CSS Question Bank
CSS Question Bank
Noida
Question Bank
Unit No: 2 and 3 unit Course Name & Code: Computer System Security (KNC-301)
Faculty Name: Shweta Chauhan
1. What is access control mechanism? Explain its types. (2019, 2020, 2021)
Access control is a security technique that regulates who or what can view or use
resources in a computing environment. It is a fundamental concept in security that
minimizes risk to the business or organization.
There are two types of access control: physical and logical. Physical access control
limits access to campuses, buildings, rooms and physical IT assets. Logical access
control limits connections to computer networks, system files and data.
To secure a facility, organizations use electronic access control systems that rely
on user credentials, access card readers, auditing and reports to track employee
access to restricted business locations and proprietary areas, such as data centers.
Some of these systems incorporate access control panels to restrict entry to rooms
and buildings as well as alarms and lockdown capabilities to prevent unauthorized
access or operations.
Websites and web applications are just as prone to security breaches as physical
homes, stores, and government locations. Unfortunately, cybercrime happens every
day, and great web security measures are needed to protect websites and web
applications from becoming compromised.
That’s exactly what web security does – it is a system of protection measures and
protocols that can protect your website or web application from being hacked or
entered by unauthorized personnel. This integral division of Information Security
is vital to the protection of websites, web applications, and web services. Anything
that is applied over the Internet should have some form of web security to protect
it.
With the advancement in technology it becomes easier day by day for the hacker to
gain access to sensitive data, disable applications etc. Thus, Application Security
has become a major concern. One method used to implement application security
in design process is through THREAT MODELLING.
HTTP stands for Hypertext Transfer Protocol. When you enter http:// in your
address bar in front of the domain, it tells the browser to connect over HTTP.
HTTP uses TCP (Transmission Control Protocol), generally over port 80, to send
and receive data packets over the web. To put it simply it is a protocol that’s used
by a client and server which allows you to communicate with other websites. The
client sends a request message to an HTTP server (after the TCP handshake) which
hosts a website, the server then replies with the response message. The response
message contains completion status information
4. SECURITY MISCONFIGURATION
Security misconfiguration encompasses several types of vulnerabilities all centered
on a lack of maintenance or a lack of attention to the web application
configuration. A secure configuration must be defined and deployed for the
application, frameworks, application server, web server, database server and
platform. Security misconfiguration gives hackers access to private data or features
and can result in a complete system compromise.
Cross-Site Request Forgery (CSRF) is a malicious attack where a user is tricked into
performing an action he or she didn't intend to do. A third-party website will send a
request to a web application that a user is already authenticated against (e.g. their bank).
The attacker can then access functionality via the victim's already authenticated browser.
Targets include web applications like social media, in browser email clients, online
banking,
Browser isolation is cyber-security models for web browsing that can be used p
physically separate an internet user's browsing activity from their local machine.
network and infrastructure.
2. With this model, individual browser sessions are abstracted away from hardware
and direct internet access, trapping harmful activity inside the disposable
environment.
3. Browser isolation may also be referred to as remote browser isolation, web
isolation or remote browsing.
4. A major weakness in popular security tools is protection from web or browser-
based attacks, malware and ransomware.
5. By separating browsing activity from endpoint hardware, the device's attack
surface is reduced, sensitive data is protected and malware or other known and
unknown security threats are minimised.
6. This is an evolution of the cyber security concepts of security through physical
isolation and air-gapping.
Working of Browser isolation:
• Browser isolation works by providing users with a disposable, non-persisten
environment for browsing.
11.What are the different types of Access Control?(2019,2020,2021)
15.Explain IDS?
An Intrusion Detection System (IDS) is a system that monitors network traffic
for suspicious activity and issues alerts when such activity is discovered. It is a
software application that scans a network or a system for harmful activity or policy
breaching. Any malicious venture or violation is normally reported either to an
administrator or collected centrally using a security information and event
management (SIEM) system. A SIEM system integrates outputs from multiple
sources and uses alarm filtering techniques to differentiate malicious activity from
false alarms.
16. Discuss types of Intrusion Detection system? Classification of Intrusion
Detection System:
Network intrusion detection systems (NIDS) are set up at a planned point within
the network to examine traffic from all devices on the network. It performs an
observation of passing traffic on the entire subnet and matches the traffic that is
passed on the subnets to the collection of known attacks. Once an attack is
identified or abnormal behavior is observed, the alert can be sent to the
administrator. An example of an NIDS is installing it on the subnet where firewalls
are located in order to see if someone is trying crack the firewall.
Host Intrusion Detection System (HIDS):
Host intrusion detection systems (HIDS) run on independent hosts or devices on the
network. A HIDS monitors the incoming and outgoing packets from the device only
and will alert the administrator if suspicious or malicious activity is detected. It
takes a snapshot of existing system files and compares it with the previous
snapshot. If the analytical system files were edited or deleted, an alert is sent to the
administrator to investigate. An example of HIDS usage can be seen on mission
critical machines, which are not expected to change their layout.
Protocol-based Intrusion Detection System (PIDS):