Q &A Session Cyber Security
Q &A Session Cyber Security
Q &A Session Cyber Security
Form-(TDO- A202-03)
Record of Questions Asked & Answered by Expert in Helpdesk
Shahzad Sherazi What is Port Scanning? Port Scanning is the technique used to identify
open ports and services available on a host.
4 Hackers use port scanning to find information
that can be helpful to exploit vulnerabilities.
Rehan Tahir What is the weakest link in Cyber In Cyber Security threat landscape, the weakest
Security? link in most cases are the people. You can
configure systems, firewalls, endpoints but it is
5 the humans that make errors in judgment and
put the organization at risk. The best way to
handle that is creating awareness amongst
users with regard to Cyber Security.
M. Naeem Afzal As a rule of thumb, what are the As a bear minimum, the following policies need
policies we need to have in place to to be put in place in any SME to secure itself
avoid the threat of Cyber Security? from Cyber Threat
- Acceptable Usage Policy
- Data Classification Policy
6
- Data Protection Policy
- Data Governance Structure
- Access Control Policies
- Back Up and Restore Policy
- End Point Usage Policy
Khurram Altaf What is ARP and how does it work? Address Resolution Protocol (ARP)is a protocol
for mapping an Internet Protocol address (IP
address) to a physical machine address that is
recognized in the local network.
7
When an incoming packet destined for a host
machine on a particular local area network
arrives at a gateway, the gateway asks the ARP
program to find a physical host or MAC address
that matches the IP address.
Question Asked by (Name of
Sr. No. Question Answer by Expert
Participant)
Attique Ur Rehman What are various controls we must Typically a Payment gateway (e.g. PayPal) will
have while developing a web-based come with its own Security Baseline document.
application especially linked to However, there are certain best practices that
Payment Gateways? can be followed by developers that include:
-All web applications and
interfaces/APIs should be on https
Each login related activity (login,
logout, failed login, change password
etc.) to the system should be logged
in a table
Failed logins should trigger a lock-
8
out after a determined number of
attempts.
All applications should have captcha
on login page.
Enforce Password complexity for all
applications. Implement a password
expiry time for all passwords.
It is highly recommended to use the
"Secure" flag in your cookie, which
enforces the use of HTTPS to send
cookies.
Abdul Hameed How can university LMS be protected In order to avoid a ransomware attack, the first
from various Ransomware Attacks? step is to invest in END-POINT Protection and
raise awareness among end users. Also, have a
9 clear IR (Incident Response) in place that
involves data retention policies. Some of the
best vendors in the field include Symantec and
Kaspersky for protection.
Mehmood Ul Hassan How to implement a Cyber Security There are various Cyber Security Frameworks in
Environment in an organization? Is place like ISO 27001 or NIST. A ‘Cybersecurity
there a road-map? Framework’ is a collection of best practices that
an organization should follow to manage its
10 cybersecurity risk. The goal of the framework is
to reduce the company’s exposure to
cyberattacks, and to identify the areas most at
risk for data breaches and other compromising
activity perpetrated by cyber criminals
Adil What is Data Leakage? Data Leakage is an intentional or unintentional
transmission of data from within the
organization to an external unauthorized
destination. It is the disclosure of confidential
information to an unauthorized entity. Data
Leakage can be divided into 3 categories based
on how it happens:
12 - Malware
- Phishing
- Password Attacks
- DDoS
Question Asked by (Name of
Sr. No. Question Answer by Expert
Participant)
- Man in the Middle
- Drive-By Downloads
- Malvertising
- Rogue Software
Mustafa Hamdani Explain SSL Encryption SSL(Secure Sockets Layer) is the industry-
standard security technology creating
encrypted connections between Web Server
15
and a Browser. This is used to maintain data
privacy and to protect the information in online
transactions
Muhammad Khalid Explain SQL Injection SQL Injection (SQLi) is a code injection attack
where an attacker manipulates the data being
sent to the server to execute malicious SQL
16
statements to control a web application’s
database server, thereby accessing, modifying
and deleting unauthorized data.
Ali Hamza Explain MITM attack? A MITM(Man-in-the-Middle) attack is a type of
attack where the hacker places himself in
between the communication of two parties and
17
steal the information. Suppose there are two
parties A and B having a communication. Then
the hacker joins this communication.
*Serial number should match the number of participants in the attendance sheet, add more rows. Email softcopy to the concerned. (Total No of
questions should be same as per total participants)
*Only computerized and comprehensive Question/Answers will be considered.