0% found this document useful (0 votes)
31 views

INS Assignment 3

Uploaded by

Unknown number
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
31 views

INS Assignment 3

Uploaded by

Unknown number
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 14
Assignment =3, 7 "Vlo 93 Delle —Lvleud a a ~ ) Defin der? VExploin ly . ‘ c > Dn “ldo, ) an individhed oy oi jp ains.UnatThorteed_aeceys._ a Q_ syst ity th oy physical loadin «They. iS km, netiuark, L We__mali ee, ents suchas steating re clo Ive ) cautsiiny clamage or cig tive inf nlomshan, i AS uDhing There ovte_velHnuy cpl oer af a So > “Hack Ng “These, individuals use ilk exploit vu fees oc eae peli. ny ¢_mativeded by tinoneial gain, Tideoleyy “ox eid on i ae | — 1) Malware $= Fnliciqus coflwaye including viv use I ____worms,“hojans,.6 van can itil y systems cause —hevmn_twithoud. Hunan _int ) Tnsideys Ereplayee.s ov individual ith access ‘ o_System _who_rmisuise thei porilepen 1 wapnsts ,suth ag dad thet 19) oY sabslage. \ 4) Phighers 3 They use decepliye ena uiebsitt “Compaen me: hos to + ssi _ oe aking mele fipns hes — offen troupes ches | SPyyvesonedion. ——8 Scape hala ge iat le e we _qrre-wsritien seviphs 0x tusks 1 Set Hock without on in-depth unde, a Siok = Sponsored Lebo Govewnnnrd ove regan ie at cond uct ci hen—ee pishage Cybern eu - teysort using”. lags & 4 cchniguen ty achiev their Goals. Q.2) Whol ig Fivewoll & evyphin He limitotiony « Ano. A Fivewol) is 0 nelwork security device on softwore thet ache os 0 borriew bebyiee o_ trusted —inteunal network bs untrusted exten] networks, such ag the incdeneh. Ts virnant ; besten ig to monitor 4 control inconning tb | Fi sdb behishe eal ncules ecuritu Dolicien. Crewolle ae designed to enhance nel udoyk security bu Ailing b blocking materially haymful or Ginauthor dala igautele Heue Gore sone limitations ctf a i) aan, Deskin Dovid pMohwawer Eirewslle Ose [ + tect one any eve noglwyre_ JNO a com entering a1 aie try auth ema}] abtachend ae downlonel. “They primarily es as a a Sackbyess Bie Mefense Against Tsicley Thrads= Firewalls any inedlective oS addeessing shreds ora inating bom oie dhe trusted nehdbyk such os Malicines sites swith airthiniced sccen gL yo Secuwe Enevupled Batic & Fivewnlls | can ingle +e __ingpec} encrypted tyofhic rm | op they chnmat cosily’ deciphey “He conbend } ¥ annec How) o Deep Macks E inspechon a is requicedl tea elfccrive anolyte al-_encrysted taLhich qnen Reus He bade funchons ale i Aroditonel fixtwalls. S A) _Compky — Annlicerion Layer Thoeaks &- Modern attack often Jesgel_yulneva bi iltien od the cxpmlicarhioy While fixewalls offey Som amplicon lowes ‘a TiMwing they _moy not be capobl: of idles ne backing atloniat! app licabion - specie _dineak Vahl, 3) False Positives Engel Fivewolls moa gencurde false itive. alse negative clue 4p “the compl ity ining bm maltdainging tihtering xulea. ORY of foilue = Ththe fivewall itself is compan ee. it can hove Seveve ConSeyuencea : Jel on fi Nl jie — 8.8 Faplain Dhighin —odlack with exarnple Avy. Dhisting is, ilo of Cubes ack ix which “ ollackens impersonate Lu i to deceive individuals indo ve ectling sengif. infor mrcctior i i ing eluils jor easonal fla, | Hee is an example of phi hing odtock = “Tmogine you receive an emai) thet AMP ears dn be ork your bank & it includes) fe banks lou rmattints The ernai) nfo nan you thet there has bebn suspieigun ocHivily on—yourr accourt 6 uroes You tp click o link vewifu uous atcount ~ detail to Secuae if She link gyrevidd Kes yori tea wehst that also looks like your banks official gfe However, this website is a cleven limifalon Creorted by dhe adfockesu, When voy entey_uour Useuname b- Gasswosd ithe inbox mation: corphutal bu attackers, who Can shen -acceys Your ‘real bonk occount. This is a chesle exeMple ol o Phishing odtack , whete the olacken ipmensond’n a rusted Source do tyick You indo divulging ensitive infor modion. “To protect uoursel® Jom hishing cdldacla, poly vewify dhe cuban of ermails 6 websita, & civord clicking on Susmiciou§ links or shanin pensonal inforrmadn unkss you oe. certain ofp their itm. staph cidenend types of ‘Das MOS (menial of Sd tice) Lacks, aac 7 us ~atlempls_to_disrupl disnhie athens e —anclning “of alo