Cyber Security
Key Concepts & Formulas
Provide 5-7 essential concepts for Cyber Security:
| # | Concept | Quick Explanation |
|---|---|---|
| 1 | Malware | Malicious software designed to damage/disrupt systems - includes viruses, worms, trojans |
| 2 | Firewall | Security barrier that filters network traffic based on predefined rules |
| 3 | Phishing | Fraudulent attempt to obtain sensitive info by disguising as trustworthy entity |
| 4 | Encryption | Process of converting plain text to coded text using algorithms (AES, RSA) |
| 5 | Two-Factor Authentication | Security process requiring two different authentication factors (password + OTP) |
| 6 | VPN (Virtual Private Network) | Creates secure encrypted connection over public networks |
| 7 | Ransomware | Malware that encrypts files and demands payment for decryption key |
10 Practice MCQs
Q1. Which of the following is NOT a type of malware? A) Virus B) Firewall C) Trojan D) Worm
Answer: B) Firewall
Solution:
- Virus: Self-replicating malicious code
- Firewall: Security defense system (NOT malware)
- Trojan: Disguised as legitimate software
- Worm: Spreads through networks automatically
Shortcut: Firewall protects, others infect!
Concept: Cyber Security - Types of threats vs protection
Q2. What does "https://" indicate in a website URL? A) High speed B) Secure connection C) Hidden text D) Home page
Answer: B) Secure connection
Solution:
- “s” in https stands for “secure”
- Uses SSL/TLS encryption
- Protects data in transit
- Padlock icon appears in browser
Shortcut: “S” = Secure!
Concept: Cyber Security - Web security protocols
Q3. OTP (One Time Password) is valid for: A) 30 minutes B) Single use only C) 24 hours D) One week
Answer: B) Single use only
Solution:
- OTP = One Time Password
- Can be used only once
- Expires after use or time limit
- Enhances security against replay attacks
Shortcut: “One Time” = Use once only!
Concept: Cyber Security - Authentication methods
Q4. A railway employee receives an email from "irctc@govt.co.in" asking for password reset. This is likely: A) Legitimate request B) Phishing attack C) System error D) Official protocol
Answer: B) Phishing attack
Solution:
- Real IRCTC domain: irctc.co.in
- “govt.co.in” is suspicious
- Legitimate companies don’t ask passwords via email
- Check sender’s email carefully
Shortcut: Check domain spelling - small changes = big fraud!
Concept: Cyber Security - Email security/Phishing
Q5. If a virus doubles every 3 hours and infected 5 files initially, how many files after 9 hours? A) 10 B) 20 C) 40 D) 80
Answer: C) 40
Solution:
- Initial: 5 files
- After 3 hours: 5 × 2 = 10
- After 6 hours: 10 × 2 = 20
- After 9 hours: 20 × 2 = 40
- Formula: Files = 5 × 2^(9/3) = 5 × 8 = 40
Shortcut: 9 hours = 3 doubling cycles → 5×2³ = 40
Concept: Cyber Security - Virus propagation patterns
Q6. A station's server has 1000 GB data. Ransomware encrypts 150 GB/hour. How long to encrypt 60% data? A) 2 hours B) 3 hours C) 4 hours D) 5 hours
Answer: C) 4 hours
Solution:
- 60% of 1000 GB = 600 GB
- Encryption rate: 150 GB/hour
- Time = 600 ÷ 150 = 4 hours
- Check: 150 × 4 = 600 GB
Shortcut: 600 ÷ 150 = 4 (direct division)
Concept: Cyber Security - Ransomware impact calculation
Q7. Password strength increases by how many times when length increases from 8 to 10 characters (using 62 possible characters)? A) 62 times B) 3844 times C) 62² times D) 62³ times
Answer: D) 62³ times
Solution:
- 8 chars: 62⁸ combinations
- 10 chars: 62¹⁰ combinations
- Ratio: 62¹⁰ ÷ 62⁸ = 62² = 3844
- Wait: 62¹⁰ ÷ 62⁸ = 62² = 3844
- Actually: 62¹⁰ ÷ 62⁸ = 62² = 3844
Shortcut: Ratio = 62^(10-8) = 62²
Concept: Cyber Security - Password complexity mathematics
Q8. A train reservation system uses 128-bit encryption. How many possible keys exist? A) 2¹²⁸ B) 128² C) 128×2 D) 2¹²⁷
Answer: A) 2¹²⁸
Solution:
- n-bit encryption = 2ⁿ possible keys
- 128-bit = 2¹²⁸ keys
- This is approximately 3.4 × 10³⁸
- Makes brute force attacks impractical
Shortcut: n-bit = 2ⁿ possibilities!
