Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
1K views
222 pages
CCS Full Notes
Ccs
Uploaded by
MAHENDRAN SELLADURAI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save CCS Full Notes For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
0 ratings
0% found this document useful (0 votes)
1K views
222 pages
CCS Full Notes
Ccs
Uploaded by
MAHENDRAN SELLADURAI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save CCS Full Notes For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save CCS Full Notes For Later
You are on page 1
/ 222
Search
Fullscreen
ANNAI TERESA COLLEGE OF ENGINEERIN' DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING ACADEMIC YEAR-2023-24 Sub Code cB3491 Subject Cryptography and Cyber Security Department CSE Year m Sem ¥ Submitted By: A.Ramya, HOD&AP/CSE STAFF SIGNATUREANNAI TERESA COLLEGE OF ENGINEERING — THIRUNAVALUR DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING ACADEMIC YEAR-2023-2024(Odd semester) Subject: CRYPTOGRAPHY AND CYBER SECURITY — Sub Code: CB3491 Class: IV-CSE(V-SEM) Prepared By: A.Ramya, HOD&AP/CSE. INDEX S.NO CONTENT PAGE NO 1 SYLLABUS 2 UNIT-I 3 UNIT-IL 4 UNIT-II 5 UNIT-IV 6 UNIT-VANNAI TERESA COLLEGE OF ENGINEERING — THIRUNAVALUR DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING Subject: CRYPTOGRAPHY AND CYBER SECURITY — Sub Code: CB3491 Class:CSE-III year(V-sem) SYLLABUS UNITI INTRODUCTION TO SECURITY 9 Computer Security Concepts — The OSI Security Architecture ~ Security Attacks ~ Security Services and Mechanisms — A Model for Network Security — Classical encryption techniques: Substitution techniques, Transposition techniques, Steganography — Foundations of modem cryptography: Perfect security — Information Theory ~ Product Cryptosystem — Cryptanalysis. UNIT = SYMMETRIC CIPHERS 9 Number theory — Algebraic Structures — Modular Arithmetic - Euclid's algorithm Congruence and matrices ~ Group, Ri lds, Finite Fields SYMMETRIC KEY CIPHERS: SDES - Block Ciphers - DES, Strength of DES — Differential and linear cryptanalysis — Block cipher design principles — Block cipher mode of operation — Evaluation criteria for AES — Pseudorandom Number Generators — RC4 — Key distribution, UNIT ASYMMETRIC CRYPTOGRAPHY 9 MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes — Primality ‘Testing ~ Factorization — Euler's totient function, Fermat's and Euler's Theorem — Chinese Remainder Theorem — Exponentiation and logarithm ASYMMETRIC KEY CIPHERS: RSA cryptosystem — Key distribution - Key management — Diffie Hellman key exchange — Elliptic curve arithmetic — Elliptic curve cryptography. UNITIV INTEGRITY AND AUTHENTICATION ALGORITHMS 9 Authentication requirement — Authentication function - MAC ~ Hash function — Security of hash function: HMAC, CMAC — SHA ~ Digital signature and authentication protocols — DSS. Schnorr Digital Signature Scheme — ElGamal cryptosystem — Entity Authentication: Biometrics, Passwords, Challenge Response protocols — Authentication applications — Kerberos MUTUAL TRUST: Key management and distribution — Symmetric key distribution using symmetric and asymmetric encryption — Distribution of public keys — X.509 Certificates UNITY CYBER CRIMES AND CYBER SECURITY 9 Cyber Crime and Information Security — classifications of Cyber Crimes — Tools andMethods — Password Cracking, Keyloggers, Spywares, SQL Injection — Network Access Control — Cloud Security — Web Security — Wireless Security TOTAL:45 PERIODS TEXT BOOKS 1. William Stallings, "Cryptography and Network Security - Principles and Practice", Seventh Edition, Pearson Education, 2017. 2. Nina Godbole, Sunit Belapure, “Cyber Security: Understanding Cyber crimes, Computer Forensics and Legal Perspectives”, First Edition, Wiley India, 2011. REFERENCES 1. Behrouz A. Ferouzan, Debdeep Mukhopadhyay, "Cryptography and Network Security”, 3rd Edition, Tata Me Graw Hill, 2015. 2. Charles Pfleger, Shari Pfleger, Jonathan Margulies, "Security in Computing", Fifth Edition, Prentice Hall, New Delhi, 2015.UNIT-LPART-A 1, What is meant by cryptography and eryptanalys (N/D-09) Cryptography is an art of writing hidden messages. It isa historical (or) forensic approach. Cryptanalysis is the process of analyzing hidden messages. It is a statistical (or) analytical approach. 2. What are the key principles of security? The key principle of security is the following: 1. Make sure you have the latest security updates & patches 2. Install anti-virus software pyware software 4, Use a personal firewall 5. Password advice (AM-12) 3. Install anti 3. Differentiate conventional (symmetric) from public key (asymmetric) encryption, (wiI-07) Conventional Encryption Publie-Key Encryption Needed to Work: Needed to work: 1. The same algorithm with the same key is used for encryption and decryption. 2. The sender and receiver must share the algorithm and the key. 1, One algorithm is used for encryption and decryption with a pair of keys, one for encryption and one for decryption. 2. The sender and receiver must each have one of the matched pair of keys (not of the same one). Needed for Security: 1. The key must be kept secret. 2. It must be impossible or atleast impractical to decipher a message if no other information is available 3. Knowledge of the algorithm. plus samples of ciphertext must be insufficient to determine the key. Needed for security: 1. One of the two keys must be kept secret. 2. It must be impo! impractical to decipher a message if no other information is available. 