Security Mechanisms:-: Encipherment
Security Mechanisms:-: Encipherment
Security Mechanisms:-: Encipherment
Q. No Questions
Security Attacks:-
a) A security attack is an unauthorized attempt to steal, damage, or expose data from an
information system such as your website.
b) There are 2 types of attacks :-
1) Active attack:-
● An Active attack attempts to alter system resources or effect their operations.
● Active attack involve some modification of the data stream or creation of false statement.
● Types of active attacks are as following:-
❖ Masquerade – Masquerade attack takes place when one entity pretends to be
different entity. A Masquerade attack involves one of the other form of active
attacks.
❖ Modification of messages – It means that some portion of a message is altered or
that message is delayed or reordered to produce an unauthorised effect.
❖ Repudiation – This attack is done by either sender or receiver. The sender or
receiver can deny later that he/she has send or receive a message.
❖ Replay – It involves the passive capture of a message and its subsequent the
transmission to produce an authorized effect.
❖ Denial of Service – It prevents normal use of communication facilities. This attack
may have a specific target.
2) Passive attack :-
● A Passive attack attempts to learn or make use of information from the system but does not
affect system resources.
● Passive Attacks are in the nature of eavesdropping on or monitoring of transmission.
● The goal of the opponent is to obtain information is being transmitted.
● Types of Passive attacks are as following:-
❖ The release of message content – Telephonic conversation, an electronic mail
message or a transferred file may contain sensitive or confidential information. We
would like to prevent an opponent from learning the contents of these transmissions.
❖ Traffic analysis – Suppose that we had a way of masking (encryption) of
information, so that the attacker even if captured the message could not extract any
information from the message. The opponent could determine the location and
identity of communicating host and could observe the frequency and length of
messages being exchanged. This information might be useful in guessing the nature
of the communication that was taking place.
1. Providing Security:
● OSI Architecture in an organization provides the needed security and safety, preventing
potential threats and risks.
● Managers can easily take care of the security and there is hassle-free security
maintenance done through OSI Architecture.
2. Organising Task:
● Managers get the opportunity to organize tasks in an organization effectively.
● A well-planned standard architecture for security features enhances performance.
e) Three Pillars of OSI Security Architecture:- OSI Security Architecture is categorized into
three broad categories mentioned Security Attacks, Security mechanisms, and Security
Services.
f) These can be represented concisely as follows −
i) Security attack − Security attack is any action that deal the security of data owned by an
organization.
ii) Security mechanism − A process (or a device assortment such a process) that is designed to
identify, avoid, or restore from a security attack.
iii) Security service − A processing or communication service that improves the security of the
data processing systems and the information assign of an organization. The services are
pre-determined to counter security attacks, and they create need of one or more security structure
to support the service.
EXAMPLE:-
Key = “pascal”
[ p = 15 , a = 0 , s = 18, c = 2 , l = 11]
H E I S L I S T E N I N G
8 7 4 8 18 11 8 18 19 4 13 8 13 6
5 0 18 2 0 11 15 0 18 2 0 11 15 0
7 22 10 18 22 23 18 11 6 13 19 2 6
H H W K S W X S L G N T C G
H H W K S W X S L G N T C G
7 7 22 10 18 22 23 18 11 6 13 19 2 6
15 0 18 2 0 11 15 0 18 2 0 11 15 0
18 7 4 8 18 11 8 18 19 4 13 8 13 6
S H E I S L I S T E N I N G
Msg = “mosque”
Key = “ MONARCHY’
M O N A R
C H Y B D
E F G I/J K
L P Q S T
U V W X Z
Msg = “mosque”
Mo Sq Ue
On Ts Ml
7 Encrypt “This is the final exam” with Playfair cipher using key “Guidance”. Explain the
steps involved?
➔
8 What are transposition techniques? Explain keyed and keyless transposition ciphers with
examples?
➔
Transposition techniques:-
a) The transposition technique is a cryptographic technique that converts the plain text to
cipher text by performing permutations on the plain text, i.e., changing each character of
plain text for each round.
b) It includes various techniques like the Rail Fence technique, Simple columnar
transposition technique, simple columnar transposition technique with multiple rounds,
Vernam cipher, and book Cipher to encrypt the plain text in a secure way.
Keyless Transposition Cipher:
● In this cipher technique, the message is converted to ciphertext by either of two
permutation techniques:
a. Text is written into a table column-by-column and is then transmitted row-by-row.
b. Text is written into a table row-by-row and is then transmitted column-by-column
● The first method (a) is also popularly known as Rail-fence cipher
● E.g. We need to send the message “DEFENDTHEEASTWALL”. Arranging into tables we
get :
That means it takes 128 bits as input and outputs 128 bits of encrypted cipher text as output. AES
relies on substitution-permutation network principle which means it is performed using a series of
linked operations which involves replacing and shuffling of the input data.
