic Curve Cryptography (ECC): ECC is an asymmetric encryption algorithm that relies on the
mathematics of elliptic curves. It offers strong security with shorter key lengths, making it
computationally efficient.
d) Hash Functions: Hash functions are cryptographic algorithms that convert input data into fixed-
length hash values. They are used for data integrity verification, password storage, and digital
signatures.
These modern methods of cryptography play a crucial role in securing data, protecting privacy, and
ensuring secure communication in various domains, including finance, e-commerce, and digital
communication.
a) Non-Delivery Fraud: The seller fails to deliver the purchased item after receiving payment.
b) Shill Bidding: The seller or an accomplice places fake bids to artificially inflate the auction price.
c) Counterfeit or Misrepresented Items: The seller intentionally sells counterfeit or misrepresented
items, misleading buyers about their quality, authenticity, or condition.
a) Physical Espionage: Involves physically infiltrating a target company's premises to gain access to
sensitive information or steal physical documents.
b) Technical Espionage: Utilizes technological means such as hacking, malware, or electronic
surveillance to infiltrate computer systems and extract valuable data.
c) Human Intelligence (HUMINT): Involves recruiting insiders or employees within a targeted
organization to gather and leak sensitive information.
d) Competitive Intelligence: Legally gathering information about competitors' activities, products, or
strategies but crossing ethical boundaries to gain an unfair advantage.
Q1:
C) XOR algorithm:
The XOR algorithm (exclusive OR) is a bitwise operation that combines two binary inputs and
produces an output based on their exclusive OR relationship. In cryptography, XOR is commonly
used for encryption and decryption purposes, particularly in stream ciphers or as a component in more
complex cryptographic algorithms.
Q2:
What is Forensics:
Forensics, specifically in the context of digital forensics, refers to the scientific investigation and
analysis of digital evidence to uncover and document facts related to cybercrimes or other illicit
activities. It involves the collection, preservation, examination, and interpretation of digital data in a
legally admissible manner to support investigations or legal proceedings.
Q3:
Q5:
IDS, IPS, and Firewall:
IDS (Intrusion Detection System) and IPS (Intrusion Prevention System) are security mechanisms
used to detect and prevent unauthorized access or malicious activities within a network. IDS monitors
network traffic for suspicious patterns or anomalies, while IPS actively blocks or mitigates potential
threats. A firewall, on the other hand, is a network security device that acts as a barrier between an
internal network and external networks, controlling incoming and outgoing network traffic based on
predefined security rules.