3. Knowledge of the algorithm plus one of the keys plus samples of the ciphertext must be insufficient to determine the other key. le or at least inguish between pas e attack and active attack with reference to X.800. (AM-11) X.800 categorize the attacks into two, namely passive and active attacks Passive attacks: Passive attacks are in the nature of eavesdropping on, or monitoring of, transmissions. It includes release of message contents and Traffic analysis. Passive attacks are very difficult to detect because they do not involve any alteration of data. However, it is feasible to prevent the success of these attacks, usually by means of encryption, Active attacks: Active attack involves some modification of the data stream or the creation of a false data stream and can be subdivided into four categories namely as a masquerade, replay. Submitted By:A.RAMYA,AP/CSE,ANNAI TERESA COLLEGE OF ENGINEERINGmodification of messages and the denial of service attack. 5, Define -Key and Plaintext (M/J-09) In cryptography, a key is defined as a piece of information that determines the functional output of a cryptographic algorithm or cipher. In encryption, a key specifies the particular transformation of plaintext into ciphertext or vice versa during decryption. Plaintext is ordinary readable text before being encrypted into ciphertext or after being decrypted. Find the GCD of 2740 and 1760, using Euclidean algorithm. (N/D-08) The GCD of two numbers say a and b can be found using the following formula gcd(a,b) =gcd(b,a mod b) GCD(2740,1760) = ged(1760, 2740 mod 1760)= ged(1760,980)=980 7. What is encipherment? (AMM-12) The use of mathematical algorithms to transform data into a form that is not readily intelligible. The transformation and subsequent recovery of the data depend on an algorithm and zero or more encryption keys. 8. What is a passive attack? (MIS-09) Passive attacks are in the nature of eavesdropping on, or monitoring of, transmissions. The goal of the opponent is to obtain information that is being transmitted. Two types of passive attacks are the release of message contents and traffic analysis. 9. What is the cipher? (A/M-12) Monoalphabetic cipher is a monoalphabetic cipher is a substitution cipher in which the cipher alphabet is fixed through the encryption process. All of the substitution ciphers we have seen prior to this handout are monoalphabetie; these ciphers are highly susceptible to frequency analysis. Polyalphabetic Cipher is a polyalphabetic cipher is a substitution cipher in which the cipher alphabet changes during the encryption process, ference between a monoalphabet cipher and a polyalphabetic 10, What is the avalanche effect’? (MIS-07) Incryptography, the avalanche effect refers to a desirable property of cryptographic algorithms, typically block ciphers and cryptographic hash functions. The avalanche effect is evident if, when an input is changed slightly (for example, flipping a single bit) the output changes significantly (e.g., half the output bits flip). In the case of high-quality block ciphers, such a small change in either the key or the plaintext should cause a drastic change in the ciphertext. Submitted By:A.RAMYA,AP/CSE,ANNAI TERESA COLLEGE OF ENGINEERINGUNIT I- INTRODUCTION Security trends - Legal, Ethical and Professional Aspects of Security, Need for Security at Muttiple Levels, Security Policies - Model of Network Security - Security Attacks, Services and Mechanisms - OSI security architecture - classical encryption techniques: substitution techniques, transposition techniques, steganography - Foundations of modem cryptography: perfect security - information theory - product cryptosystem - cryptanaysis PART-B 4.WRITE SHORT NOTES ON SECURITY TRENDS. The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information’ data, and telecommunications) This definition introduces three key objectives that are at the heart of computer security: + Confidentiality: This term covers two related concepts: * Data confidentiality: Assures that private or confidential information is not made available or disclosed to unauthorized individuals. + Privacy: Assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed. + Integrity: This term covers two related concepts: + Data integrity: Assures that information and programs are changed only in a specified and authorized manner. + System integrity: Assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system. + Availability: Assures that systems work promptly and service is not denied to authorized users These three concepts form what is often referred to as the CIA triad (Figure 1.1). The three concepts embody the fundamental security objectives for both data and for information and computing services Avaitabiity Figure 1.1 CIA triad Although the use of the CIA triad to define security objectives is well established, some in the security field feel that additional concepts are needed to present a complete picture. Two of the most commonly mentioned are as follows: + Authenticity: The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or message originator. This meansfrom a trusted source. + Accountability: The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity. This supports non repudiation, deterrence, fault isolation, intrusion detection and prevention, and after-action recovery and legal action. + Computer Security - Generic name for the collection of tools designed to protect data and to thwart hackers. + Network Security - Measures to protect data during their transmission + Internet Security - Measures to protect data during their transmission over a collection of interconnected networks Our Focus is on Internet Security