Solved_Assignment_Information_Security
Solved_Assignment_Information_Security
Assignment #2
Q1. Define the CIA Triad in information security. Explain each component
with one real-life example. (3 Marks)
The CIA Triad is a fundamental model in information security that stands for
Confidentiality, Integrity, and Availability.
Q2. What are the common types of cyberattacks (at least five)? Explain
each with a brief example or case. (4 Marks)
1. Phishing: Tricking users into providing sensitive information via fake emails.
Example: An employee receives an email appearing to be from the CEO requesting login
details.
3. Denial of Service (DoS) Attack: Overwhelming a system with traffic to make it unavailable.
Example: A website becomes inaccessible due to a flood of fake traffic.
5. SQL Injection: Inserting malicious SQL code into a query to access the database.
Example: An attacker enters SQL code into a login form to retrieve data from the backend
database.
Use-case (Symmetric): Encrypting files on a local hard drive for quick access (e.g.,
BitLocker).
Use-case (Asymmetric): Secure email communication or online transactions (e.g., SSL
certificates).
2. Intrusion Detection System (IDS): Monitors network traffic for suspicious activity.
Mitigates: Early detection of attacks like DoS or malware.
3. Multi-Factor Authentication (MFA): Requires users to verify their identity using two or
more methods.
Mitigates: Unauthorized access even if passwords are compromised.
Examples:
1. Acceptable Use Policy: Defines how employees may use company systems and data
responsibly.
2. Password Policy: Requires strong, regularly changed passwords to enhance system
security.