0% found this document useful (0 votes)
61 views12 pages

NSC Assignment

Ho

Uploaded by

Marlapudi Manoj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
61 views12 pages

NSC Assignment

Ho

Uploaded by

Marlapudi Manoj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 12
eS Gq h M-Vorrsi Neva ans 4 popes \avarecse rye Assignment 2. @ Wele about mescage authertextin ceqeatuemerts? a0 Diseloguster Release cf message content to any pestrr or procen not |procening ite appropriate. cryplerraphic Key. : ‘iy Taceic_anatyns’ Diccowery of “the pattern Of trefic letteeen particn fin @ connection cstiented application, the Frequency and duratie of cennectionn could be determined: In either a cennection ovienved oF Connection enimonment the numb and Length of menage belcseer padies could tee determined: 10) Masquerade rinsertiin of mescageo Kscwee “Thy tncludin the Creation of menagen purported 40 Gene From an authostind — entity center OF MENGE ,incudiing Geko the MetwDOR érom a Aaudulirt by an opponent thet axe | Weentent modification Gharg’r to the Roeertion , deletion, Aearnposttion and modification: los modi fi fing modification “to a Sequence cf memages pOSSae eet tac toa ‘i |fekween pasitien , Inctuding that, deeditn and Meordering: iTtining modificatent Delay op seplau Of MENTED. Ree CeAERel te, rene [application an entice Sevpor or seqpunce Of menoger Could be a splay lg gorre. previous valid Semen, 6 Fndividual roerages ty the sepunce cout ke delayed se eplaiged + Ip a connection applccdion, an individual me [could be oo Meplayed Wii) Source sepudiitionr Cerio of transmission of meciage I by debnotien by Souwtee, |\iil) Deshinotinn sepuctiatton i Deriat of seceipt of message Menage authentectiin in a procedusie te Verify hak Yecei fron dhe! allagid Soce and have not been altcred.Mesinga rvemages come Jcuthenicasen mau aloo verify Sequencing and timelines. 4 dgHat signatuxe i9 Jan authentication technique that loo Telus ereacrors te counter %eprctation Ihy she souce ‘Scanned with CamScanner ‘Scanned with CamScanner oem. aan + = " What ane the different options ose distibuting “he public Heys explain? public Kay con be ishibutd fn de ou Fo | Dpubic announcement publicly available digrecterey © ii) »public Rey auethooeity 4 Ropublic Ruy certificates |Douwie cnnouncemen Here the public Key dn broadenated fe Aueryere Moyer weaken of thy method do Fogery. “Anyone can crate a key clermic to be someone coe and broaden it. Until forgery vis discovertd or Manquarade a claimed cise thio type, the puublic Huy do Stgoud at o | [D)pablicty ouatlave dixectooryr 4n A ee oe eae fe touted here, worth propertico Qike posticipart public dine ctosy. diate ctosiies ave fy values et any dime, contains |ouqistration, accen and aller te modi entries tive fname, public Key}. cisectsation cay be occenedt electronically stil [vulnerable to Eaqery ov scampering ; 4 mA Wi) pattlte Key authaastyr TE ao sievilar tty “the ciaeclosty bit, firprove secusily | by lightening control, over align buen Of Ky fern didtectooy. He AGEN lunus 20 now public Key for “the dlikectooty. Whenever the key axe Meedeck, a | wegl imme acces to iste ctosuy wy made Bits ua te cbtain any eased | palic Secaotely. st oe atin ~Hime autinonity prauictis a certificats to iv) paulte Ray cartiftcatin t ‘altow o (arthout eealctimne cen fo “the. public authoaity each | ime. the certificate 4o aceompanitd wiih seme citer fofo such ap periad of, waticity xights & we eter sate of HH Content Sn Sigred by he teuntect publte-| Key a contticaats. authority (CA) and it con be verited by anyone postessing the utbonit’s publle: Huy { @ Bxicety waite about kerbace Hb a neat agra? a Kerbercs pouideo o centralizet authentication server whee cfunaitn do te alttherrticots Wes to servers and servers to Uners. In Kerberes, ontthertication gerver and cotnbane 49 and fer client authentication. Kerberos 9 As O +thitd- party trunted ceayer Known ay the Key dighbbHsOn certer(kOC): Each War and seri on -the petootk tp a psincipad, [re main cempenents of kerbercs Ose sAucthentication Server (AS)! “The audfertication server performs the ‘ot Ond Hcker for tiwet granting service: + Datatbore: got curthentiantey The authentication server werrfies acces soghts ot the unas In datatoane: Je Ticket Granting Serie creas): “rag IStUe “the Hewet, fey the Server” therticcdion| aed =| | Kerberos | Kerberos_Overuiiewor DU ser (ogon cand sept services on host Thus wer Sequut fy ticeet | Qreunting Service: Authentication server verifies Une's acem sight wang dala bay ae cHhen gives Hceet ears ficket and Sehbon kiy. Rest ave enaryg- | ed whinge’ of Ctr ‘Scanned with CamScanner ‘Scanned with CamScanner ‘Scanned with CamScanner Diferentiate the TLS and SSL with “eir -ferrnab. Ose Supposts fortezza