You are on page 1of 3

Institute of Technology,

Nirma University.
M.Tech CASAD Semester I
Cyber Security 2014-2015
Sem II
Assignment II
Tejas M. Patil
Roll no. 14MCLC22
M. Tech. 1st Year
Due date - 7th March 2015

Question 1.1
Why HTTP is not used for banking transaction? Which protocol is used for
secure banking transaction? Draw a secure client server interaction model for
secure transaction.?
Answer,- HTTPs is used for secured banking transaction Instead of HTTP
beacuse of its high level of security and ability to encrypt and decrypt both
response and request from the server-client communication.
Secure client server interaction model-

Question 1.2
What is a spyware?
Answer,-Spyware is a type of malware that is installed on a computer without
the knowledge of the owner in order to collect the owners private information. It
can negatively affect users internet experience by performing many operations
such as It gathers information about internet interaction, keystrokes (also known
as keylogging), passwords, and other valuable data.
Spyware can also negatively affect a computers performance by installing
additional software, redirecting web browser searches, changing computer
settings, reducing connection speeds, changing the homepage or even completely disrupting network connection ability.
Spyware can also be used as a type of adware, where the software delivers
unsolicited pop-up ads in addition to tracking user behavior. Typically,
spyware is installed when a user installs a piece of free software that they
actually wanted. When the desired software is installed, the spyware will
piggyback on the installation and start collecting data from the users
activities.

Question 1.3
How hackers and websites invade your privacy?
Answer, Phishing scams
Personal information, banking information or money is extracted from
user by promising false financial rewards or some other gambits.
Trojan horse
Virus is slipped into users computer by disguising it as harmless. Once
installed it can record user activity and send it back to the hacker.
Drive-by downloads
Hackers bypass security software by capitalizing on its weaknesses.
2

Bypassing passwords
Hackers might get users password from a data breach at a company or
website user uses. Mainly they try to go around the encryption system.
Using open Wi-Fi
Hackers can connect to open network from outside. They can see and
record user activity. They can surf to bad websites and download illegal
files on such connection.

Question 1.4
what is Digital Certificate? Why it is used?
Answer,- Digital certificate is the stamp of the encryption used to encrypt the
data associated with the page user is viewing. This is associated with secured
pages https that come to user as encrypted. User have to trust the source in
order to view the pages. The main purpose of the digital certificate is to ensure
that the public key contained in the certificate belongs to the entity to which
the certificate was issued.

You might also like