❖ Working of the cipher :
AES performs operations on bytes of data rather than in bits. Since the block size is 128 bits, the
cipher processes 128 bits (or 16 bytes) of the input data at a time.
The number of rounds depends on the key length as follows :
● 128 bit key – 10 rounds
● 192 bit key – 12 rounds
● 256 bit key – 14 rounds
[ b0 | b1 | b2 | b3 ] [ b0 | b1 | b2 | b3 ]
| b4 | b5 | b6 | b7 | -> | b5 | b6 | b7 | b4 |
| b8 | b9 | b10 | b11 | | b10 | b11 | b8 | b9 |
[ b12 | b13 | b14 | b15 ] [ b15 | b12 | b13 | b14 ]
MixColumns :
This step is basically a matrix multiplication. Each column is multiplied with a specific matrix
and thus the position of each byte in the column is changed as a result.
This step is skipped in the last round.
[ c0 ] [ 2 3 1 1 ] [ b0 ]
| c1 | = |1 2 3 1| | b1 |
| c2 | |1 1 2 3| | b2 |
[ c3 ] [3 1 1 2] [ b3 ]
Add Round Keys :
Now the resultant output of the previous stage is XOR-ed with the corresponding round key.
Here, the 16 bytes is not considered as a grid but just as 128 bits of data.
After all these rounds 128 bits of encrypted data is given back as output. This process is repeated
until all the data to be encrypted undergoes this process.
Decryption :
The stages in the rounds can be easily undone as these stages have an opposite to it which when
performed reverts the changes.Each 128 blocks goes through the 10,12 or 14 rounds depending on
the key size.
The stages of each round in decryption is as follows :
● Add round key
● Inverse MixColumns
● ShiftRows
● Inverse SubByte
The decryption process is the encryption process done in reverse so i will explain the steps with
notable differences.
Inverse MixColumns :
This step is similar to the MixColumns step in encryption, but differs in the matrix used to carry
out the operation.
[ b0 ] [ 14 11 13 9 ] [ c0 ]
| b1 | = | 9 14 11 13 | | c1 |
| b2 | | 13 9 14 11 | | c2 |
[ b3 ] [ 11 13 9 14 ] [ c3 ]
Inverse SubBytes :
Inverse S-box is used as a lookup table and using which the bytes are substituted during
decryption.
14. What is Public key cryptography? Explain RSA algorithm with example
➔
Public key cryptography:-
a) Public key cryptography involves a pair of keys known as a public key and a
private key (a public key pair), which are associated with an entity that needs
to authenticate its identity electronically or to sign or encrypt data.
b) Each public key is published and the corresponding private key is kept secret.
c) Data that is encrypted with the public key can be decrypted only with the
corresponding private key.
d) Public key cryptography enables the following:
● Encryption and decryption, which allow two communicating parties to disguise data that
they send to each other. The sender encrypts, or scrambles, the data before sending it. The
receiver decrypts, or unscrambles, the data after receiving it. While in transit, the encrypted
data is not understood by an intruder.
● Nonrepudiation, which prevents:
○ The sender of the data from claiming, at a later date, that the data was never sent
○ The data from being altered.
e) Public-key cryptography, or asymmetric cryptography, is an encryption scheme that uses
two mathematically related, but not identical, keys - a public key and a private key.
f) Unlike symmetric key algorithms that rely on one key to both encrypt and decrypt, each
key performs a unique function.
g) The public key is used to encrypt and the private key is used to decrypt.
RSA algorithm:-
RSA algorithm is an asymmetric cryptography algorithm. Asymmetric actually means that it
works on two different keys i.e. Public Key and Private Key. As the name describes that the
Public Key is given to everyone and the Private key is kept private.
An example of asymmetric cryptography :
1. A client (for example browser) sends its public key to the server and requests some
data.
2. The server encrypts the data using the client’s public key and sends the encrypted data.
3. The client receives this data and decrypts it.
❖ The idea of RSA is based on the fact that it is difficult to factorize a large integer.
❖ The public key consists of two numbers where one number is a multiplication of two large
prime numbers.
❖ And private key is also derived from the same two prime numbers.
❖ So if somebody can factorize the large number, the private key is compromised.
❖ Therefore encryption strength totally lies on the key size and if we double or triple the key
size, the strength of encryption increases exponentially.