which consists of measures to deter, prevent, detect and correct security violations that involve the transmission and storage of information soph tated command ae conta weee| art area” increase m wide scale Tojan horse axtbuton| § mapecen rama § § ideprend tacks on Dees vasactre tehmquestoanahae code forvutoce saree executable code stats agus brome) aroma probes iacking seo packet pootng — Figure 1.2 Security Trends 1.1.1 THE CHALLENGES OF COMPUTER SECURITY Computer and network security is both fascinating and complex. Some of the reasons follow: 1. Security is not as simple as it might first appear to the novice. The requirements seem to be straightforward; indeed, most of the major requirements for security services can be given self- explanatory, one-word labels: confidentiality, authentication, non repudiation, or integrity. 2. In developing a particular security mechanism or algorithm, one must always consider potential attacks on those security features. 3. Typically, a security mechanism is complex, and it is not obvious from the statement of 2 particular requirement that such elaborate measures are needed. 4, Having designed various security mechanisms, it is necessary to decide where to use them. This is true both in terms of physical placement and in a logical sense 5, Security mechanisms typically involve more than a particular algorithm or protocol6. Computer and network security is essentially a battle of wits between a perpetrator who tries to find holes and the designer or administrator who tries to close them. The great advantage that the attacker has is that he or she need only find a single weakness, while the designer must find and eliminate all weaknesses to achieve perfect security. 7. There is a natural tendency on the part of users and system managers to perceive litle benefit from security investment until a security failure occurs. 8. Security requires regular, even constant, monitoring, and this is difficult in today's short-term, overloaded environment. 9. Security is still too often an afterthought to be incorporated into a system after the design is complete rather than being an integral part of the design process. 40. Many users and even security administrators view strong security as an impediment to efficient and user-friendly operation of an information system or use of information. 2.DECRIBE ABOUT LEGAL, ETHICAL AND PROFESSIONAL ASPECTS OF SECURIT, Today millions of people perform online transactions every day. There many ways to attack computer and networks to take advantage of what has made shopping, banking, transformation of messages, investments and leisure pursuits a simple matter of dragging and clicking for many people. Thus, the laws and ethics are important aspects in data and network security. The legal system has adapted quite well to computer technology by reusing some old forms of legal protection (copyrights and patents) and creating laws where no adequate one existed (malicious access). Stil the courts are not a perfect form of protection for computer, for two reasons, first court tends to be reactive instead of proactive. That is, we have to wait for regression to occur and then adjudicative it, rather than try to prevent it in first place. Second fixing a problem through the courts can be time consuming and more expensive. The latter characteristic prevents all but the wealthy from addressing most wealthy. On other hand, tethics has not had to change , because ethic is more situational and personal than the law, for example the privacy of personal information becoming important part of computer network security and although technically this issue is just an aspect of confidentiality, practically it has a long history in both law and ethics. Law and security are related in several ways. First international, national, state, city laws affect privacy, secrecy. These statutes often apply to the rights of individuals to keep personal matters private. Second law regulates the use of development, and ownership of data and programs. Patents, copy rights, and trade secrets are legal devices to protect the right of developers and owners of the information and data Cryptography and Law Cyber-Crime: - Criminal activities or attacks in which computer and computer networks are tool, target, or place of criminal activity. Cybercrime categorize based on computer roles such as target, storage device and communication tool. Computers as targets: To get the information from the computer system or control the computer system without the authorization or payment or alter the interfaces or data in the particular system with use of server. "Computers as storage devices: Computers can be Used to further unlawful activity by using @computer or a computer device as a assive storage medium. For example, the computer can be used to store stolen password lists, credit card details and proprietary corporate information. Computers as communications tools: Many of the crimes falling within this category are simply traditional crimes that are committed online. Examples include the illegal sale of prescription drugs, controlled substances, alcohol, and guns; fraud; gambling; and child pornography. Other than these crimes there are more specific crimes in computer networks, There are: Wegal access: The access to the whole or any part of @ computer system without right Illegal interception: The interception without right, made by technical means, of non-public transmissions of computer data to, from or within a computer system, including electromagnetic emissions from