Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
31 views
INS Assignment 3
Uploaded by
Unknown number
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save INS Assignment 3 For Later
Download
Save
Save INS Assignment 3 For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
31 views
INS Assignment 3
Uploaded by
Unknown number
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save INS Assignment 3 For Later
Carousel Previous
Carousel Next
Save
Save INS Assignment 3 For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 14
Search
Fullscreen
Assignment =3, 7 "Vlo 93 Delle —Lvleud a a ~ ) Defin der? VExploin ly . ‘ c > Dn “ldo, ) an individhed oy oi jp ains.UnatThorteed_aeceys._ a Q_ syst ity th oy physical loadin «They. iS km, netiuark, L We__mali ee, ents suchas steating re clo Ive ) cautsiiny clamage or cig tive inf nlomshan, i AS uDhing There ovte_velHnuy cpl oer af a So > “Hack Ng “These, individuals use ilk exploit vu fees oc eae peli. ny ¢_mativeded by tinoneial gain, Tideoleyy “ox eid on i ae | — 1) Malware $= Fnliciqus coflwaye including viv use I ____worms,“hojans,.6 van can itil y systems cause —hevmn_twithoud. Hunan _int ) Tnsideys Ereplayee.s ov individual ith access ‘ o_System _who_rmisuise thei porilepen 1 wapnsts ,suth ag dad thet 19) oY sabslage. \ 4) Phighers 3 They use decepliye ena uiebsitt “Compaen me: hos to + ssi_ oe aking mele fipns hes — offen troupes ches | SPyyvesonedion. ——8 Scape hala ge iat le e we _qrre-wsritien seviphs 0x tusks 1 Set Hock without on in-depth unde, a Siok = Sponsored Lebo Govewnnnrd ove regan ie at cond uct ci hen—ee pishage Cybern eu - teysort using”. lags & 4 cchniguen ty achiev their Goals. Q.2) Whol ig Fivewoll & evyphin He limitotiony « Ano. A Fivewol) is 0 nelwork security device on softwore thet ache os 0 borriew bebyiee o_ trusted —inteunal network bs untrusted exten] networks, such ag the incdeneh. Ts virnant ; besten ig to monitor 4 control inconning tb | Fi sdb behishe eal ncules ecuritu Dolicien. Crewolle ae designed to enhance nel udoyk security bu Ailing b blocking materially haymful or Ginauthor dala igautele Heue Gore sone limitations ctf a i) aan, Deskin Dovid pMohwawer Eirewslle Ose [ + tect one any eve noglwyre_ JNO a com entering a1 aie try auth ema}] abtachendae downlonel. “They primarily es as a a Sackbyess Bie Mefense Against Tsicley Thrads= Firewalls any inedlective oS addeessing shreds ora inating bom oie dhe trusted nehdbyk such os Malicines sites swith airthiniced sccen gL yo Secuwe Enevupled Batic & Fivewnlls | can ingle +e __ingpec} encrypted tyofhic rm | op they chnmat cosily’ deciphey “He conbend } ¥ annec How) o Deep Macks E inspechon a is requicedl tea elfccrive anolyte al-_encrysted taLhich qnen Reus He bade funchons ale i Aroditonel fixtwalls. S A) _Compky — Annlicerion Layer Thoeaks &- Modern attack often Jesgel_yulneva bi iltien od the cxpmlicarhioy While fixewalls offey Som amplicon lowes ‘a TiMwing they _moy not be capobl: of idles ne backing atloniat! app licabion - specie _dineak Vahl, 3) False Positives Engel Fivewolls moa gencurde false itive. alse negative clue 4p “the compl ity ining bm maltdainging tihtering xulea. ORY of foilue = Ththe fivewall itself is compan ee. it can hove Seveve ConSeyuencea : Jel on fi Nl jie— 8.8 Faplain Dhighin —odlack with exarnple Avy. Dhisting is, ilo of Cubes ack ix which “ ollackens impersonate