Concept: Cyber Security - Encryption key space
Q9. If a railway network has 50 stations and each needs unique symmetric key with every other station, total keys needed? A) 1225 B) 2450 C) 2500 D) 1275
Answer: A) 1225
Solution:
- Formula: n(n-1)/2 for unique pairs
- 50 × 49 ÷ 2 = 1225 keys
- Each pair shares one symmetric key
- 50 stations need 1225 unique connections
Shortcut: nC₂ = n(n-1)/2
Concept: Cyber Security - Key distribution in networks
Q10. A cyber attack targets 3 specific railway zones daily. Success rate: 70% per zone. Probability of attacking exactly 2 zones successfully today? A) 0.441 B) 0.49 C) 0.343 D) 0.147
Answer: A) 0.441
Solution:
- Binomial probability: C(3,2) × (0.7)² × (0.3)¹
- = 3 × 0.49 × 0.3
- = 3 × 0.147 = 0.441
- C(3,2) = 3 ways to choose 2 successes
Shortcut: 3 × 0.7² × 0.3 = 0.441
Concept: Cyber Security - Probability of attack success
5 Previous Year Questions
PYQ 1. What is the full form of 'VPN' used for secure internet browsing? [RRB NTPC 2021 CBT-1]
Answer: Virtual Private Network
Solution: VPN creates encrypted tunnel for secure data transmission over public networks
Exam Tip: Remember Virtual Private Network - very common question across all RRB exams
PYQ 2. Which of the following is a strong password? [RRB Group D 2022]
Answer: R@1lw@y2023!
Solution: Strong password has: uppercase, lowercase, numbers, special characters, 8+ length
Exam Tip: Look for mix of all character types and reasonable length
PYQ 3. What type of cyber attack is 'WannaCry'? [RRB ALP 2018]
Answer: Ransomware
Solution: WannaCry encrypted files and demanded Bitcoin payment for decryption
Exam Tip: Famous ransomware attacks: WannaCry, Petya, Locky - remember these names
PYQ 4. Two-factor authentication typically involves: [RRB JE 2019]
Answer: Password + OTP
Solution: Something you know (password) + something you have (phone for OTP)
Exam Tip: 2FA = Knowledge factor + Possession factor
PYQ 5. Which protocol is used for secure email transmission? [RPF SI 2019]
Answer: SMTPS (SMTP over SSL/TLS)
Solution: SMTPS adds encryption layer to standard SMTP protocol
Exam Tip: ‘S’ at end = Secure version (HTTPS, SMTPS, FTPS)
Speed Tricks & Shortcuts
For Cyber Security, provide exam-tested shortcuts:
| Situation | Shortcut | Example |
|---|---|---|
| Identifying phishing emails | Check 3 things: Spelling, Urgency, Unknown sender | “Urgent: Your IRCTC account will expire!” from irctc@gmail.com |
| Strong password criteria | Remember CLU8: Capital, Lower, Unique char, 8+ length | Railway@2023 (has all 4) |
| Malware types | V-T-W-R: Virus, Trojan, Worm, Ransomware | Virus needs host, Worm spreads alone |
| Encryption key sizes | n-bit = 2ⁿ possibilities | 256-bit = 2²⁵⁶ ≈ 10⁷⁷ keys |
| Network security layers | P-F-I-D: Physical, Firewall, IDS, Data encryption | Think of station security layers |
Common Mistakes to Avoid
| Mistake | Why Students Make It | Correct Approach |
|---|---|---|
| Confusing firewall with antivirus | Both protect but differently | Firewall = Traffic filter, Antivirus = File scanner |
| Thinking https guarantees safety | ‘Secure’ doesn’t mean ‘safe’ | Https encrypts, but site can still be malicious |
| Believing longer password always better | Ignores complexity | Length + complexity both matter: Railway@23 > railway12345678 |
| Assuming Mac/Linux can’t get viruses | OS myth | All systems vulnerable, just different malware types |
| Using public WiFi for banking | Convenience over security | Always use VPN on public networks |
Quick Revision Flashcards
| Front (Question/Term) | Back (Answer) |
|---|---|
| Phishing | Fraudulent attempt to get sensitive info via fake emails/websites |
| Malware full form | MALicious softWARE |
| Worm vs Virus | Worm spreads independently, Virus needs host file |
| 2FA factors | Something you know + Something you have |
| Encryption standard for Indian Railways | AES-256 (Advanced Encryption Standard) |
| Common ransomware payment | Cryptocurrency (Bitcoin) |
| Firewall location | Between internal network and external internet |
| VPN benefit | Hides IP address, encrypts all traffic |
| Strong password length | Minimum 8 characters (12+ recommended) |
| Cyber crime reporting in India | cybercrime.gov.in portal |
Topic Connections
How Cyber Security connects to other RRB exam topics:
- Direct Link: Computer Fundamentals - All security software runs on basic computer principles
- Combined Questions: Network topology + Security protocols, Database + Encryption methods
- Foundation For: Railway Information Systems, Digital India initiatives, Smart city projects