a computer system carrying such computer data, Data interference: The damaging, deletion, deterioration, alteration or suppression of computer data without right. ‘System interference: The serious hindering without right of the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data. Computer-related forgery: The input, alteration, deletion, or suppression of computer data, resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible. Crime related to child pornography: Producing child pornography or distribution through a computer system and making available or distributing or transmitting child pornography through acomputer system. The relative lack of success in bringing cyber-criminals to justice has led to an increase in their numbers, boldness, and the global scale of their operations. Itis difficult to profile cybercriminals in the way that is often done with other types of repeat offenders. The success of cybercriminals and the relative lack of success of law enforcement, influence the behaviour of cybercrime victims. As with law enforcement, many organizations that may be the target of attack have not invested sufficiently in technical, physical, and human-factor resources to prevent attacks. The law is used regulate people for their own good and for the greater good of society. Cryptography also regulated activity. ‘Some Example laws which are forced on cryptography. Control use of cryptography: Closely related to restrictions on content are restrictions on the use of cryptography imposed on users in certain countries. For examples, 2 In China, state council order 273 requires foreign organizations or individuals to apply permission to use encryption in China. Pakistan requires that all encryption hardware and software be inspected and approved by the Pakistan telecommunication authority Cryptography and Free speech: The Cryptography involve not just products, it involves ideas too, although governments effectively control the flow of products across borders, controlling the fice ideas either head or on the internet, is also impossible. Cryptography and Escrow: Although laws enable govemments to read encrypted communications. In 1996, US government offered to relax the export restriction for so called ‘escrowed encryption, in which the government would able to obtain the encryption key for any encrypted communication.The victory in use of law enforcement depends much more on technical skills of the people. Management needs to understand the criminal investigation process, the inputs that investigators need, and the ways in which the victim can contribute positively to the investigation. 3.WRITE SHORT NOTES ON INTELLECTUAL PROPERTIES. There are three main types of intellectual property for which legal protection is available. Copy rights: Copyright law protects the tangible or fixed expression of an idea, not the idea itself. Copy right properties exists when proposed work is original and creator has put original idea in concrete form and the copyright owner has these exclusive rights, protected against infringement such as reproduction right, modification right, distribution right Patents: A patent for an invention is the grant of a property right to the inventor. There are 3 types in patents: + Utility (any new and useful process, machine, article of manufacture, or composition of matter). + Design (new, original, and ornamental design for an article of manufacture) + Plant (discovers and asexually reproduces any distinct and new variety of plant). Trade-Marks: A trademark is a word, name, symbol or expression which used to identify the products or services in trade uniquely from others. Trade mark rights used to prevent others from using a confusingly similar mark, but not to prevent others from making the same goods or from selling the same goods or services under a clearly different mark. + Intellectual Property Relevant to Network and Computer Security ‘A number of forms of intellectual property are relevant in the context of network and computer security + Software programs: software programs are protected by using copyright, perhaps patent. + Digital content: audio / video / media / web protected by copy right Algorithms: algorithms may be able to protect by patenting + Privacy Law and Regulation: An issue with considerable overlap with computer security is that of privacy. Concerns about the extent to which personal privacy has been and may be compromised have led to a variety of legal and technical approaches to reinforcing privacy rights. A number of international organizations and national governments have introduced laws and regulations intended to protect individual privacy. + European Union Data Protection Directive was adopted in 1998 to ensure member states protect fundamental privacy rights when processing personal info and prevent member states from restricting the free flow of personal info within EU organized around principles of notice, consent, consistency, access, security, onward transfer and enforcement. US Privacy Law have Privacy Act of 1974 which permits individuals to determine records kept, forbid records being used for other purposes, obtain access to records, ensures agencies properly collect, maintain, and use personal info and creates, a private right of action for individuals. Cryptography and Ethics.