0% found this document useful (0 votes)
4 views

ss1

Uploaded by

20220802014
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

ss1

Uploaded by

20220802014
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

1. a) What information can be collected using footprinting?

Also, explain
types and steps required to perform footprinting.

Answer:

●​ Information Collected Through Footprinting:


1.​ Domain names: Company-related domain details.
2.​ IP addresses: Identifying active IP ranges.
3.​ Network structure: Network architecture and devices.
4.​ Employee details: Information from LinkedIn, social platforms.
5.​ Open ports and services: For attack planning.
6.​ DNS details: Zones, server addresses.
7.​ System information: OS and version details.
8.​ Security configurations: Firewalls and policies.
●​ Types of Footprinting:
1.​ Active Footprinting: Interacting directly with the target (e.g., using ping,
traceroute).
2.​ Passive Footprinting: Collecting information indirectly (e.g., Google searches,
WHOIS lookup).
●​ Steps for Footprinting:
1.​ Gather domain information: Use WHOIS and DNS lookups.
2.​ Collect network details: Perform traceroutes and ping sweeps.
3.​ Identify open ports: Use tools like Nmap.
4.​ Research employees: Use LinkedIn, social media.
5.​ Analyze web presence: Explore subdomains, directories.
6.​ Document findings: Summarize all collected data.

1. b) Explain Security Architecture in Detail.

Answer:

●​ Definition: Security architecture is a framework for ensuring the security of an


organization’s IT infrastructure, addressing risks and vulnerabilities.
●​ Components:
1.​ Authentication: Validating user identities.
2.​ Authorization: Ensuring access control based on roles.
3.​ Encryption: Protecting data through cryptography.
4.​ Firewalls: Monitoring and controlling network traffic.
5.​ Intrusion Detection/Prevention Systems (IDS/IPS): Identifying and stopping
threats.
6.​ Incident Management: Processes to respond to security incidents.
●​ Steps to Build Security Architecture:
1.​ Define security requirements.
2.​ Identify risks and vulnerabilities.
3.​ Design controls and policies.
4.​ Implement security measures.
5.​ Monitor and update systems.

2. a) What is Malware? What are the Different Types of Malware (any 6)?

Answer:

●​ Definition: Malware (malicious software) is a program designed to harm, disrupt, or


exploit systems.
●​ Types:
1.​ Virus: Self-replicates and infects files.
2.​ Worm: Spreads across networks without user action.
3.​ Trojan Horse: Disguised as legitimate software.
4.​ Spyware: Collects user data secretly.
5.​ Ransomware: Encrypts files, demanding a ransom.
6.​ Adware: Displays intrusive ads.
7.​ Rootkits: Grants unauthorized access to systems.

2. b) Explain Packet Sniffing Process, Types, and Advantages of


Performing Packet Sniffing.

Answer:

●​ Definition: Packet sniffing involves capturing and analyzing network traffic.


●​ Process:
1.​ Identify the network to monitor.
2.​ Use tools like Wireshark or Tcpdump.
3.​ Capture packets and analyze headers/data.
●​ Types of Packet Sniffing:
1.​ Promiscuous Mode: Captures all packets on a network.
2.​ Non-Promiscuous Mode: Captures packets only meant for the host device.
●​ Advantages:
1.​ Troubleshooting: Identifies network issues.
2.​ Monitoring: Ensures security by detecting suspicious activity.
3.​ Performance Analysis: Optimizes network performance.
4.​ Education: Aids in understanding network protocols.
1.​

You might also like