15. Given modulus n=91 and public key, e=5, find the values of p, q, phi(n), and d using RSA.
Encrypt M=25. Also perform decryption
➔
16. Hashing Techniques SHA-512?
➔
a) SHA-512, or Secure Hash Algorithm 512, is a hashing algorithm used to convert text of
any length into a fixed-size string.
b) Each output produces a SHA-512 length of 512 bits (64 bytes).
c) This algorithm is commonly used for email addresses hashing, password hashing, and
digital record verification.
d) SHA-512 is also used in blockchain technology, with the most notable example being the
BitShares network.
e) SHA-512 is a hashing algorithm that performs a hashing function on some data given to it.
f) Hashing algorithms are used in many things such as internet security, digital certificates
g) Since hashing algorithms play such a vital role in digital security and cryptography, this is
an easy-to-understand walkthrough, with some basic and simple maths along with some
h) It’s part of a group of hashing algorithms called SHA-2 which includes SHA-256 as well
So, SHA-512 does its work in a few stages. These stages go as follows:
1. Input formatting
3. Message Processing
4. Output
1. Input Formatting:
SHA-512 can’t actually hash a message input of any size, i.e. it has an input size limit. This limit
is imposed by its very structure as you may see further on. The entire formatted mesage has
basically three parts: the original message, padding bits, size of original message.
Padding bits
The input message is taken and some padding bits are appended to it in order to get it to the
desired length. The bits that are used for padding are simply ‘0’ bits with a leading ‘1’
(100000…000). Also, according to the algorithm, padding needs to be done, even if it is by one
Padding size
After this, the size of the original message given to the algorithm is appended. This size value
needs to be represented in 128 bits and is the only reason that the SHA-512 has a limitation for its
input message.
17. What is HMAC and CMAC also differentiate between them
➔
Textbook ( chp 2) (pg no- 29,30,31)
● Authentication: We can use the following reasoning to show how the message is
authenticated. If an intruder (user X) sends a message pretending that it is coming from
someone else (user A), user X uses her own private key to encrypt the message. The
message is decrypted by using the public key of user A. Therefore this makes the message
unreadable. Encryption with X's private key and decryption with A's public key results in
garbage value.
c) Malicious actors who want to steal or manipulate data for their own gain are often present
whenever precious or sensitive data is shared.
d) To minimize the risk of document tampering by malicious parties, businesses must be able
to check and authenticate that these critical business documents, data, and communications
are trusted and delivered securely.
e) In addition to protecting sensitive online data, digital signatures do not impede the
effectiveness of online document workflows; in fact, when compared to paper processes,
they often help improve document management.
f) When digital signatures are in place, signing a document becomes simple and can be done
on any computer or mobile device.
Step-2 :
A now encrypts the message digest with its private key. The output of this process is called
Digital Signature (DS) of A.
Step-3 :
Now sender A sends the digital signature (DS) along with the original message (M) to B.
Step-4 :
When B receives the Original Message(M) and the Digital Signature(DS) from A, it first uses the
same message-digest algorithm as was used by A and calculates its own Message Digest (MD2)
for M.
Step-5 :
Now B uses A’s public key to decrypt the digital signature because it was encrypted by A’s private
key. The result of this process is the original Message Digest (MD1) which was calculated by A.
Step-6 :
If MD1==MD2, the following facts are established as follows.
● B accepts the original message M as the correct, unaltered message from A.
● It also ensures that the message came from A and not someone posing as A.
DSS:-
a) Digital Signature Standard (DSS) is a Federal Information Processing Standard(FIPS)
which defines algorithms that are used to generate digital signatures with the help of
Secure Hash Algorithm(SHA) for the authentication of electronic documents.
b) DSS only provides us with the digital signature function and not with any encryption or
key exchanging strategies.
Sender Side :
In DSS Approach, a hash code is generated out of the message and following inputs are given to
the signature function –
1. The hash code.
2. The random number ‘k’ generated for that particular signature.
3. The private key of the sender i.e., PR(a).
4. A global public key(which is a set of parameters for the communicating principles) i.e.,
PU(g).
These input to the function will provide us with the output signature containing two components –
‘s’ and ‘r’. Therefore, the original message concatenated with the signature is sent to the receiver.
Receiver Side :
At the receiver end, verification of the sender is done. The hash code of the sent message is
generated. There is a verification function which takes the following inputs –
1. The hash code generated by the receiver.
2. Signature components ‘s’ and ‘r’.
3. Public key of the sender.
4. Global public key
● Database:
The Authentication Server verifies the access rights of users in the database.
● Step-1:
User login and request services on the host. Thus user requests for ticket-granting
service.
● Step-2:
Authentication Server verifies user’s access right using database and then gives
ticket-granting-ticket and session key. Results are encrypted using the Password of the
user.
● Step-3:
The decryption of the message is done using the password then send the ticket to Ticket
Granting Server. The Ticket contains authenticators like user names and network
addresses.
● Step-4:
Ticket Granting Server decrypts the ticket sent by User and authenticator verifies the
request then creates the ticket for requesting services from the Server.
● Step-5:
The user sends the Ticket and Authenticator to the Server.
● Step-6:
The server verifies the Ticket and authenticators then generate access to the service.
