Dr. A.P.J. Abdul Kalam Technical University
Topics to be covered
- Computer System Security Introduction
- Introduction
- Interview with Prof.Sandeep Shukla CSE IIT kanpur
- What is computer security and what to learn?
- Learning objectives
- Sample Attacks
- The Marketplace for vulnerabilities
- Error 404 Hacking digital India part 1 chase
- Computer System Security Module 01
- Control Hijacking
- More Control Hijacking attacks integer overflow
- More Control Hijacking attacks format string vulnerabilities
- Defense against Control Hijacking - Platform Defenses
- Defense against Control Hijacking - Run-time Defenses
- Advanced Control Hijacking attacks
- Computer System Security Module 02
- Confidentiality Policies
- Confinement Principle
- Detour Unix user IDs process IDs and privileges
- More on confinement techniques
- System call interposition
- Error 404 digital Hacking in India part 2 chase
- Computer System Security Module 03
- VM based isolation
- Confinement principle
- Software fault isolation
- Rootkits
- Intrusion Detection Systems
- Computer System Security Module 04
- Secure architecture principles isolation and leas
- Access Control Concepts
- Are you sure you have never been hacked Sandeep Shukla
- Unix and windows access control summary
- Other issues in access control
- Introduction to browser isolation
- Computer System Security Module 05
- Web security landscape
- Web security definitions goals and threat models
- HTTP content rendering
- Browser isolation
- Security interface
- Cookies frames and frame busting
- Computer System Security Module 06
- Major web server threats
- Cross site request forgery
- Cross site scripting
- Defenses and protections against XSS
- Finding vulnerabilities
- Secure development
- Computer System Security Module 07
- Basic cryptography
- Public key cryptography
- RSA public key crypto
- Digital signature Hash functions
- Public key distribution
- Real world protocols
- Basic terminologies
- Email security certificates
- Transport Layer security TLS
- IP security
- DNS security
- Computer System Security Module 08
- Internet infrastructure
- Basic security problems
- Routing security
- DNS revisited
- Summary of weaknesses of internet security
- Link layer connectivity and TCP IP connectivity
- Packet filtering firewall
- Intrusion detection
- Concluding remarks
[1] What was the percentage increase in Zero Day Vulnerabilities in the year 2015?
(a) 4%
(b) 50%
(c) 100%
(d) 125%
Answer: (d) 125%
[2] What hacking attacks were mentioned in the lesson?
(a) Hacking in French Election (b) ATM Hacking in India
(c) Denial of Service attack in Turkish Bank
(d) All of the above
Answer: (d) All of the above
[3] Identify the software whose vulnerability is exploited the most?
(a) Android
(b) Browser
(c) Adobe Flash Player
(d) Microsoft Office
Answer: (b) Browser
[4] The computer vulnerabilities and exploits
databases are maintained by___________
(a) Kaspersky Lab
(b) Symantec Corporation
(c) MITRE Corporation
(d) None of the above
Answer: (c) MITRE Corporation
[5] Which of the following is/are correct with respect to Ransomware?
(a) It is a form of Malware
(b) It encrypts the whole hard drive of the computer, essentially locking the user out of
the entire system.
(c) It locks the system's screen or lock the users' files unless a ransom is paid.
(d) All of the above
Answer: (d) All of the above
COMPUTER SYSTEM SECURITY
[6] Which of the following is considered legal?
(a) Hacking a social media account and sending a private message
(b) Hacking a bank account and siphoning
funds
(c) Hacking a company's security system with permission from the management
(d) All of the above
Answer: (c) Hacking a company's security system with permission from the management
[7] What is the cost of launching Denial of Service attack on a website?
(a) $20/hr
(b) $100/day
(c) $300/mont
(d) Both A and B
Answer-(d) both A and B
[8] Which of the following is not an advantage of studying Cyber Security?
(a) It gives you the ability to hack a computer system
(b) It allows you to know the ways through
which cyberspace can be breached
(c) Both A and B (d) None of the above
Answer: (d) None of the above
[9] Which of the following is correct for silent banker?
(a) It is a trojan horse
(b) It records keystrokes, captures screens and steals confidential banking credentials
and sends them to a remote attacker
(c) Both A and B
(d) None of the above
Answer: (c) Both A and B
[10] Which of the following is not a part of Security System Centric Design?
(a) Policy
(b) Agreement
(c) Mechanisms
(d) Threat Models
Answer: (b) Agreement
[11] Which of the following is not a goal in the security system design?
(a) Vulnerabilit
(b) Confidentiality
(c) Integrity
(d) Availability
Answer: (a) Vulnerability
[12] Which of the following is most important in design of secure system?
(a) Assessing vulnerability
(b) Changing or Updating System according to vulnerability
(c) Both A and B
(d) None of the above
Answer: (c) Both A and B
[13] Which of the following is correct with respect to Penetration testing?
(a)It is an internal inspection of Applications and Operating systems for security flaws.
(b) It is an authorized simulated cyber-attack on a computer system, performed to evaluate the security of the system
(c) It is hacking a security system of an organization.
(d) All of the above
Answer: (b) It is an authorized simulated cyber attack on a computer system, performed to evaluate the security of the system
[14] Which of the following is to be done to avoid limitations in threat models?
(a) Making more explicit and formalized threat models to understand possible weaknesses
(b) Making simpler and more general threat
models
(c) Making less assumptions to design a better threat model
(d) All of the above
Answer: (d) All of the above
In this post solution of 1st-week Computer System Security is given.
Computer security system solution first quiz
______________________________________________
Computer System Security 2nd quiz Solution
Reason for evaluation- this is Mentioned in lecture.
[5] Identify the correct bug bounty program name.
