Google News
logo
Cyber Security Interview Questions
Authentication is a method to verify the credentials of users that request access to a system, network, or device. The different types of authentication are : 
 
Single-factor authentication : it is the simplest and most common way of authentication. This method requires only one verification method, such as a password or a security pin, to grant access to a system.

Two-factor authentication (2FA) : it requires a second factor to verify a user’s identity. In this method, you will have to enter the username, password, and OTP or PIN for verification.

Multi-factor authentication (MFA) : it needs two or more independent ways to identify a user, such as codes generated from the user’s smartphone, Captcha tests, fingerprints, or facial recognition. 

Bio-metric authentication (BFA) :  it requires the username, password, and biometric verification, such as voice identification, fingerprint, eye, or face scan.
Cyber espionage is the process of gaining unauthorized network or system access to obtain sensitive business documents. It uses malicious practices to access confidential/sensitive information of the company or government agency without the permission and knowledge of the holder. The objective of Cyber Espionage is to damage or misuse the compromised data.
Meltdown and Spectre are processor bugs that exploit critical vulnerabilities in modern processors. They enable hackers to steal the currently processed data and store it in the cache on the computer. Meltdown and Spectre, thus access the data stored in the memory of other running programs. It may include the passwords stored in the browser, emails, instant messages, and confidential business documents.
The following security capabilities can safeguard IoT devices against cyberattacks by making them more secure:
 
Secure boot : use of cryptographic code signing techniques.

Secure communication : it involves the use of security protocols like TLS, DTLS, and IPSec.

Secure firmware update : it ensures that the device firmware is updated only with firmware from the device OEM or other trusted party.

Data protection : encryption of all sensitive data stored on the IoT device.

Authentication : it verifies the credentials of users that request access to the device. 
The full form of SSH is Secure Socket Shell or Secure Shell. SSH is a utility suite that gives a secure way to system administrators to access the data on a network.