After this User can access the services.
Kerberos Limitations
● Each network service must be modified individually for use with Kerberos
● It doesn’t work well in a timeshare environment
● Secured Kerberos Server
● Requires an always-on Kerberos server
● Stores all passwords are encrypted with a single key
● Assumes workstations are secure
● May result in cascading loss of trust.
● Scalability
Although Kerberos can be found everywhere in the digital world, it is commonly used in secure
systems that rely on robust authentication and auditing capabilities. Kerberos is used for Posix,
Active Directory, NFS, and Samba authentication. It is also an alternative authentication system
to SSH, POP, and SMTP.
Many protocols depend on X.509 and it has many applications, some of them are given below:
● Document signing and Digital signature
● Web server security with the help of Transport Layer Security (TLS)/Secure Sockets
Layer (SSL) certificates
● Email certificates
● Code signing
● Secure Shell Protocol (SSH) keys
● Digital Identities
24. Write a note on Trojan horse, Viruses, Worms and Also Differentiate between them
a) A trap door is kind of a secret entry point into a program that allows anyone to gain access to
any system without going through the usual security access procedures.
b) Another definition of a trap door is it is a method of bypassing normal authentication
methods. Therefore it is also known as a back door.
c) Trap Doors are quite difficult to detect and also in order to find them the programmers or the
developers have to go through the components of the system.
d) Programmers use Trap door legally to debug and test programs. Trap doors turn to threats
when any dishonest programmers gain illegal access.
e) Program development and software update activities should be the first focus of security
measures. The operating system that controls the trap doors is difficult to implement.
Information Theft:-
There have been a growing number of cases of information theft over the past few years. While
more and more electronic security measures have been going up to protect people's possessions and
information, these new technologies have bugs and design flaws that are opening up whole new
worlds for the technologically advanced criminal.
2) ATM Spoofing:-
These crooks have pulled some impressively intricate heists. One group of criminals set
up a complete fake ATM machine inside a mall in Connecticut.. It looked and worked
just like a real one, except that after giving it your card and typing in your pin, it would
refuse you service saying it was out of order. It then had a record of the card and PIN
numbers of all the people who tried to use the machine.
3) PIN Capturing:-
Another group of criminals scoured the area across the street from a busy ATM, looking
for the perfect spot to hide a video camera aimed at the keys on the ATM machine. They
found such a spot and set up their camera. After each successful PIN number
identification that they recorded, one of the group members would go check for a
discarded receipt at the ATM. If they found one, the group had the card number and the
PIN number.
4) Database Theft:-
The previous criminal activities are all aimed at compiling databases of information
obtained fraudulently from people one by one. This takes time, and these people only
have limited amounts of time before their operations will be recognized and shut down.
This limits the number of people whose information these criminals can obtain. There
are, however, large databases of this kind of information that have been built up slowly
and legally by mild-mannered, legitimate internet companies. For example, BMG Music
Service lets customers give their credit card numbers when they sign up, so they don't
need to bother each time they make a purchase. There are thousands of users of this
service, many of whom likely use this feature. Combine this with the fact that hundreds
of computer systems are hacked into every day, and we have a situation where hackers
could steal an industrial-sized database of this kind of information, and run wild.
5) Electronic Cash:-
We are already well on the way to a cash-free society. People now use ATM cards,
credit cards, and check-cards for a large percentage of their purchasing. As we move
further from a paper-money society, to a purely electronic economy, new types of crime
will emerge. What types exactly will depend on what new forms of security tomorrow's
criminals will need to break. Will people be synthesizing voice authorizations? Or
running replay attacks on retinal scanners? Or even learning to imitate a victim's typing
style. All we can be sure of, is that criminals of tomorrow, like those of last century and
those of today, will keep on innovating.
2. Hardware Key-loggers : These are not dependent on any software as these are hardware
key-loggers. keyboard hardware is a circuit which is attached in a keyboard itself that whenever the
key of that keyboard pressed it gets recorded.
1. USB keylogger – There are USB connector key-loggers which has to be connected to a
computer and steals the data. Also some circuits are built into a keyboard so no external
wire i used or shows on the keyboard.
2. Smartphone sensors – Some cool android tricks are also used as key loggers such as
android accelerometer sensor which when placed near to the keyboard can sense the
vibrations and the graph then used to convert it to sentences, this technique accuracy is
about 80%. Now a days crackers are using keystroke logging Trojan, it is a malware
which is sent to a victims computer to steal the data and login details.