(a) Google Vulnerability Program
(b) Microsoft Bug Bounty Program
(c) Mozilla Bounty Program
(d) Pwn2own competition
Answer (d) Pwn2own competition
Reason for evaluation- mentioned in lecture
[6] _________are attempts by individuals to obtain confidential information from you by
falsifying their identity.
(a) Computer viruses
(b) Phishing scams
(c) Phishing trips
(d) Spyware scams
Answer (b) Phishing scams
Reason for evaluation- marking duplicate of original
[7] Which of the following is correct for MITM?
(a) It stands for Man-In-The-Middle attack
(b) It happens when a communication
between the two systems is intercepted by an outside entity
(c) It can happen in any form of online communication, such as email, social media,web surfing, etc
(d) All of the above
Answer (d) All of the above
Reason for evaluation-(a) , (b) and (c) option is correct.
CSS Second quiz solution
[8] Which of the following describes monitoring software installed without your consent?
(a) Malware
(b) Adware
(c) Spyware
(d) Ransomware
Answer (c) spyware
Reason for evaluation- taking access without user
[9] Which type of cyber-attack is commonly
performed through emails?
(a) Trojans
(b) Worms
(C) Ransomware
(d) Phishing
Answer (d) Phishing
Reason for evaluation-look like same as original eamils
[10] If you share too much information on social media, what may you by at risk of?
(a) Identity Theft
(b) Ransomware
(c) Malware
(d) Adware
Answer (a) Identity Theft
Reason for evaluation- stolen your id
Css quiz solution
Computer System Security 3nd quiz Solution
[1] which of the following programming languages have this common buffer-overflow problem in the development of application?
- (a) C, Ruby
- (b) C, C++
- (c) Python, Ruby
- (d) C, Python
Answer(b) C, C++
Reason :- Generally we use c, c++ programming language to solve buffer-overflow problem in the development of application.
[2] which tpye of buffer overflows are common among attackers?
- (a) Memory-based
- (b) Queue-based
- (c) Stack-based
- (d) Heap-based
Answer(C) Stack-based
Reason:-stack-based buffer-overflow are common among attackers ,by using what is known as a stack : memory space used to store user input.
[3] IN __________ attack ,Malicious code is pushed into __________.
- (a) buffer-overflow, stack
- (b) buffer-overflow, queue
- (c) buffer-overflow, memory card
- (d) buffer-overflow, external drive
Answer( a) buffer-overflow, stack
Reason:- Malicious code can be pushed into the stack during the buffer-overflow attack. The overflow can be used to overwrite the return pointer so that the control-flow switches to the malicious code
[4] IN case of integer overflow , which of the following option/s /is are true?
- (a) It is a result of an attempt to store a value greater than the maximum value an integer can store
- (b) Integer overflow can compromise a program’s reliability and security
- (c) Both A and B
- (d) None of the above
Answer(C) Both A and B
Reason:-according to lecture option (a) and (b) is correct so option (c) is true.
[5] A string which contains ____________ parameter/s, is called ___________string.
- (a) Format, text
- (b) Text, format
- (c) text and format, format
- (d) None of the above
printf (“The show of example is: %d\n”, 773);
👇👇👇👇👇👇👇👇👇👇👇👇
Computer System Security 4th quiz Solution
Computer System Security 5th quiz Solution
Q:1. Chroot jail is used to__________ process and its children by __________to the supplied directory name .
1. isolate, changing the root directory
2.change, the name
3.execute, renaming it
4. All of the above
Answer:- (2).change, the name
Reason :- A chroot on Unix operating systems is an operation that changes the apparent root directory for the current running process and its children. The programs that run in this modified environment cannot access the files outside the designated directory tree. This essentially limits their access to a directory tree and thus they get the name “chroot jail”.
Q:2. Talking about FreeBSD jail, which of the following is true ?
1. It can only bind to sockets with specified IP address and authorized ports
2. It can communicate with processes inside and outside of jail
3. Root is limited (example: cannot load kernel modules)
4. None of the above
Answer :-(2).It can communicate with processes inside and outside of jail
Reason :- The jail mechanism is an implementation of FreeBSD's OS-level virtualisation that allows system administrators to partition a FreeBSD-derived computer system into several independent mini-systems called jails, all sharing the same kernel, with very little overhead.
Q:3. Which of the following is incorrect for System call interposition?
1. It tracks all the system service requests of processes.
2. Each system request can be modified or denied.
3. It is impossible to implement tools to trace, monitor, or virtualize processes.
4. None of the above.
Answer:-(3).It is impossible to implement tools to trace, monitor, or virtualize processes.
Reason:- Abstract: System call interposition is a powerful method for regulating and monitoring program behavior. ... A system call correlating method is proposed to identify the coherent system calls belonging to the same process from the system call sequence.
Q:4. Which of the following is a computer security utility which limits an application's access to the system by enforcing access policies for system calls?
1. systrace
2. NetBSD
3. ptrace
4. None of the above
Answer:- (1).systrace
Reason:- Systrace is a computer security utility which limits an application's access to the system by enforcing access policies for system calls. This can mitigate the effects of buffer overflows and other security vulnerabilities.
Q:5. Which of the following uses a call back mechanism in the kernel module to redirect system calls?
1. systrace
2. ptrace
3. ostia
4. NetBSD
Answer :- (2).ptrace
Reason:- ptrace is a system call found in Unix and several Unix-like operating systems. By using ptrace (the name is an abbreviation of "process trace") one process can control another, enabling the controller to inspect and manipulate the internal state of its target.
👉 6nd quiz solution
Computer System Security Quiz week 6 Solution
Warning⚠⚠⚠⚠
This webpage is made only for education purpose. All the information on this website is published in good faith and for general information
Any information in this webpage given Wright. But any losses or problem this webpage cyberkiller is not sure. It's won risk.

0 Comments