Lu i to deceive individuals indo ve ectling sengif. infor mrcctior i i ing eluils jor easonal fla, | Hee is an example of phi hing odtock = “Tmogine you receive an emai) thet AMP ears dn be ork your bank & it includes) fe banks lou rmattints The ernai) nfo nan you thet there has bebn suspieigun ocHivily on—yourr accourt 6 uroes You tp click o link vewifu uous atcount ~ detail to Secuae if She link gyrevidd Kes yori tea wehst that also looks like your banks official gfe However, this website is a cleven limifalon Creorted by dhe adfockesu, When voy entey_uour Useuname b- Gasswosd ithe inbox mation: corphutal bu attackers, who Can shen -acceys Your ‘real bonk occount. This is a chesle exeMple ol o Phishing odtack , whete the olacken ipmensond’n a rusted Source do tyick You indo divulging ensitive infor modion. “To protect uoursel® Jom hishing cdldacla, poly vewify dhe cuban of ermails 6 websita, & civord clicking on Susmiciou§ links or shanin pensonal inforrmadn unkss you oe. certain ofp their itm.staph cidenend types of ‘Das MOS (menial of Sd tice) Lacks, aac 7 us ~atlempls_to_disrupl disnhie athens e —anclning “of alo coxa. hr ‘oxeal _-seuice Thisie —asie_sevewnl -tpen of Dos alfack = > y Smurf Attack ¢- AvackexS sence! TCMP echo meguest ty a nelunrk broadcast add-vreg ; with Vi i in I i : on the EEA “p_respondl fp the victim pede nbialy. ves loacliney it | » 2 Srrows ent Redixechion= This _ hoppens when Yo. one “Hp ing chrying cto a a swhipage Howeves oncthen cpavle with a_Aebhesend apens ae can view only” epee a “unable fo view clhe covdends af the ‘orginal po eo. This is hecawe cig attacker has vedivecked” tae Sv igin al page doo did fester page 2 a 9 Clogin ons 3= losin connection the con _be_ ho Communicadion elween the Sener _& dhe weceiver . “The aHtackesis Close che open connection O qrevewt the user Hronn accessing nresourcel wel “cpp icoth m1 —tinally cxashen. Tn this cose che uses ig unable ce ged access do the webpogt: :Wa aut Aeordrop Diack = -filachens _cend TP _goclek + J TP rapcked : ra _, Lraam Saulooedlan 40 or: ihe when + otbrntrh sD aE * Syst | onetoS oe dhenas 0) HTP Flood t= PHuckens Pind o weh cevven with o massive numben “af HTTP wegue st. T u Causing ceannice Aissuplint 8.8) Evoloin Secure elecdaonic -trangociion. Secure Electinnic_ Ronsachan or SET 1 ot gystem thet ensuxey tho secuniht b inckerity .. ii \. , i Re Vv in cords in a Scenosig «SET i ea ead cthot ena blen Spoyeneed bik it o Secus ity —___rctoeal opplied “4 4 dibhesievc} enc wumtion hos bing vec inigyth ii strerougls credit costd » be SET mxctoco! web in de by mator Cneqewnizaties like Vise , Mastercard pet Michosof uy hiol , ded its Secure “Froneachion ‘Te Wicle Secuse aecket lotyeat SF Grotocal nostaicds the mreverling f "St n jp mexchowdh thus keting 4h thieven a The srr att hockens includen Coshurerdion — Au ante for_making - iae _X. 804 Cn ZA ~_use of _standasiel ‘Digited Cesctificade ke Hchicee cule soi tal 53 Seve Here's how SET _Works*— ) Pasi cipard Roles = Thene vie sthyee_main Poahic pends in a ST 4yansaction , the cardholder, te f merchant J Payment _arteway » Digital Cestificcdes & Each pedficipart is issued a gital_ceomlikicate which Contaisn their public key Ceortiticote Rutho widen at. 2) Focyption AN Communitahion belween the position X = A OM \ D PYOtT eoveschrnmping oe Lanopesiing, 4) Dink Stonafuse s= Digital Sionodusen