coxa. hr ‘oxeal _-seuice Thisie —asie_sevewnl -tpen of Dos alfack = > y Smurf Attack ¢- AvackexS sence! TCMP echo meguest ty a nelunrk broadcast add-vreg ; with Vi i in I i : on the EEA “p_respondl fp the victim pede nbialy. ves loacliney it | » 2 Srrows ent Redixechion= This _ hoppens when Yo. one “Hp ing chrying cto a a swhipage Howeves oncthen cpavle with a_Aebhesend apens ae can view only” epee a “unable fo view clhe covdends af the ‘orginal po eo. This is hecawe cig attacker has vedivecked” tae Sv igin al page doo did fester page 2 a 9 Clogin ons 3= losin connection the con _be_ ho Communicadion elween the Sener _& dhe weceiver . “The aHtackesis Close che open connection O qrevewt the user Hronn accessing nresourcel wel “cpp icoth m1 —tinally cxashen. Tn this cose che uses ig unable ce ged access do the webpogt: : Wa aut Aeordrop Diack = -filachens _cend TP _goclek + J TP rapcked : ra _, Lraam Saulooedlan 40 or: ihe when + otbrntrh sD aE * Syst | onetoS oe dhenas 0) HTP Flood t= PHuckens Pind o weh cevven with o massive numben “af HTTP wegue st. T u Causing ceannice Aissuplint 8.8) Evoloin Secure elecdaonic -trangociion. Secure Electinnic_ Ronsachan or SET 1 ot gystem thet ensuxey tho secuniht b inckerity .. ii \. , i Re Vv in cords in a Scenosig «SET i ea ead cthot ena blen Spoyeneed bik it o Secus ity —___rctoeal opplied “4 4 dibhesievc} enc wumtion hos bing vec inigyth ii strerougls credit costd » be SET mxctoco! web in de by mator Cneqewnizaties like Vise , Mastercard pet Michosof uy hiol , ded its Secure “Froneachion ‘Te Wicle Secuse aecket lotyeat SF Grotocal nostaicds the mreverling f "St n jp mexchowdh thus keting 4h thieven a The srr att hockens includen Coshurerdion — Au ante for_making - i ae _X. 804 Cn ZA ~_use of _standasiel ‘Digited Cesctificade ke Hchicee cule soi tal 53 Seve Here's how SET _Works*— ) Pasi cipard Roles = Thene vie sthyee_main Poahic pends in a ST 4yansaction , the cardholder, te f merchant J Payment _arteway » Digital Cestificcdes & Each pedficipart is issued a gital_ceomlikicate which Contaisn their public key Ceortiticote Rutho widen at. 2) Focyption AN Communitahion belween the position X = A OM \ D PYOtT eoveschrnmping oe Lanopesiing, 4) Dink Stonafuse s= Digital Sionodusen ase used fo S dhe inser enticity of the ria = j dl indented eet Durer involven _gevey ite aa co id execudion on a talc sysitm rn ire ig_—an nuptial U m7 On "hte nya Creoclion b Catling Yn Ibis indial—ge the | virus is _cntded_by a male Is 9 cece _hockew —warile lh Virus, | pA hich: ee Vaaious unclians 6 Say! 1s. 4 cious ations, Such_as__ Spreading mechanism b mali 2) Dropanadion 2 Viruses need a means of spreadin “Pantpngian he gyedems . They can clo “thy Simaugh various methods Such as email aHoahments , infected files, Network shaves ox infected websites. g x Oni i i a Sea i+ cxecude cade, This can Wwe i ixw’s design. game commen actigns include replicating elf, modifving or damaging Piles & compe omising the sect b privady “of the infeckd sytem 4) Payload Activation 2 Many VWruses hove a soy sant is_-he malicious achon they axe a, ® U a | de ‘ned a er cy a could he an th ng 1 | Di Shabded ‘enal of oi gee erttack axe encrpe sing Jgles for yancsam { 5) Dekchn fb Removal As securridy meas wi | ivi hen CoWare elfmrt+ tn fe b remove virugen allan cea ©. Idewttten a virus i} f delete he i ded Jileo ees at > if rang fe op ES Myuses” atiediscondinued by ei one while then exsist fox_extended Tepiccl, ry Discuss GS) Hondshnking qaaincal in dlefoil. Aw SSI (Secure Sockets foyer) Handshake poshcol, which has beh ouceeded Bu TLS (Transport loyen Security) js a crucial “part of estubliching Secure encrypted conneccHowl belween ci chet ard a Qeuvew oven the ane Here's i ceplniien of the SsLITLS handshake Onatoeals S Cienk Hello ‘The cliend initiates the handshak: by nding a“ Cliew! Hello” messane eves, This Smessane inchileg the clier*hs Supmated ceyping scp alge¥ithme a random value di ethey Porumelsis, Tt dlso specifier the higheat “F1S_veusisy. 