Rootkits:-
a) Rootkits are a type of malware that are designed so that they can remain hidden on your
computer.
b) But while you might not notice them, they are active. Rootkits give cybercriminals the ability
to remotely control your computer.
c) Rootkits can contain a number of tools, ranging from programs that allow hackers to steal
your passwords to modules that make it easy for them to steal your credit card or online
banking information.
d) Rootkits can also give hackers the ability to subvert or disable security software and track the
keys you tap on your keyword, making it easy for criminals to steal your personal
information.
e) Because rootkits can hijack or subvert security software, they are especially hard to detect,
making it likely that this type of malware could live on your computer for a long time causing
significant damage.
f) Sometimes the only way to completely eliminate a well-hidden rootkit is to erase your
computer’s operating system and rebuild from scratch.
g) You might open an email and download a file that looks safe but is actually a virus.
h) You might also accidentally download a rootkit through an infected mobile app.
i) Types of rootkits:-.
1. Hardware or firmware rootkit:- The name of this type of rootkit comes from where it is
installed on your computer. This type of malware could infect your computer’s hard drive or
its system BIOS, the software that is installed on a small memory chip in your computer’s
motherboard. It can even infect your router. Hackers can use these rootkits to intercept data
computer’s operating system when you turn the machine on. A bootloader toolkit, then,
attacks this system, replacing your computer’s legitimate bootloader with a hacked one. This
means that this rootkit is activated even before your computer’s operating system turns on.
3. Memory rootkit:- This type of rootkit hides in your computer’s RAM, or Random Access
Memory. These rootkits will carry out harmful activities in the background. These rootkits
have a short lifespan. They only live in your computer’s RAM and will disappear once you
reboot your system — though sometimes further work is required to get rid of them.
4. Application rootkit:- Application rootkits replace standard files in your computer with
rootkit files. They might also change the way standard applications work. These rootkits
might infect programs such as Word, Paint, or Notepad. Every time you run these programs,
you will give hackers access to your computer. The challenge here is that the infected
programs will still run normally, making it difficult for users to detect the rootkit.
5. Kernel mode rootkits:- These rootkits target the core of your computer’s operating system.
Cybercriminals can use these to change how your operating system functions. They just need
to add their own code to it. This can give them easy access to your computer and make it easy
Zombie:-
The primary focus of a DoS attack is to oversaturate the capacity of a targeted machine, resulting in
denial-of-service to additional requests. The multiple attack vectors of DoS attacks can be grouped
by their similarities.
While it can be difficult to separate an attack from other network connectivity errors or heavy
bandwidth consumption, some characteristics may indicate an attack is underway.
● Atypically slow network performance such as long load times for files or websites
● The inability to load a particular website such as your web property
● A sudden loss of connectivity across devices on the same network
A denial of service occurs when a legitimate user is denied access to a network, system, device, or
other resources that they are otherwise authorized to access. That can include their email, e-banking
account, public online services, etc.
30. Describe IPSec and justify the need of AH and ESP?
➔
IPSec (IP Security) architecture uses two protocols to secure the traffic or data flow. These
protocols are ESP (Encapsulation Security Payload) and AH (Authentication Header). IPSec
Architecture includes protocols, algorithms, DOI, and Key Management. All these components are
very important in order to provide the three main services:
● Confidentiality
● Authentication
● Integrity
Packet Format:
● Security Parameter Index(SPI): This parameter is used by Security Association. It is
used to give a unique number to the connection built between the Client and Server.
● Sequence Number: Unique Sequence numbers are allotted to every packet so that on the
receiver side packets can be arranged properly.
● Payload Data: Payload data means the actual data or the actual message. The Payload
data is in an encrypted format to achieve confidentiality.
● Padding: Extra bits of space are added to the original message in order to ensure
confidentiality. Padding length is the size of the added bits of space in the original
message.
● Next Header: Next header means the next payload or next actual data.
● Authentication Data This field is optional in ESP protocol packet format.
3. Encryption algorithm: The encryption algorithm is the document that describes various
encryption algorithms used for Encapsulation Security Payload.
4. AH Protocol: AH (Authentication Header) Protocol provides both Authentication and Integrity
service. Authentication Header is implemented in one way only: Authentication along with Integrity.
Authentication Header covers the packet format and general issues related to the use of AH for
packet authentication and integrity.
5. Authentication Algorithm: The authentication Algorithm contains the set of documents that
describe the authentication algorithm used for AH and for the authentication option of ESP.
6. DOI (Domain of Interpretation): DOI is the identifier that supports both AH and ESP protocols.
It contains values needed for documentation related to each other.
7. Key Management: Key Management contains the document that describes how the keys are
exchanged between sender and receiver.
A VPN hides your IP address by letting the network redirect it through a specially configured
remote server run by a VPN host. This means that if you surf online with a VPN, the VPN server
becomes the source of your data. This means your Internet Service Provider (ISP) and other third
parties cannot see which websites you visit or what data you send and receive online. A VPN works
like a filter that turns all your data into "gibberish". Even if someone were to get their hands on your
data, it would be useless.
