COmputer Security
COmputer Security
1) What is spam?
a) Unsolicited commercial email
b) Unsent archives
c) Computer virus
d) Encryption algorithm
1
c) Provide a place to lure and capture hackers
d) Act as buffer between trusted and untrusted networks
Answer--- a) Asymmetric
Answer--- d) 56
2
Answer--- Hashing and asymmetric
Data encryption standard (DES) has been found vulnerable against very powerful attacks and
therefore, the popularity of DES has been found slightly on decline.
DES is a block cipher, and encrypts data in blocks of size of 64 bit each, means 64 bits of
plain text goes as the input to DES, which produces 64 bits of cipher text. The same algorithm
and key are used for encryption and decryption, with minor differences. The key length is 56
bits.
before the DES process even starts, every 8th bit of the key is discarded to produce a 56 bit key.
That is bit position 8, 16, 24, 32, 40, 48, 56 and 64 are discarded.
Thus, the discarding of every 8th bit of the key produces a 56-bit key from the original 64-bit key.
DES is based on the two fundamental attributes of cryptography: substitution (also called as
confusion) and transposition (also called as diffusion). DES consists of 16 steps, each of
which is called as a round. Each round performs the steps of substitution and transposition.
1. In the first step, the 64 bit plain text block is handed over to an initial Permutation (IP)
function.
3
5. In the end, LPT and RPT are rejoined and a Final Permutation (FP) is performed on the
combined block
4
This authority is typically exerted through a Each node within the network functions as a
central server that manages all data and separate authority with independent
permissions.
decision-making power regarding how it
o Confidentiality o
Authentication o
Integirity
IPSec operates in one of two different modes: the transport mode or the tunnel mode
Transport mode
• In the transport mode, IPSec protects what is delivered from the transport layer to the
network layer.
• In other words, the transport mode protects the network layer payload, the payload to be
encapsulated in the network layer.
• Note that the transport mode does not protect the IP header. In other words, the
transport mode does not protect the whole IP packet; it protects only the packet from
the transport layer (the IP layer payload).
5
• this mode, the IPSec header and trailer are added to the information corning from the
transport layer.
• The IP header is added later. IPSec in the transport mode does not protect the IP header;
it only protects the information coming from the transport layer.
• The transport mode is normally used when we need host-to-host (end-to-end) protection
of data.
• The sending host uses IPSec to authenticate and/or encrypt the payload delivered from
the transport layer.
• The receiving host uses IPSec to check the authentication andlor decrypt the IP packet
and deliver it to the transport layer. Figure 32.4 shows this concept.
Tunnel mode
• In the tunnel mode, IPSec protects the entire IP packet. It takes an IP packet, including
the header, applies IPSec security methods to the entire packet, and then adds a new IP
header as shown in Figure.
• The new IP header, as we will see shortly, has different information than the original IF
header. The tunnel mode is normally used between two routers, between a host and a
router, or between a router
• In other words, we use the tunnel mode when either the sender or the receiver is not a
host.
• The entire original packet is protected from intrusion between the sender and the
receiver.
6
4) Describe working of firewall and its types.
A firewall is a network security system that monitors and controls incoming and
outgoing network traffic based on predetermined security rules.A firewall typically
establishes a barrier between a trusted internal network and untrusted external
network, such as the Internet. Working:
• Firewall match the network traffic against the rule set defined in its table. Once the rule is
matched, associate action is applied to the network traffic. From the perspective of a server,
network traffic can be either outgoing or incoming. Firewall maintains a distinct set of rules
for both the cases.
• Mostly the outgoing traffic, originated from the server itself, allowed to pass. Still, setting a
rule on outgoing traffic is always better in order to achieve more security and prevent
unwanted communication.
7
packet protocol headers. Packets that are flagged as troublesome are, generally
speaking, unceremoniously dropped -- that is, they are not forwarded and, thus,
cease to exist.
• Circuit-level gateway
Using another relatively quick way to identify malicious content, circuit-level
gateways monitor TCP handshakes and other network protocol session initiation
messages across the network as they are established between the local and remote
hosts to determine whether the session being initiated is legitimate -- whether the
remote system is considered trusted. They don't inspect the packets themselves,
however.
• Application-level gateway
This kind of device -- technically a proxy and sometimes referred to as a proxy
firewall -- combines some of the attributes of packet filtering firewalls with those
of circuit-level gateways. They filter packets not only according to the service for
which they are intended -- as specified by the destination port -- but also by certain
other characteristics, such as the HTTP request string. While gateways that filter at
the application layer provide considerable data security, they can dramatically
affect network performance.
8
• An Intrusion Detection System (IDS) is a system that monitors network
traffic for suspicious activity and issues alerts when such activity is
discovered.
• A SIEM system integrates outputs from multiple sources and uses alarm
filtering techniques to differentiate malicious activity from false alarms.
Components of IDS:
9
• Traffic collector (or sensor):
Collects activity/events for the IDS to examine. On a HIDS, this could be log files,
audit logs, or traffic coming to or leaving a specific system. On a NIDS, this is
typically a mechanism for copying traffic off the network link—basically
functioning as a sniffer. This component is often referred to as a sensor.
• Analysis engine:
Examines the collected network traffic and compares it to known patterns of
suspicious or malicious activity stored in the signature database. The analysis engine
is the “brains” of the IDS.
• Signature database:
A collection of patterns and definitions of known suspicious or malicious activity.
10
11