Question 1 [4 marks]

Describe cyber stalking and cyber bullying in detail.

Answer:

Digital Harassment Comparison:

Cyber Stalking vs Cyber Bullying

AspectCyber StalkingCyber Bullying
TargetSpecific individualOften minors
DurationPersistent, long-termCan be episodic
IntentIntimidation, controlHarassment, humiliation
PlatformSocial media, emailSchools, gaming platforms

Cyber Stalking Characteristics:

  • Persistent unwanted contact
  • Monitoring victim's online activity
  • Threatening messages or behavior
  • Identity theft or impersonation

Cyber Bullying Forms:

  • Public humiliation online
  • Exclusion from digital groups
  • Spreading false information
  • Sharing private content without consent

Prevention Measures:

  • Privacy settings on social media
  • Reporting harassment to platforms
  • Legal action when necessary
  • Digital literacy education

Mnemonic: "Stop Bullying, Report Stalking"

Question 2 [3 marks]

Explain Property based classification in cybercrime.

Answer:

Property-Based Cybercrime Categories:

CategoryCrime TypeDescriptionExample
Intellectual PropertyCopyright infringementUnauthorized use of copyrighted materialSoftware piracy
Financial PropertyCredit card fraudUnauthorized use of financial informationOnline shopping fraud
Digital PropertyData theftStealing digital informationDatabase breaches
Virtual PropertyGaming asset theftStealing virtual goodsOnline game currency theft

Diagram:

Property-Based Cybercrime Classification

Legal Aspects:

  • Copyright Laws: Protect creative works
  • Trademark Laws: Protect brand identity
  • Patent Laws: Protect inventions
  • Trade Secret Laws: Protect confidential information

Impact on Economy:

  • Revenue loss for legitimate businesses
  • Reduced innovation incentives
  • Consumer trust erosion
  • Legal enforcement costs

Prevention Strategies:

  • Digital rights management (DRM)
  • Watermarking and tracking
  • Legal enforcement mechanisms
  • Public awareness campaigns

Mnemonic: "Property Protection Prevents Piracy"

Question 3 [7 marks]

Explain the role of digital signatures and digital certificates in cybersecurity.

Answer:

Digital Security Components:

Digital Signatures and Certificates

ComponentPurposeFunctionBenefit
Digital SignatureAuthenticationProves sender identityNon-repudiation
Digital CertificateVerificationValidates public keysTrust establishment

Digital Signature Process:

Digital Certificate Components:

  • Subject Information: Certificate owner details
  • Public Key: For encryption/verification
  • Digital Signature: CA's signature
  • Validity Period: Certificate expiration date

Certificate Authority (CA) Role:

  • Issues digital certificates
  • Verifies identity before issuance
  • Maintains certificate revocation lists
  • Provides trust infrastructure

Applications in Cybersecurity:

  • Email security (S/MIME)
  • Code signing for software
  • SSL/TLS certificates for websites
  • Document authentication

Security Benefits:

  • Authentication: Verifies sender identity
  • Integrity: Ensures data hasn't been modified
  • Non-repudiation: Prevents denial of actions
  • Confidentiality: Enables secure communication

Mnemonic: "Digital Signatures Authenticate Documents Securely"

Question 4 [4 marks]

Explain Vulnerability and 0-Day terminology of Hacking.

Answer:

Security Terminology:

Vulnerability vs 0-Day

TermDefinitionRisk LevelExample
VulnerabilitySystem weaknessVariesUnpatched software
0-DayUnknown vulnerabilityCriticalUndiscovered flaw

Vulnerability Characteristics:

  • Discovery: Found through security testing
  • Disclosure: Responsible reporting to vendors
  • Patching: Vendor provides security updates
  • Window: Time between discovery and patch

0-Day Attack Process:

  • Hacker discovers unknown vulnerability
  • Exploits flaw before vendor awareness
  • No available patches or defenses
  • High success rate due to surprise element

Protection Strategies:

  • Regular security updates
  • Intrusion detection systems
  • Behavioral analysis tools
  • Zero-trust security models

Mnemonic: "Vulnerabilities Need Patches, Zero-Days Need Vigilance"

Question 5 [3 marks]

Explain any three basic commands of Kali Linux with suitable example.

Answer:

Essential Kali Linux Commands:

Kali Linux Commands

CommandFunctionExample
nmapNetwork scanningnmap -sS 192.168.1.1
netcatNetwork communicationnc -l -p 1234
hydraPassword crackinghydra -l admin -P passwords.txt ssh://target
  • Nmap: Discovers hosts and services on network
  • Netcat: Creates network connections for data transfer
  • Hydra: Performs brute-force password attacks

Mnemonic: "Network Map, Connect, Crack"

Question 6 [7 marks]

Explain Five Steps of Hacking.