A VPN connection disguises your data traffic online and protects it from external access.
Unencrypted data can be viewed by anyone who has network access and wants to see it. With a
VPN, hackers and cyber criminals can’t decipher this data.
Secure encryption: To read the data, you need an encryption key . Without one, it would take
millions of years for a computer to decipher the code in the event of a brute force attack . With the
help of a VPN, your online activities are hidden even on public networks.
Disguising your whereabouts : VPN servers essentially act as your proxies on the internet. Because
the demographic location data comes from a server in another country, your actual location cannot
be determined. In addition, most VPN services do not store logs of your activities. Some providers,
on the other hand, record your behavior, but do not pass this information on to third parties. This
means that any potential record of your user behavior remains permanently hidden.
Access to regional content: Regional web content is not always accessible from everywhere.
Services and websites often contain content that can only be accessed from certain parts of the
world. Standard connections use local servers in the country to determine your location. This means
that you cannot access content at home while traveling, and you cannot access international content
from home. With VPN location spoofing , you can switch to a server to another country and
effectively “change” your location.
Secure data transfer: If you work remotely, you may need to access important files on your
company’s network. For security reasons, this kind of information requires a secure connection. To
gain access to the network, a VPN connection is often required. VPN services connect to private
servers and use encryption methods to reduce the risk of data leakage.
VPN stands for Virtual Private Network (VPN), that allows a user to connect to a private network
over the Internet securely and privately. VPN creates an encrypted connection that is called VPN
tunnel, and all Internet traffic and communication is passed through this secure tunnel.
Virtual Private Network (VPN) is basically of 2 types:
1. Remote Access VPN:
● Remote Access VPN permits a user to connect to a private network and access all its
services and resources remotely.
● The connection between the user and the private network occurs through the Internet
and the connection is secure and private.
● Remote Access VPN is useful for home users and business users both.
An employee of a company, while he/she is out of station, uses a VPN to connect to
his/her company’s private network and remotely access files and resources on the
private network.
● Private users or home users of VPN, primarily use VPN services to bypass regional
restrictions on the Internet and access blocked websites.
● Users aware of Internet security also use VPN services to enhance their Internet
security and privacy.
A Site-to-Site VPN is also called as Router-to-Router VPN and is commonly used in the large
companies. Companies or organizations, with branch offices in different locations, use Site-to-site
VPN to connect the network of one office location to the network at another office location.
● Intranet based VPN: When several offices of the same company are connected using
Site-to-Site VPN type, it is called as Intranet based VPN.
● Extranet based VPN: When companies use Site-to-site VPN type to connect to the office
of another company, it is called as Extranet based VPN.
we are going to discuss the main differences between the SSL and TLS.
1. The SSL is a secure socket layer, whereas the TSL is a Transportation Layer Protection.
2. The SSL and TLS cryptographic protocols authenticate server-to-device data transfers. For
example, a cryptographic protocol encrypts data exchanged among the Web server and a user.
3. A secure framework is needed to encrypt the data from both sides. An SSL/TLS certificate
supports this. It serves as an encryption portal for encrypting information that prevents
unauthorized entry by hackers.
4. For SSL message authentication, key information and configuration data are needed on an ad
hoc basis, even as the TLS model depends on the authentication code for the HMAC hash.
5. SSL was a first-kind cryptographic protocol. On the other hand, TLS was the latest modified
SSL version.
33. Explain HTTPS?
➔
a) HTTPS is an abbreviation of Hypertext Transfer Protocol Secure. It is a secure extension
or version of HTTP.
b) This protocol is mainly used for providing security to the data sent between a website and the
web browser.
c) It is widely used on the internet and used for secure communications.
d) This protocol uses the 443 port number for communicating the data.
e) This protocol is also called HTTP over SSL because the HTTPS communication protocols
are encrypted using the SSL (Secure Socket Layer).
f) Advantages of HTTPS
Following are the advantages or benefits of a Hypertext Transfer Protocol Secure (HTTPS):
● SSL technology in HTTPS protects the data from third-party or hackers. And this technology
builds trust for the users who are using it.
g) Disadvantages of HTTPS
Following are the disadvantages or limitations of a Hypertext Transfer Protocol Secure (HTTPS):
● The big disadvantage of HTTPS is that users need to purchase the SSL certificate.
● The speed of accessing the website is slow because there are various complexities in
communication.
SSH(Secure Shell) is access credential that is used in the SSH Protocol. In other words, it is a
cryptographic network protocol that is used for transferring encrypted data over network. It allows
you to connect to a server, or multiple servers, without having you to remember or enter your
password for each system that is to login remotely from one system into another.
