Skip to main content

Assignment questions

Q1. How can a company apply the CIA Triad (Confidentiality, Integrity, and Availability) to secure sensitive customer data?
Companies can keep customer data safe by following three important rules: confidentiality, integrity, and availability. Confidentiality means keeping data private, like using passwords and encryption so only the right people can see it. For example, banks protect your personal info with strong security. Integrity means making sure the data is correct and not changed by anyone. Online stores, for example, check that your payment details are not changed during a purchase. Availability means making sure the data or service is always ready when people need it. Companies like Amazon use backup systems so their website keeps working even if something goes wrong. These three steps help protect data and keep customers safe.


Q2. In the healthcare industry, how can organizations assess and manage cybersecurity risks such as ransomware attacks?
Hospitals and clinics have a lot of private patient data, so they need to be careful about cyberattacks. They can check their systems often to find weak areas that hackers could use. To stop attacks, they can train workers to avoid clicking on fake emails, use strong security software, and keep systems updated. If an attack happens, they need a plan—like turning off infected computers and using backups to get data back. They should also tell patients and the authorities quickly. By being ready before and after an attack, they can protect patient information and keep systems running.


Q3. What is the difference between authentication and authorization in online banking? How does MFA help, and what can go wrong if it's not used correctly?
Authentication is checking who you are—like logging in with your username and password. Authorization is what you’re allowed to do after that—like viewing your account or sending money. Multi-factor authentication (MFA) adds more safety by asking for extra proof, like a code sent to your phone. This makes it harder for hackers to break in. But if MFA isn’t set up properly, it can still be risky. For example, if someone takes over your phone number, they can get the code. Also, people might get tricked into giving the code to scammers. So, MFA is very helpful, but it must be done in a safe and smart way.


Q4. How does non-repudiation apply in online transactions? How can e-commerce companies stop fraud?
Non-repudiation means that people can’t deny they did something online, like buying a product. In online shopping, this is done by sending receipts and saving records of what the user did. For example, when you buy something, you get an email with a receipt that proves you placed the order. Online stores can also track where the order came from, like the IP address or device used. These steps help stop people from lying and saying they didn’t make a purchase. It protects the business and the customer by keeping a clear record of every action.


Q5. What security strategies should social media platforms use to stop data leaks and protect users?
Social media platforms should use many ways to keep user data safe. They should encrypt the data so no one else can read it, even if it’s stolen. Only the right workers should be able to see user info. The platforms should check their systems often for problems. They should also teach users to create strong passwords and avoid clicking fake links. Some platforms use smart systems to notice strange logins or behavior. They should also collect only the data they need and let users delete their info if they want. All of this helps keep user information private and safe from hackers.



Comments

Popular posts from this blog

Chap#10

Network topologies Definition: Network topologies define how nodes (processors/computers) are interconnected in parallel and distributed systems. The choice of topology affects performance, scalability, and cost. Key Metrics: Degree: Number of links per node. (Formula: deg = connections per node) Example: In a linear array, each node (except ends) has 2 links. Diameter: Longest shortest path between any two nodes. (Formula: diam = max distance) Example: Linear array with 8 nodes has diameter 7 (P₀ to P₇). Bisection Width: Minimum links to cut to split the network into two halves. (Formula: bw = min cuts) Example: Binary tree has bw=1 (cutting the root disconnects it).4 1. Linear Array Define : Nodes are connected one after another in a straight line. Each node (except the ends) connects to two neighbors one on the left and one on the right. Explanation : Simple to build and easy to understand, but not efficient for large networks. Long distance between farthest nodes makes comm...
Asymmetric-key algorithms are algorithms used in cryptography that use two different keys  a public key for encryption and a private key for decryption. These keys are mathematically related, but the private key cannot be easily derived from the public key. Types: RSA (Rivest–Shamir–Adleman): It uses large prime numbers to generate the key pair and supports both encryption and digital signatures DSA (Digital Signature Algorithm): DSA is primarily used for creating digital signatures, ensuring the authenticity. Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext  Types: Stream Cipher:  Stream Cipher Converts the plain text into cipher text by taking 1 byte of plain text at a time. Block cipher: Converts the plain text into cipher text by taking plain text's block at a time DES? DES stands for Data Encryption Standard . It is a symmetric-key algorithm used to enc...

Ai Mental Health & Cyber Safety Presentation

Module A - The Normalization Engine Linguistic Challenge: Roman Urdu lacks standardized orthography (e.g., "kesa" vs "kaisa"), creating orthographic "noise" that significantly degrades the accuracy of downstream AI models. Technical Role: Acts as a Sequence-to-Sequence (Seq2Seq) transliteration and lexical normalization layer to standardize inputs before analysis. Model: A specialized transformer architecture, specifically m2m100 fine-tuned on parallel corpora or UrduParaphraseBERT. Primary Dataset: Roman-Urdu-Parl (RUP). A large-scale parallel corpus of 6.37 million sentence pairs designed to support machine transliteration and word embedding training. Link: https://arxiv.org/abs/2503.21530 Outcome: Reduces orthographic noise by achieving up to 97.44% Char-BLEU accuracy for Roman-Urdu to Urdu conversion, ensuring Module B receives high-quality "clean" data for risk analysis. Module B - Risk Stratification (BERT) Heading: The "Safety ...