+ There are many potential misuses and abuses of information and electronic communication that create privacy and security problems. Ethics refers to a system of ‘moral principles that relates to the benefits and harms of particular actions. An ethic an objectively defined standard of right and wrong. Ethical standards are often idealistic principles because they focus on one objective. Even though religious group and professional organization promote certain standards of ethical behaviour, ultimately each person is responsible for deciding what do in a specific situation. Ethical issues related to computer and info systems Computers have become the primary repository of both personal information and negotiable assets, such as bank records, securities records, and other financial information. Repositories and processors of information: Unauthorized use of otherwise unused computer services or of information stored in computers raises questions of appropriateness or faimess. Producers of new forms and types of assets: For example, computer programs are entirely new types of assets, possibly not subject to the same concepts of ownership as other assets. ‘Symbols of intimidation and deception: The images of computers as thinking machines, absolute truth producers, infallible, subject to blame, and as anthropomorphic replacements of humans who err should be carefully considered 4.LIST OUT THE NEED FOR SECURITY AT MULTIPLE LEVELS Multilevel security or multiple levels of security (MLS) is the application of a computer system to process information with incompatible classifications (ie., at different security levels), permit access by users with different security clearances and needs-to-know, and prevent users from obtaining access to information for which they lack authorization. There are two contexts for the use of multilevel security. One is to refer to a system that is adequate to protect itself from subversion and has robust mechanisms to separate information domains, that is, trustworthy Another context is to refer to an application of a computer that will require the computer to be strong enough to protect itself from subversion and possess adequate mechanisms to separate information domains, that is, a system we must trust. This distinction is important because systems that need to be trusted are not necessarily trustworthy. A threat is an object, person, or other entity that represents a constant danger to an asset. Security Policies The Cryptography Policy sets out when and how encryption should be used. It includes protection of sensitive information and communications, key management, and procedures to ensure encrypted information can be recovered by the organisation if necessary. Role of the Security Policy in Setting up Protocols Following are some pointers which help in setting u protocols for the security policy of an organization + Who should have access to the system? + How it should be configured? + Howto communicate with third parties or systems?Policies are divided in two categories: + User policies + IT policies. User policies generally define the limit of the users towards the computer resources in a workplace. For example, what are they allowed to install in their computer, if they can use removable storages? Whereas, IT policies are designed for IT department, to secure the procedures and functions of IT fields. + General Policies ~ This is the policy which defines the rights of the staff and access level to the systems. Generally, itis included even in the communication protocol as a preventive measure in case there are any disasters. + Server Policies - This defines who should have access to the specific server and with what rights. Which software's should be installed, level of access to internet, how they should be updated? + Firewall Access and Configuration Policies - It defines who should have access to the firewall and what type of access, like monitoring, rules change. Which ports and services should be allowed and if it should be inbound or outbound? + Backup Policies - It defines who is the responsible person for backup, what should be the backup, where it should be backed up, how long it should be kept and the frequency of the backup. «VPN Policies - These policies generally go with the firewall policy; it defines those users who should have a VPN access and with what rights. For site-to-site connections with partners, it defines the access level of the partner to your network, type of encryption to be set 5.DESCRIBE THE STRUCTURE OF A SECURITY POLICY When you compile a security policy you should have in mind a basic structure in order to make something practical. Some of the main points which have to be taken into consideration are: + Description of the Policy and what is the usage for? + Where this policy should be applied? + Functions and responsibilities of the employees that are affected by this policy. + Procedures that are involved in this policy. + Consequences if the policy is not compatible with company standards. Types of Policies + Permissive Policy ~ It is a medium restriction policy where we as an administrator block just some well-known ports of malware regarding internet access and just some exploits are taken in consideration + Prudent Policy - This is a high restriction policy where everything is blocked regarding the internet access, just a small list of websites is allowed, and now extra services are allowed in computers to be installed and logs are maintained for every user.Acceptance User Policy - This policy regulates the behavior of the users towards a system or network or even a webpage, so it is explicitly said what a user can do and cannot in a system. Like are they allowed to share access codes, can they share resources, etc User Account Policy - This policy defines what