ase used fo S dhe inser enticity of the ria = j dl indented eet Durer involven _gevey ite aa co id execudion on a talc sysitm rn ire ig_—an nuptial U m7 On "htenya Creoclion b Catling Yn Ibis indial—ge the | virus is _cntded_by a male Is 9 cece _hockew —warile lh Virus, | pA hich: ee Vaaious unclians 6 Say! 1s. 4 cious ations, Such_as__ Spreading mechanism b mali 2) Dropanadion 2 Viruses need a means of spreadin “Pantpngian he gyedems . They can clo “thy Simaugh various methods Such as email aHoahments , infected files, Network shaves ox infected websites. g x Oni i i a Sea i+ cxecude cade, This can Wwe i ixw’s design. game commen actigns include replicating elf, modifving or damaging Piles & compe omising the sect b privady “of the infeckd sytem 4) Payload Activation 2 Many VWruses hove a soy sant is_-he malicious achon they axe a, ® U a | de ‘ned a er cy a could he an th ng 1 | Di Shabded ‘enal of oi gee erttack axe encrpe sing Jgles for yancsam { 5) Dekchn fb Removal As securridy meas wi | ivi hen CoWare elfmrt+ tn fe b remove virugen allan cea ©. Idewttten a virus i} f delete he i ded Jileo ees at> if rang fe op ES Myuses” atiediscondinued by ei one while then exsist fox_extended Tepiccl, ry Discuss GS) Hondshnking qaaincal in dlefoil. Aw SSI (Secure Sockets foyer) Handshake poshcol, which has beh ouceeded Bu TLS (Transport loyen Security) js a crucial “part of estubliching Secure encrypted conneccHowl belween ci chet ard a Qeuvew oven the ane Here's i ceplniien of the SsLITLS handshake Onatoeals S Cienk Hello ‘The cliend initiates the handshak: by nding a“ Cliew! Hello” messane eves, This Smessane inchileg the clier*hs Supmated ceyping scp alge¥ithme a random value di ethey Porumelsis, Tt dlso specifier the higheat “F1S_veusisy. 2) Senven Hellat “The Seuver eepand uth aa_“Souves He re meg ane’, “Ln thi message sther _seavest choose the chron mulually suppavted —eiphest suite 0 rondom value & confiymn the TLS version bbe used. code ty th cliew! This cesrhihicade she ludes the senvey Public ey. ‘iAY. Searven Key Exchange te Spon “rey Soe. m Seaver mar -send, addtional) Me rch, oe einkormodion ov pervade, a Seaver Hello Done t= "ae Craven ce “Servant Hellobone” neg ange as c_senver_tns corayleded ihe pose Cote hentia niiamaiion 8) Finished = “the Sewven_sends a “fi a i message whichis _a hoch sf all —_—_hondshake Message jt has vereiveds Thic_gllow Mew | the client o__vesttiy dhe hondrake irdecgity _| The 5 his hondshake qretneal 6 Sundamerdal | fy secusniy ting aptlng = 7 cain Leccvn ys SD He conbiderdialtty ig ay ev.chonged over dhe j ip Wile . 38) Waite _ghort note on PGP, ” Av. eg ae cba (PGP) isa widely used try hee PGP was spinal develo by Phil Zinn | e719 4 AS a" meapange bY conrenny =f ee 2 ee in th ety eee v9e) 0 fom ok_sueel 4 leo &' | Keu_Fecchuyes = ZI ____——! Fy Dablic iv " = PEP uses_a_pair_of ‘Keys, — ‘o Dublic Key fo enevuption an shy foy_decruption + The_gublic key can he hated — while “the " aprivade Key must be kept senha a 3 End-ty-fnd_Enex pian & Pat enabler endtoend oe enowelin ensytity hat only the inden, d_vecipiod d_sthe con dtc and message ox clef, 9 Doital Sionaive + DEP allwe users to giqn heir 1 seen ae s wih thei pote Aa in) wou exify the authenticity of the senden orl the irdegaiy’ ‘af the contend, 4) Web of Frust® PGP emplous a “web of trust” model whee users _cun_sign each, crthest