Boost your journey with 24/7 access to skilled experts, offering unmatched cyber security homework help
Frequently Asked Questions
Q. 1) Examine the YouTube video "What is the Cyber Kill Chain?" included in Week 5's Readings and Instructional Material section before answering this question. • How can you incorporate the ideas presented in this video into a broader plan for cybersecurity and cyber resilience? • In your opinion, what procedures, instruments, and methods would be most useful for identifying and stopping a cyberattack in its tracks? Threats, vulnerabilities, and the management procedures required to handle them within the cybersecurity and cyber resilience plan are the main topics of this week's chapter in the course textbook. Chapter 4 (Siegel and Sweeney 2020): Cyberthreats, Vulnerabilities, and Intelligence Analysis @zhClg4cLemc%20 https://www.youtube.com/watch?
Incorporation into Cybersecurity: The Cyber Kill Chain outlines stages of a cyberattack (e.g., Reconnaissance, Weaponization, Delivery, Exploitation). Incorporate detection and mitigation strategies at each phase to improve cyber resilience. Procedures & Tools: Employ firewalls, IDS/IPS, endpoint protection, and SOC (Security Operations Center) monitoring. Train employees and conduct regular vulnerability assessments.
Q. 2) Implementing a Secure Password Storage System (20 marks)
Design a system to securely store user passwords in a database. The passwords should be hashed and salted before storing. Use a secure hashing algorithm such as bcrypt, PBKDF2, or Argon2. Implement a method to verify the user's password when they log in. Ensure that the password hash is never exposed in any logs or error messages. Discuss the importance of salting and hashing in password security.
Design: Hash passwords using algorithms like bcrypt or Argon2, add a unique salt, and securely store them in the database. Verification: Compare hashed passwords during login without exposing hash values. Importance: Salting prevents rainbow table attacks; hashing ensures passwords are non-reversible.
Q. 3) Designing a Secure Login System with Two-Factor Authentication (20 marks)
Implement a login system with two-factor authentication (2FA) for enhanced security.Use TOTP (Time-Based One-Time Password) or an SMS-based system for the second factor. Implement backend logic for handling 2FA challenges and tokens. Explain the security benefits of 2FA and the potential risks if it is not implemented properly.
Implementation: Use TOTP (e.g., Google Authenticator) or SMS for 2FA. Implement backend logic to validate codes or tokens. Benefits: 2FA adds a second layer of security, reducing unauthorized access. Without 2FA, credential theft can lead to direct compromise.
Q. 4) Network Security: Firewalls and IDS/IPS Configuration (20 marks)
Design a basic network security plan for a small company, including the use of firewalls, IDS (Intrusion Detection Systems), and IPS (Intrusion Prevention Systems).Discuss how to configure firewalls to allow only essential traffic to the network. Describe how IDS/IPS works and the difference between them.
Identify potential vulnerabilities and recommend best practices for securing the network infrastructure.
Plan: Configure firewalls to permit essential traffic (e.g., HTTP, HTTPS). Use IDS to monitor threats and IPS to block them actively. Difference: IDS detects and alerts; IPS prevents threats in real-time. Best Practices: Regular updates, segmented networks, and minimal privilege access.
Q. 5) Cryptography: Implementing AES Encryption (20 marks)
Implement AES (Advanced Encryption Standard) encryption in Python (or any programming language of your choice). Encrypt and decrypt a message using a key and IV (Initialization Vector). Discuss the advantages and limitations of AES encryption. Explain how to securely manage the encryption key and IV.
Implementation: Use AES with a secure key and IV. Encrypt and decrypt sensitive messages. Advantages: Strong encryption with minimal performance overhead. Secure key management is crucial to prevent unauthorized access.
Q. 6) Write a secure login form and backend code that prevents SQL injection attacks. Explain how SQL injection works and how to prevent it using parameterized queries or ORM (Object-Relational Mapping). Implement a simple form where a user submits a username and password, and the backend queries a database for validation. Discuss other web application security best practices such as XSS (Cross-Site Scripting) and CSRF (Cross-Site Request Forgery).
Secure Form: Use parameterized queries or ORM to handle database inputs. Prevention: Validate and sanitize user input. Avoid dynamic SQL. Additional Best Practices: Use CSP for XSS prevention and implement CSRF tokens.
Q. 7) Perform a threat modeling exercise for a simple web application.
Identify and describe possible attack vectors (e.g., phishing, DoS, cross-site scripting).
Create a risk assessment matrix to prioritize the threats based on likelihood and impact.
Suggest mitigation strategies for each identified threat.
Include an explanation of how threat modeling helps in building secure applications.
Attack Vectors: Phishing, DoS, XSS. Risk Assessment Matrix: Evaluate threats by likelihood and impact (e.g., high impact + high likelihood = top priority). Mitigation: Use firewalls, input validation, and strong authentication mechanisms. Benefit: Identifies vulnerabilities early and enables secure application development.
Q. 8) Capture and analyze network traffic using Wireshark for suspicious activity.
Use Wireshark to capture packets from a network and filter for HTTP or HTTPS traffic.
Look for signs of suspicious activity, such as unencrypted credentials or unusual patterns.
Discuss the role of packet sniffing in cybersecurity and its legal and ethical implications.
Traffic Capture: Filter HTTP/HTTPS packets. Check for unencrypted credentials or abnormal patterns. Role: Packet sniffing helps identify malicious activity but must respect legal and ethical guidelines.
Q. 9) Develop a cybersecurity policy for a small business or organization.
Include sections on password management, employee training, incident response, and data encryption.
Discuss the importance of having a clear cybersecurity policy to protect organizational assets and sensitive data.
Include best practices for regular audits and employee compliance.
Components: Password rules, incident response procedures, employee training, and encryption protocols. Importance: Protects assets and ensures compliance. Regular audits and updates ensure effectiveness.
Popular Subjects for cyber security
Boost your journey with 24/7 access to skilled experts, offering unmatched cyber security homework help