2) Senven Hellat “The Seuver eepand uth aa_“Souves He re meg ane’, “Ln thi message sther _seavest choose the chron mulually suppavted —eiphest suite 0 rondom value & confiymn the TLS version bbe used. code ty th cliew! This cesrhihicade she ludes the senvey Public ey. ‘i AY. Searven Key Exchange te Spon “rey Soe. m Seaver mar -send, addtional) Me rch, oe einkormodion ov pervade, a Seaver Hello Done t= "ae Craven ce “Servant Hellobone” neg ange as c_senver_tns corayleded ihe pose Cote hentia niiamaiion 8) Finished = “the Sewven_sends a “fi a i message whichis _a hoch sf all —_—_hondshake Message jt has vereiveds Thic_gllow Mew | the client o__vesttiy dhe hondrake irdecgity _| The 5 his hondshake qretneal 6 Sundamerdal | fy secusniy ting aptlng = 7 cain Leccvn ys SD He conbiderdialtty ig ay ev.chonged over dhe j ip Wile . 38) Waite _ghort note on PGP, ” Av. eg ae cba (PGP) isa widely used try hee PGP was spinal develo by Phil Zinn | e719 4 AS a" meapange bY conrenny =f ee 2 ee in th ety eee v9e) 0 fom ok_sueel 4 leo & ' | Keu_Fecchuyes = ZI ____——! Fy Dablic iv " = PEP uses_a_pair_of ‘Keys, — ‘o Dublic Key fo enevuption an shy foy_decruption + The_gublic key can he hated — while “the " aprivade Key must be kept senha a 3 End-ty-fnd_Enex pian & Pat enabler endtoend oe enowelin ensytity hat only the inden, d_vecipiod d_sthe con dtc and message ox clef, 9 Doital Sionaive + DEP allwe users to giqn heir 1 seen ae s wih thei pote Aa in) wou exify the authenticity of the senden orl the irdegaiy’ ‘af the contend, 4) Web of Frust® PGP emplous a “web of trust” model whee users _cun_sign each, crthest keys, eclablishing a nehuesk af trusted vreledionghip within oa _compsunity 3 OpenPGP landed = TGP hos evalved irc on open 7 Stondaud Known 48 _Open'PGP_, enguding suerpesia b—, ‘lity omang vasios PGP compatible Dhan and inogtle mertetHond Fa 8 Secuve Communicodion &- PGP ig _commanl used fox | sectusting email communicedion by h ‘ i jormg oF dada. Poh tel OD Eyploin Man -in= middle crltock 9 i dw. A” Man-in-middle attack iS “a S¥rm ft — intercept ond pos ibly a ters the communiced bettie wo _centien, oFlen withoul dheiy knowledge or nes Tao MTTM ark "i cthe ackey positions themegelves belween the iva leqitimoke _uvties. acting asa “ha Cubexad tack in which an_ottackey sentiyy mn in_dhe—conttanicction » allowing Ahern do eaverdyo, Tonipulode_, o even inypercohed the podrhien invelved Here» how! on MitM attack: workst a" b Tea ception & “The ache ints cept I Communication behween she victim i i { indender| secupient 2) Decryplions TF enexuption’ is in use the ottac Kew right ottermpt do deer ape sthe inctesrcemled Y derfa , exposing its ident, 3) Eaves doppi t= The cdlackey can silerdly monitor commun tcedion, collecting - information like tgin creclevdial Pasi di or _confirlendial Messagen sO 4) Hala eo Th Some = the Hacker This Aa involve roieelint alias contend, changing tne recipients” adthieas or mad ing f kc E (faa cen ab Sma So Gace fH aia | Teepesisenedion & “The _cldackes sh imp oN fear ante hg a ee ion sentially easing pun io eine al : 1D. ANUTNON TZ Pa aki eae | Common methods used in MitM ottack ineluder > ARP Poisoning ¢ Tina local Helwork sock ens pam can minimulate the Ackhress ‘Resolution a DVeolocol cache Aclizecting cbaffic thvough heir systems ONS epooting $= ts dampeing with Domain Name 7 System © CONS) wesponfes, critackevs can _vediveed ugeHs +o malicious website. J! pasyreye fet ) J = —* Wii Envescsopping 2- PHackeys can sel up aque wi-fi hotspots, ewhicing users to connec do _cthem_,_ & dhen {nese ging their haf fie. O15 Explain 7 the Jb Low ing eum J VRAPD OOR Ny) Trapdoor inthe _cante + of computer ac fence cayptoy rap gin a specific design Kets Or Fae vail in__a_syctem thot allows authorized users to _gexovm cesta ; “or ncceas _apecific. infor mahian ~ Haile parted unawihonzed users Prom ‘the sume. This__-levm is often ue) ine contest of cryqto gacaphic cyclers, secs Like ube __ hes ar where a © trond oor fun chi ; chi dodo, in such a_taoy Jali it, "noni be eles ecrymed__by comeone with knowledge of ' Ske \_ ROOTKIT Anu, A Rootkit is oO Ju pe of malicious enftumre thot “is fqned dn gal unauth mized access and control Avex ‘a computer or a computing system, often oct the deemest level of she orperaching System Rookki | u inal dp hide thei” ‘Dr esence on “an infeed ayetem . enabling therm dn Cox out vaso malicious —_achitlien without being dete

You might also like