3 Computer Security (CSE 17514) Model Answer Practice Test
3 Computer Security (CSE 17514) Model Answer Practice Test
Q1. (A)
a) Explain active attack and passive attack.
(Active attack 1M its types 1M, Passive attack 1M its
types 1M)
Active Attack
An active attack attempts to alter system resources or
affect their operation.
It is quite difficult to prevent active attacks absolutely
because of the wide variety of potential physical, software, and
network vulnerabilities.
A masquerade takes place when one entity pretends to be
a different entity
Replay involves the passive capture of a data unit and its
subsequent retransmission to produce an unauthorized effect.
Modification of messages simply means that some portion
of a legitimate message is altered, or that messages are delayed
or reordered, to produce an unauthorized effect
The denial of service prevents or inhibits the normal use
or management of communications facilities
Passive Attack
A passive attack attempts to learn or make use of
information from the system but does not affect system
resources.
The goal of the opponent is to obtain information that is
being transmitted.
Traffic Analysis
Traffic analysis a passive attacker may try to find out
pattern of message between encoded messages for some
regarding communication and this analysis is known as
traffic analysis.
Release of Message Contents
A telephone conversation, an electronic mail
message, and a transferred file may contain sensitive or
confidential information. We would like to prevent an
opponent from learning the contents of these
transmissions.
b) List individual user responsibilities?
(Any eight responsibilities 4 marks)
Specific duties that user should follow be expected to
perform vary between organizations and type of business,
1. Lock the office, computer,
2. Don‟t leave sensitive information in free access,
3. Secure storage media,
4. Before discard of paper apply shredding
5. Discard used papers,
6. Protect laptops,
7. Be aware of persons around you.
8. Enforce corporate access control methods.
Ex. COMPUTER
C M U E
O P T R
Cipher text – CMUEOPTR
Attacker
This is done by ensuring that all communication going to
or from the target host routed through the attacker host.
The attacker can observe all traffic before relaying it and
can actually modify or block traffic.
To the target host it appears that communication is
occurring normally, since all expected replies are received
A MITM attack can only be successful when the attacker
can impersonate each endpoint to the satisfaction of the
other.
Security awareness
An unaware user is as dangerous to the system as the
attacker.
An active security awareness program is most
effective method to oppose potential social
engineering attacks.
When a person is hired it is important to provide an
initial employee training on social engineering.
An unaware security illiterate user can inflict damage
due to…
User runs programs: that allow the viruses or
Trojans to gain access to the system and spread
their malicious intent.
Access network and internet unaware of the
fact that, this act may give change to the worms
and spy ware to compromise the system
security
opens emails and messages and unknowingly
facilitating malicious code to execute and
spread and infect the system
login remotely, download applets and active X
controls executing underlying un trusted code
A B C D E F G H I J K L M
0 1 2 3 4 5 6 7 8 9 10 11 12
N O P Q R S T U V W X Y Z
13 14 15 16 17 18 19 20 21 22 23 24 25
C 02 02+03 mod 26 = 5 F
O 14 14+03 mod 26 = 17 R
M 12 12+03 mod 26 = 15 P
P 15 15+03 mod 26 = 18 S
U 20 20+03 mod 26 = 23 X
T 19 19+03 mod 26 = 22 W
E 04 04+03 mod 26 = 07 H
R 17 17+03 mod 26 = 20 U
S 18 18+03 mod 26 = 21 V
E 04 04+03 mod 26 = 07 H
C 02 02+03 mod 26 = 05 F
U 20 20+03 mod 26 = 23 X
R 17 17+03 mod 26 = 20 U
I 08 08+03 mod 26 = 11 L
T 19 19+03 mod 26 = 22 W
Y 24 24+03 mod 26 = 01 B
Critical Signature
Files Database
Intruder
Masquerader:
Clandestine user:
Insiders
Application Application
Transpor Transport
t
IPSe IPSec
c
Internet Internet
Physical Physical
Transmission
Media
Transport Mode
• Encrypts only data portion of packet,
• Thus enabling outsiders to see source & dest. IP address.
• This protects data being transmitted, but allows knowledge
of transmission.
• IPSec takes transport layer payload adds IPSec header &
then adds the IP header
• Thus the IP header in not encrypted.
• Protection of data portion of packet is referred as content
protection
Transport Layer
Payload
IP H IP Payload
Tunnel Mode
• Provides encryption of source & dest. IP addresses, as well
as of the data itself.
• It can only be done between IPSec servers because final
dest. Needs to be known for delivery.
• Protection of header information known as context
protection.
• It takes IP datagram, including IP header.
• It adds IPSec header & trailer & encrypts whole thing.
• It then adds new IP header to this encrypted datagram
• It is possible to use both methods at the same time
• Such as using transport within ones own n/w to reach an
IPSec server
• Which then using the transport method from the target n/w
IPSec server to target host.
• Has three connections- host to server, server to server &
host to host.
Transport
Payload
IP H IP Payload
Signature
Database
Alarm Reports
Storage
NIDS performs packet sniffing and analyze network traffic
to identify possible threats in network traffic
Some times they are deployed as in-line or out of path in
network.
Switch ports traffic is mirrored to IDS.
Each packet coming and going from the network is
scanned against defined rules and signatures.
Alerts are configured to notify security team whenever it
detects any anomaly.
Network based IDS focuses on network traffic bits and
bytes traveling along the cables.
NIDS having capability to analyze traffic according to
protocol, source, dest, content, traffic already seen.
The IDS must be able to handle traffic at any speed the
network operates.
Network based IDS looks for certain activities
Denial of service attack
Port scans
Malicious content in the data payload of packet
Vulnerability scanning
Trojan horse, viruses and worm
Tunneling
Brute force attack
Advantages
Examine content of packet
Lower cost of deployment, maintenance and upgrade
Examine all network traffic and correlate attacks
Disadvantage
Ineffective when traffic is encrypted
Don‟t know the activity on the hosts
Cant check traffic which does not pass it