Agostith |OTLS ckes rot Suppostt. fortezza | algeeiethm | |@SSL_ % the 3-0 verse tts to the FO. vernon | Bin SSL pMePOg clique Io cd [Bin TEs, prerudo-XOrclen furchen feo cteata master secyet 30 umd to create master Seestet Pactocol 10 Und: jon cede protocol to ced: Osst to complex chan Ts Os 30 rrnple ss is lm secrsted ao Conperol@) TLS povvices high secutsuty A to TS. Din ssc, MeMB~ autthentication cede [Gin TUS Harhed muMsDGe autther tt @ define the encopsulaid Arown Yather than Trfected coals. uit) Matti Wisuuo Thin type of visu to ate to infect multiple ports of a Sapte Including boat sector, memory, and files, Th makes it difficult te detect | c Fi | Aad conain ce of _weynny} Scterane, “hed T)indemet_toomor AN Inenet comm vio type of realefoun softucave “Ther ; ie ‘ | Belk Meplicodin and dishibuted copies of Helk to Ib netone | ii) Email Losmsr Ap emoal comm distiladis copier of Hau Ip an Infectious execaRe files atiached to fake eroail menage Ni) Gretant roemagiag watnor Hin IM worm 49 a Selb seplieating maticioris | ee ; : | Code “tat 2 opxead Hough an instant merging nefverk fo) Fle shorting coomor file shating uty place a copy of them in a | \cheud Her and eistdbute -them via Rer te Rer Nekoote rd wee eoguts (Re Looms Spread enough Internet, Relay Chat CRC) cry Channels. sending tofectedl files av linwy +o infected websites 0 and _ Visto DuRrences_ beltocen Worres ong Mliserg ©A wom up a form of malware that seplicatis Heh anal can spread to different computics via netork- Main objective of Werns to eat the System Merortees. Vit doeorit need fo host a sceplicate fromm one tomputir fo ancthey: @H 45 low hormfat a cempereeat irs car be detected ane sumeved! by the oniiuist and firewall. © Worms con be conbullect by stemotr « Dwiorms ave etecahd Wa wesknenen jin system @ Morris wer Shram Wom and sql Starner aKe Sone of the enainplen of | wong MR dows not needo human action to steplicate On Spreading Yerel So Facer. DA Vito % a Malicious exeactable | cecle atitched 40 @nother executable file conch Can be harmlen oy an made fy or delete dite GThe Maly objective OF wis 49 to modify the infermation: it vequisuy hot to needed clr Sprea- acing: @M io mose harmfut. NO -Antiviewy Software xe cirect for protection} against viKunes @vixus cont be Conholled by Stmote, @Visuny oe exectuted via exeastattt € tile: @ Resdet anc non-seanelert swine ose tw eramplec of Uisutn, @St needs human acter to suplleate OB spending Seed to Slower an Compartid, @ [Explain “the “types of -istewalte- fury > of _fiscecwaltyr Vi) Crecente Levet Gateway Mi) Threat focuyed Ni Vil) Netooamk Actin WY) Cloud Aree 1) packetfilterting -iscercatls {iApplicatinn - level Getecoup Gq Pewy freaxatl) tw Gtertepeut moult auger Frpectm (omit) ffrewatl, W) Next genercttton firewoallo: (N GFW!) Fu Translertts (NATL Froawatls: i Onifiedt Trrectt Morcagement ( 1 Pacer -lteriog Ateoatlor A packet Atteriog ecw ype of Retewalls Ht ort ke a management precpeun Het monitors Network dretic and -fatewmall fiers Fed Seecotty sults Casccuit feet Qeteuuyie there axe anether simplfied type of firewall, Heat can be. county Corfguoud 6 allow or Ho teepie waithout consuming Sgpificant computing stesourtets There types of firewalls typeally opercte at Ihe Senburfeuet of the Osi medil by verifying “cP Comnectrons and Seriens- Wfpeteatyo tevel _gotewaupsr Prony fireunlo operate at the aprltadiin hep ao Qn Intermediate device to fitter Inceming tyettte between Juco endiysiens. FU Sterte faut_mnultilagr tospectsin fletewally EMLDFSML| Frewall irctude both Pathet \Upection eehndlogy, anal TeP loandebake verificatitny, making sm lt ieawwally superior “te pocket Atkring firewall (ev) cireunt Cvet gates V) Ment guneratiin ireroalls (GFT to O secustity eure cemiindng the Feats ard functtunatities of Other frewalls Thee facially tnctude dep Packek “nypection (pPL), TCP hand Shaking ete. wiimeat foured NEF It Fetus all the feotures of Adio NGFU. Adifimnally {hive aime provide aduaned treat detect and Memediaktn - Wi) Netwoe _feleloern Trenatatsen (NAT) Fiseiualigy These cou Pamestiliy cleoicqtuct Hte acer Anfernet offic and Wotk all unuanitel Cenneisns.there “type of Healy umrally bide the Packdsunes of Our deuiicis, making it sofe fem J adtackers: ‘ite Cloud firewall Whenever a firewall do elenqned wing a cloud Selttton] SA so Know aD Cloud firewall (1) Fac (Firecoat! a7 a Service). Cloud | Riewallo axe typically maintained and Mun on the tnéernet by stbivel- parts) vendors | Unified threat Manngement + UM Firewalls ave a gecint | type of dice that Fetus feetisun of A SteHeful frapectin Aree | Thceming packets bantd on centiqu with antivisury and rfeusden prevention Support: Such -frewwalls oe durdyred fo provicle Pimplicity ord case of (ue

You might also like