It always comes in key pair:
1. Public key – Everyone can see it, no need to protect it. (for encryption function)
2. Private key – Stays in computer, must be protected. (for decryption function)
1. User Key – If public key and private key remain with the user.
2. Host Key – If public key and private key are on a remote system.
3. Session key – Used when large amount of data is to be transmitted.
E-mail Hacking
Email hacking can be done in any of the following ways:
● Spam
● Virus
● Phishing
Spam
E-mail spamming is an act of sending Unsolicited Bulk E-mails (UBI) which one has not asked for.
Email spams are the junk mails sent by commercial companies as an advertisement of their products
and services.
Virus
Some emails may incorporate with files containing malicious script which when run on your
computer may lead to destroy your important data.
Phishing
Email phishing is an activity of sending emails to a user claiming to be a legitimate enterprise. Its
main purpose is to steal sensitive information such as usernames, passwords, and credit card details.
Such emails contains link to websites that are infected with malware and direct the user to enter
details at a fake website whose look and feels are same to legitimate one.
● It floods your e-mail account with unwanted e-mails, which may result in loss of
important e-mails if inbox is full.
● Time and energy is wasted in reviewing and deleting junk emails or spams.
● It consumes the bandwidth that slows the speed with which mails are delivered.
● Some unsolicited email may contain virus that can cause harm to your computer.
Blocking Spams
Following ways will help you to reduce spams:
● While posting letters to newsgroups or mailing list, use a separate e-mail address than
the one you used for your personal e-mails.
● Don’t give your email address on the websites as it can easily be spammed.
● Avoid replying to emails which you have received from unknown persons.
● Never buy anything in response to a spam that advertises a product.
g) SNMPv3 Architecture :
The architecture of the v3 consists of –
● Data definition language,
● Definition of MIB
● Protocol definition
● Security and administration.
39. Explain NAC Enforcement methods and steps to implement NAC Solutions?
➔
a) Network access control, also called network admission control, is a method to bolster the
b) It restricts the availability of network resources to endpoint devices and users that comply
with a defined security policy.
c) The NAC can also provide endpoint security protection such as antivirus software, firewall,
and vulnerability assessment with security enforcement policies and system authentication
methods.
d) A NAC system can deny network access to noncompliant devices, place them in a
quarantined area, or give them only restricted access to computing resources, thus
keeping insecure nodes from infecting the network.
e) NAC solutions help organizations control access to their networks through the following
capabilities:
● Policy lifecycle management: Enforces policies for all operating scenarios without
requiring separate products or additional modules.
● Profiling and visibility: Recognizes and profiles users and their devices before malicious
code can cause damage.
● Guest networking access: Manage guests through a customizable, self-service portal that
includes guest registration, guest authentication, guest sponsoring, and a guest management
portal.
● Security posture check: Evaluates security-policy compliance by user type, device type,
and operating system.
● Incidence response: Mitigates network threats by enforcing security policies that block,
isolate, and repair noncompliant machines without administrator attention.
● Bidirectional integration: Integrate with other security and network solutions through the
open/RESTful API.
f) Types of IDS:-
1. Signature-based Method:
Signature-based IDS detects the attacks on the basis of the specific patterns such as
number of bytes or number of 1’s or number of 0’s in the network traffic. It also detects on
the basis of the already known malicious instruction sequence that is used by the malware.
The detected patterns in the IDS are known as signatures.
Signature-based IDS can easily detect the attacks whose pattern (signature) already exists
in system but it is quite difficult to detect the new malware attacks as their pattern
(signature) is not known.
2. Anomaly-based Method:
Anomaly-based IDS was introduced to detect unknown malware attacks as new malware
are developed rapidly. In anomaly-based IDS there is use of machine learning to create a
trustful activity model and anything coming is compared with that model and it is
declared suspicious if it is not found in model. Machine learning-based method has a
better-generalized property in comparison to signature-based IDS as these models can be
trained according to the applications and hardware configurations.
41. What is Firewall? Explain different types of firewalls and list their advantages?
➔
a) A Firewall is a hardware or software to prevent a private computer or a network of
computers from unauthorized access, it acts as a filter to avoid unauthorized users from
accessing private computers and networks.
b) It is a vital component of network security.
c) It is the first line of defense for network security.
d) It filters network packets and stops malware from entering the user’s computer or network by
blocking access and preventing the user from being infected.
e) Advantages of Firewall:
1. Blocks infected files: While surfing the internet we encounter many unknown threats.
Any friendly-looking file might have malware in it. The firewall neutralizes this kind of
threat by blocking file access to the system.
2. Stop unwanted visitors: A firewall does not allow a cracker to break into the system
through a network. A strong firewall detects the threat and then stops the possible
loophole that can be used to penetrate through security into the system.
3. Safeguard the IP address: A network-based firewall like an internet connection
firewall(ICF). Keeps track of the internet activities done on a network or a system and
keeps the IP address hidden so that it can not be used to access sensitive information
against the user.