keys, eclablishing a nehuesk af trusted vreledionghip within oa _compsunity 3 OpenPGP landed = TGP hos evalved irc on open 7 Stondaud Known 48 _Open'PGP_, enguding suerpesia b—, ‘lity omang vasios PGP compatible Dhan and inogtle mertetHond Fa 8 Secuve Communicodion &- PGP ig _commanl used fox | sectusting email communicedion by h ‘ i jormg oF dada. Poh telOD Eyploin Man -in= middle crltock 9 i dw. A” Man-in-middle attack iS “a S¥rm ft — intercept ond pos ibly a ters the communiced bettie wo _centien, oFlen withoul dheiy knowledge or nes Tao MTTM ark "i cthe ackey positions themegelves belween the iva leqitimoke _uvties. acting asa “ha Cubexad tack in which an_ottackey sentiyy mn in_dhe—conttanicction » allowing Ahern do eaverdyo, Tonipulode_, o even inypercohed the podrhien invelved Here» how! on MitM attack: workst a" b Tea ception & “The ache ints cept I Communication behween she victim i i { indender| secupient 2) Decryplions TF enexuption’ is in use the ottac Kew right ottermpt do deer ape sthe inctesrcemled Y derfa , exposing its ident, 3) Eaves doppi t= The cdlackey can silerdly monitor commun tcedion, collecting - information like tgin creclevdial Pasi di or _confirlendial Messagen sO 4) Hala eo Th Some = the Hacker This Aa involve roieelint alias contend, changing tne recipients” adthieas or mad ing f kc E(faa cen ab Sma So Gace fH aia | Teepesisenedion & “The _cldackes sh imp oN fear ante hg a ee ion sentially easing pun io eine al : 1D. ANUTNON TZ Pa aki eae | Common methods used in MitM ottack ineluder > ARP Poisoning ¢ Tina local Helwork sock ens pam can minimulate the Ackhress ‘Resolution a DVeolocol cache Aclizecting cbaffic thvough heir systems ONS epooting $= ts dampeing with Domain Name 7 System © CONS) wesponfes, critackevs can _vediveed ugeHs +o malicious website. J! pasyreye fet ) J = —* Wii Envescsopping 2- PHackeys can sel up aque wi-fi hotspots, ewhicing users to connec do _cthem_,_ & dhen {nese ging their haf fie. O15 Explain 7 the Jb Low ing eum J VRAPD OOR Ny) Trapdoor inthe _cante + of computer ac fence cayptoy rap gin a specific design Kets Or Fae vail in__a_syctem thot allows authorized users to _gexovm cesta ;“or ncceas _apecific. infor mahian ~ Haile parted unawihonzed users Prom ‘the sume. This__-levm is often ue) ine contest of cryqto gacaphic cyclers, secs Like ube __ hes ar where a © trond oor fun chi ; chi dodo, in such a_taoy Jali it, "noni be eles ecrymed__by comeone with knowledge of ' Ske \_ ROOTKIT Anu, A Rootkit is oO Ju pe of malicious enftumre thot “is fqned dn gal unauth mized access and control Avex ‘a computer or a computing system, often oct the deemest level of she orperaching System Rookki | u inal dp hide thei” ‘Dr esence on “an infeed ayetem . enabling therm dn Cox out vaso malicious —_achitlien without being dete
You might also like
NS Assignment
PDF
No ratings yet
NS Assignment
11 pages
M-Cyber Security Notes
PDF
No ratings yet
M-Cyber Security Notes
24 pages
Untitled
PDF
No ratings yet
Untitled
36 pages
PGD P Ii
PDF
No ratings yet
PGD P Ii
102 pages
NSC Assignment
PDF
No ratings yet
NSC Assignment
12 pages
Unit 4 NIS
PDF
No ratings yet
Unit 4 NIS
14 pages
Cyber Security Assignment 1 N 2
PDF
No ratings yet
Cyber Security Assignment 1 N 2
10 pages
Iss Notes
PDF
No ratings yet
Iss Notes
16 pages
Cyber Security Assignment
PDF
No ratings yet
Cyber Security Assignment
10 pages