a user should do in order to have or maintain another user in a specific system. For example, accessing an e-commerce webpage. To create this policy, you should answer some questions such as ~ Should the password be complex or not? What age should the users have? © Maximum allowed tries or fails to log in? © When the user should be deleted, activated, blocked? Information Protection Policy ~ This policy is to regulate access to information, hot to process information, how to store and how it should be transferred. Remote Access Policy ~ This policy is mainly for big companies where the user and their branches are outside their headquarters. It tells what should the users access, when they can work and on which software like SSH, VPN, RDP, ‘ewall Management Policy ~ This policy has explicitly to do with its management, which ports should be blocked, what updates should be taken, how to make changes in the firewall, how long should be the logs be kept Special Access Policy - This policy is intended to keep people under control and monitor the special privileges in their systems and the purpose as to why they have it. These employees can be team leaders, managers, senior managers, system administrators, and such high designation based people. Network Policy - This policy is to restrict the access of anyone towards the network resource and make clear who all will access the network. It will also ensure whether that person should be authenticated or not. This policy also includes other aspects like, who will authorize the new devices that will be connected with network? The documentation of network changes. Web filters and the levels of access. Who should have wireless connection and the type of authentication, validity of connection session? Email Usage Policy - This is one of the most important policies that should be done because many users use the work email for personal purposes as well. As a result information can leak outside. Some of the key points of this policy are the employees should know the importance of this system that they have the privilege to use. They should not open any attachments that look suspicious. Private and confidential data should not be sent via any encrypted email Software Security Policy - This policy has to do with the software's installed in the user ‘computer and what they should have. Some of the key points of this policy are Software of the company should not be given to third parties. Only the white list of software's should be allowed, no other software's should be installed in the computer. Warez and pirated software's should not be allowed.6.DESCRIBE ABOUT A MODEL FOR NETWORK SECURITY. ‘A model for much of what we will be discussing is captured, in very general terms, in Figure 1.3. A message is to be transferred from one party to another across some sort of Internet service. A security-related transformation on the information to be sent, Examples include the encryption of the message, which scrambles the message so that it is unreadable by the ‘opponent, and the addition of a code based on the contents of the message, which can be used to verify the identity of the sender ‘Some secret information shared by the two principals and, it is hoped, unknown to the ‘opponent. An example is an encryption key used in conjunction with the transformation to scramble the message before transmission and unscramble it on reception. Trusted third party (exp. arbiter, distributer ‘of secret information) o Information Recipient .| swcanoe chan seein A Opponent Figure 1.3 Model for Network Security All the techniques for providing security have two components: This general model shows that there are four basic tasks in designing a particular security service: 1. Design an algorithm for performing the security-related transformation. The algorithm should be such that an opponent cannot defeat its purpose. 2. Generate the secret information to be used with the algorithm, 3. Develop methods for the distribution and sharing of the secret information 4. Specify a protocol to be used by the two principals that makes use of the security algorithm and the secret information to achieve a particular security service A general model of these other situations is illustrated by Figure 1.4, which reflects a concer for protecting an information system from unwanted access. Most readers are familiar with the concems caused by the existence of hackers, who attempt to penetrate systems that can be accessed over a network. The hacker can be someone who, with no malign intent, simply gets satisfaction from breaking and entering a computer system. The intruder can be a disgruntled employee who wishes to do damage or a criminal who seeks to exploit computer assets for financial gain (e.g., obtaining credit card numbers or performing illegal money transfers).Information system Opponent —buman (eg hacker) Access channel Gatekeeper function Figure 1.4 Network Access Security Model Another type of unwanted access is the placement in a computer system of logic that exploits vulnerabilities in the system and that can affect application programs as well as utility programs, such as editors and compilers. Programs can present two kinds of threats: + Information access threats: Intercept or modify data on behalf of users who should not have access to that data. + Service threats: Exploit service flaws in computers to inhibit use by legitimate users. Viruses and worms are two examples of software attacks. Such attacks can be introduced into a system by means of a disk that contains the unwanted logic concealed in otherwise useful software, The security mechanisms needed to cope with unwanted access fall into two broad categories (see Figure 1.4). The first category might be termed a gatekeeper function. It includes, password-based login procedures that are designed to deny access to all but authorized users and screening logic that is designed to detect and reject worms, viruses, and other similar attacks. Once either an unwanted user or unwanted software gains access, ‘The second line of defense consists of a variety of internal controls that monitor activity and analyze stored information in an attempt to detect the presence of unwanted intruders. 