4. Prevents Email spamming: In this too many emails are sent to the same address leading
to the server crashing. A good firewall blocks the spammer source and prevents the server
from crashing.
5. Stops Spyware: If a bug is implanted in a network or system it tracks all the data flowing
and later uses it for the wrong purpose. A firewall keeps track of all the users accessing
the system or network and if spyware is detected it disables it.
● Packet-filtering Firewalls
● Circuit-level Gateways
● Threat-focused NGFW
● Cloud Firewalls
● Unified Threat Management (UTM) Firewalls
(for more details about the type of firewall visit this website—
https://www.javatpoint.com/types-of-firewall)
Characteristics of Firewall
1. Physical Barrier: A firewall does not allow any external traffic to enter a system or a
network without its allowance. A firewall creates a choke point for all the external data
trying to enter the system or network and hence can easily block access if needed.
2. Multi-Purpose: A firewall has many functions other than security purposes. It configures
domain names and Internet Protocol (IP) addresses. It also acts as a network address
translator. It can act as a meter for internet usage.
3. Flexible Security Policies: Different local systems or networks need different security
policies. A firewall can be modified according to the requirement of the user by changing
its security policies.
4. Security Platform: It provides a platform from which any alert to the issue related to
security or fixing issues can be accessed. All the queries related to security can be kept
under check from one place in a system or network.
5. Access Handler: Determines which traffic needs to flow first according to priority or can
change for a particular network or system. specific action requests may be initiated and
allowed to flow through the firewall.
Need and Importance of Firewall Design Principles
1. Different Requirements: Every local network or system has its threats and requirements
which needs different structure and devices. All this can only be identified while
designing a firewall. Accessing the current security outline of a company can help to
create a better firewall design.
2. Outlining Policies: Once a firewall is being designed, a system or network doesn’t need
to be secure. Some new threats can arise and if we have proper paperwork of policies then
the security system can be modified again and the network will become more secure.
3. Identifying Requirements: While designing a firewall data related to threats, devices
needed to be integrated, Missing resources, and updating security devices. All the
information collected is combined to get the best results. Even if one of these things is
misidentified leads to security issues.
4. Setting Restrictions: Every user has limitations to access different level of data or
modify it and it needed to be identified and taken action accordingly. After retrieving and
processing data, priority is set to people, devices, and applications.
5. Identify Deployment Location: Every firewall has its strengths and to get the most use
out of it, we need to deploy each of them at the right place in a system or network. In the
case of a packet filter firewall, it needs to be deployed at the edge of your network in
between the internal network and web server to get the most out of it.
❖ Firewall Design Principles:-
Advantages of Firewall:
6. Blocks infected files: While surfing the internet we encounter many unknown threats.
Any friendly-looking file might have malware in it. The firewall neutralizes this kind of
threat by blocking file access to the system.
7. Stop unwanted visitors: A firewall does not allow a cracker to break into the system
through a network. A strong firewall detects the threat and then stops the possible
loophole that can be used to penetrate through security into the system.
8. Safeguard the IP address: A network-based firewall like an internet connection
firewall(ICF). Keeps track of the internet activities done on a network or a system and
keeps the IP address hidden so that it can not be used to access sensitive information
against the user.
9. Prevents Email spamming: In this too many emails are sent to the same address leading
to the server crashing. A good firewall blocks the spammer source and prevents the server
from crashing.
10. Stops Spyware: If a bug is implanted in a network or system it tracks all the data
flowing and later uses it for the wrong purpose. A firewall keeps track of all the users
accessing the system or network and if spyware is detected it disables it.
Limitations:
1. Internal loose ends: A firewall can not be deployed everywhere when it comes to
internal attacks. Sometimes an attacker bypasses the firewall through a telephone lane that
crosses paths with a data lane that carries the data packets or an employee who
unwittingly cooperates with an external attacker.
2. Infected Files: In the modern world, we come across various kinds of files through emails
or the internet. Most of the files are executable under the parameter of an operating
system. It becomes impossible for the firewall to keep a track of all the files flowing
through the system.
3. Effective Cost: As the requirements of a network or a system increase according to the
level of threat increases. The cost of devices used to build the firewall increases. Even the
maintenance cost of the firewall also increases. Making the overall cost of the firewall
quite expensive.
4. User Restriction: Restrictions and rules implemented through a firewall make a network
secure but they can make work less effective when it comes to a large organization or a
company. Even making a slight change in data can require a permit from a person of
higher authority making work slow. The overall productivity drops because of all of this.
5. System Performance: A software-based firewall consumes a lot of resources of a system.
Using the RAM and consuming the power supply leaves very less resources for the rest of
the functions or programs. The performance of a system can experience a drop. On the
other hand hardware firewall does not affect the performance of a system much, because
its very less dependent on the system resources.