SecurityClassNotes 5241 4761210968
PDF
No ratings yet
SecurityClassNotes 5241 4761210968
30 pages
Security Practices Assignment
PDF
No ratings yet
Security Practices Assignment
14 pages
Online Security For Beginners 1 2020
PDF
No ratings yet
Online Security For Beginners 1 2020
97 pages
CNS Unit 4
PDF
No ratings yet
CNS Unit 4
11 pages
Cyber Security Notes
PDF
No ratings yet
Cyber Security Notes
20 pages
Cns Test 3 Answers
PDF
No ratings yet
Cns Test 3 Answers
27 pages
Some Viruses
PDF
No ratings yet
Some Viruses
7 pages
E Biz Assign
PDF
No ratings yet
E Biz Assign
16 pages
IGNOU-MSEI 025 Page 21-30
PDF
No ratings yet
IGNOU-MSEI 025 Page 21-30
10 pages
Nis QBefgh
PDF
No ratings yet
Nis QBefgh
8 pages
The Complete Internet Security Manual (2nd Ed)
PDF
100% (1)
The Complete Internet Security Manual (2nd Ed)
195 pages
CSDF Unit 2
PDF
No ratings yet
CSDF Unit 2
34 pages
Cyber Safety File
PDF
No ratings yet
Cyber Safety File
16 pages
Nis Unit 4 Notes
PDF
No ratings yet
Nis Unit 4 Notes
10 pages
Case Studies On Cyber Crimes
PDF
No ratings yet
Case Studies On Cyber Crimes
25 pages
Cyber Security - Notes 17-Apr-2022
PDF
No ratings yet
Cyber Security - Notes 17-Apr-2022
29 pages
Cyber Security Assignment No. 1
PDF
No ratings yet
Cyber Security Assignment No. 1
12 pages
Software Assignment
PDF
No ratings yet
Software Assignment
11 pages
Network Security
PDF
No ratings yet
Network Security
9 pages
CSE Cryptography and Ntwork Security unit-1
PDF
No ratings yet
CSE Cryptography and Ntwork Security unit-1
33 pages
Is Notes - 2
PDF
No ratings yet
Is Notes - 2
9 pages
Information Security Notes
PDF
100% (1)
Information Security Notes
11 pages
ISS Unit 1
PDF
No ratings yet
ISS Unit 1
20 pages
NIS (Network and Information Security) Unit5
PDF
No ratings yet
NIS (Network and Information Security) Unit5
29 pages
12 Notes
PDF
No ratings yet
12 Notes
10 pages
Bcs 62
PDF
No ratings yet
Bcs 62
13 pages
Computernotes
PDF
No ratings yet
Computernotes
11 pages
OS UNIT- 5
PDF
No ratings yet
OS UNIT- 5
12 pages
C&ss Qb2marks Ut2
PDF
No ratings yet
C&ss Qb2marks Ut2
6 pages
Cyber Security (Class 1 - 16) (BCA)
PDF
No ratings yet
Cyber Security (Class 1 - 16) (BCA)
51 pages
Cs LAQ
PDF
No ratings yet
Cs LAQ
23 pages
CNS Unit1
PDF
No ratings yet
CNS Unit1
23 pages
Cnsmid
PDF
No ratings yet
Cnsmid
12 pages
NS Assignment 1
PDF
No ratings yet
NS Assignment 1
7 pages
CNS Unit-1
PDF
No ratings yet
CNS Unit-1
44 pages
CSS Assignment 1
PDF
No ratings yet
CSS Assignment 1
13 pages
Network Security 2nd
PDF
No ratings yet
Network Security 2nd
10 pages
Invert PDF Colors
PDF
No ratings yet
Invert PDF Colors
13 pages
CF Assignment-3
PDF
No ratings yet
CF Assignment-3
6 pages
Ethical Hacking
PDF
No ratings yet
Ethical Hacking
70 pages
CYBERCRIME
PDF
No ratings yet
CYBERCRIME
5 pages
CSS Unit 2
PDF
No ratings yet
CSS Unit 2
15 pages
ECSA v01 Security Analysis (2011) CT
PDF
0% (1)
ECSA v01 Security Analysis (2011) CT
281 pages
Unit-2.. E-Commerce
PDF
No ratings yet
Unit-2.. E-Commerce
17 pages
084CNSA4
PDF
No ratings yet
084CNSA4
7 pages
Adobe Scan 16-Dec-2024 (1)
PDF
No ratings yet
Adobe Scan 16-Dec-2024 (1)
13 pages
Digital Empowerment Notes
PDF
No ratings yet
Digital Empowerment Notes
23 pages
Unit 1-Types of Cyber Crimes
PDF
No ratings yet
Unit 1-Types of Cyber Crimes
10 pages
Ccna Security Summary Connect4techs
PDF
No ratings yet
Ccna Security Summary Connect4techs
113 pages