Answer:

Hacking Methodology:

Hacking Steps

Detailed Steps:

StepDescriptionTools/MethodsObjective
ReconnaissanceInformation gatheringGoogle dorking, Social mediaTarget profiling
ScanningSystem enumerationNmap, NessusVulnerability identification
Gaining AccessExploit vulnerabilitiesMetasploit, Custom exploitsSystem compromise
Maintaining AccessPersistent presenceBackdoors, RootkitsLong-term control
Covering TracksEvidence removalLog cleaning, File deletionAvoid detection

Information Gathering Types:

  • Passive: No direct target contact
  • Active: Direct interaction with target systems

Scanning Techniques:

  • Port scanning for open services
  • Vulnerability scanning for weaknesses
  • Network mapping for topology

Access Methods:

  • Password attacks (brute force, dictionary)
  • Exploit vulnerabilities
  • Social engineering
  • Physical access

Persistence Mechanisms:

  • Installing backdoors
  • Creating user accounts
  • Scheduling tasks
  • Registry modifications

Track Covering Methods:

  • Clearing system logs
  • Deleting temporary files
  • Modifying timestamps
  • Using encryption

Mnemonic: "Reconnaissance Scans Generate Access, Maintain Coverage"

Question 7 [3 marks]

Explain Network forensics.

Answer:

Network Forensics Definition: Investigation of network traffic to detect and analyze security incidents.

Network Forensics Process

Key Components:

ComponentPurposeTools
Traffic CaptureRecord network dataWireshark, tcpdump
AnalysisExamine patternsNetworkMiner, Snort
EvidenceDocument findingsForensic reports
  • Scope: Analyzes packets, flows, and network behavior
  • Objective: Identify security breaches and attack patterns
  • Challenge: Large data volumes and real-time processing

Mnemonic: "Network Forensics Finds Facts"

Question 8 [4 marks]

Explain the importance of port scanning in ethical hacking.

Answer:

Port Scanning in Ethical Hacking:

Port Scanning in Ethical Hacking

AspectImportanceBenefit
Service DiscoveryIdentify running servicesAttack surface mapping
Vulnerability AssessmentFind open portsSecurity gap identification
Network MappingUnderstand topologyInfrastructure analysis
Security TestingValidate configurationsCompliance verification

Port Scanning Techniques:

  • TCP Connect: Full connection establishment
  • SYN Scan: Stealth scanning method
  • UDP Scan: User Datagram Protocol scanning
  • Service Detection: Identify service versions

Ethical Considerations:

  • Authorization: Obtain proper permissions
  • Scope: Stay within defined boundaries
  • Documentation: Record all activities
  • Reporting: Provide detailed findings

Mnemonic: "Port Scanning Provides Security Insights"

Question 9 [7 marks]

Describe the process of conducting a vulnerability assessment using Kali Linux tools.

Answer:

Vulnerability Assessment Process:

Vulnerability Assessment Process

Kali Linux Tools and Commands:

Kali Linux Commands

Step-by-Step Process:

StepKali ToolCommand ExamplePurpose
ReconnaissanceNmapnmap -sn 192.168.1.0/24Host discovery
Port ScanningNmapnmap -sS -O targetOpen port identification
Service EnumerationNmap, Banner grabbingnmap -sV targetService version detection
Vulnerability ScanningOpenVAS, Nessusopenvas-startAutomated vulnerability detection
Web Application TestingNikto, Dirbnikto -h targetWeb vulnerability scanning

Detailed Process:

Phase 1 - Target Identification:

  • Use Nmap for network discovery
  • Identify live hosts and their IP addresses
  • Document network topology
  • Determine target scope

Phase 2 - Port and Service Analysis:

  • Perform comprehensive port scans
  • Identify running services and versions
  • Check for default credentials
  • Analyze service configurations

Phase 3 - Automated Vulnerability Scanning:

  • Configure vulnerability scanners (OpenVAS)
  • Run comprehensive scans
  • Analyze scan results
  • Prioritize findings by severity

Phase 4 - Manual Testing:

  • Verify automated findings
  • Perform targeted testing
  • Test for specific vulnerabilities
  • Validate false positives

Phase 5 - Web Application Assessment:

  • Use web vulnerability scanners
  • Test for OWASP Top 10 vulnerabilities
  • Analyze application logic
  • Check for misconfigurations

Common Kali Tools:

ToolFunctionUse Case
NmapNetwork scanningPort and service discovery
OpenVASVulnerability scanningAutomated assessment
NiktoWeb scanningWeb server vulnerabilities
DirbDirectory brute forcingHidden file discovery
SQLmapSQL injection testingDatabase vulnerabilities
Burp SuiteWeb proxyManual web testing
MetasploitExploitation frameworkVulnerability validation

Assessment Methodology:

  • Scope Definition: Clearly define assessment boundaries
  • Information Gathering: Collect target intelligence
  • Vulnerability Detection: Use multiple scanning methods
  • Risk Assessment: Evaluate impact and likelihood
  • Remediation Planning: Provide actionable recommendations

Reporting Components:

  • Executive Summary: High-level findings for management
  • Technical Details: Detailed vulnerability descriptions
  • Risk Ratings: CVSS scores and business impact
  • Remediation Steps: Specific mitigation recommendations
  • Supporting Evidence: Screenshots and proof-of-concept

Best Practices:

  • Authorization: Always obtain written permission
  • Documentation: Maintain detailed logs of all activities
  • Minimal Impact: Avoid disrupting production systems
  • Confidentiality: Protect sensitive information discovered

Mnemonic: "Vulnerability Assessment Validates Application Security"