7. DESCRIBE ABOUT THE OSI SECURITY ARCHITECTURE ITU-T Recommendation X.800, Security Architecture for OSI, defines such a systematic approach. The OS! security architecture is useful to managers as a way of organizing the task of providing security. This architecture was developed as an international standard, computer ‘and communications vendors have developed security features for their products and services. that relate to this structured definition of services and mechanisms. The OSI security architecture focuses on security attacks, mechanisms, and services These can be defined briefly as a. Security attack: Any action that compromises the security of information ‘owned by an organization. b. Security mechanism: A process (or a device incorporating such @ process) that is designed to detect, prevent, or recover from a security attack.c. Security service: A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the service. In the literature, the terms threat and attack are commonly used to mean more or less the same thing, C Table 1.1 provides defi ns taken from RFC 2828, IntemetSecurity Glossary. Threat A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm. That is, a threat is a possible danger that might exploit a vulnerability Attack ‘An assault on system security that derives from an intelligent threat; that is, an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system. ATTACKS The security attacks can be classified into two types’ passive attacks and active attacks. A passive attack attempts to learn or make use of information from the system but does not affect system resources. An active attack attempts to alter system resources or affect their operation. Passive Attacks ‘Two types of passive attacks are the release of message contents and traffic analysis. The release of message contents is easily understood (Figure 1.5a).A telephone conversation, an electronic mail message, and a transferred file may contain sensitive or confidential information. We would like to prevent an opponent from learning the contents of these transmissions. ‘A second type of passive attack, traffic analysis, is subtler (Figure 1.5b). Suppose that we had a way of masking the contents of messages or other information traffic so that opponents, even if they captured the message, could not extract the information from the message. The common technique for masking contents is encryption. if we had encryption protection in place, an opponent might stil be able to observe the pattern of these messages. Passive attacks are very difficult to detect, because they do not involve any alteration of the data. Typically, the message traffic is not sent and received in an apparently normal fashion and the sender nor receiver is aware that a third party has read the messages or observed the traffic. pattern,Figure 1.5 Passive Attacks Active Attacks ‘Active attacks involve some modification of the data stream or the creation of a false stream and ‘can be subdivided into four categories: masquerade, replay, modification of messages, and denial of service, ‘A masquerade takes place when one entity pretends to be a different entity (Figure 1.6). A masquerade attack usually includes one of the other forms of active attack. For example, authentication sequences can be captured and replayed after a valid authentication sequence has taken place, thus enabling an authorized entity with few privileges to obtain extra privileges by impersonating an entity that has those privileges. Replay involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect (Figure 1.6b). Modification of messages simply means that some portion of a legitimate message is altered, or that messages are delayed or reordered, to produce an unauthorized effect (Figure 1.6c). For example, a message meaning “Allow John Smith to read confidential file accounts" is modified to mean “Allow Fred Brown to read confidential file account. The denial of service prevents or inhibits the normal use or management of communications facilities (Figure 1.6d). This attack may have a specific target.Active attacks present the opposite characteristics of passive attacks. Whereas passive attacks are difficult to detect, measures are available to prevent their success. Figure 1.6 Active Attacks8.EXPLAIN ABOUT THE SERVICES AND MECHANISMS IN DETAILS. X.800 defines a security service as a service that is provided by a protocol layer of communicating open systems and that ensures adequate security of the systems or of data transfers. Perhaps a clearer definition is found in RFC 2828, which provides the following definition: a processing or communication service that is provided by a system to give a specific kind of protection to system resources; security services implement security policies and are implemented by security mechanisms. X.800 divides these services into five categories and fourteen specific services (Table 1.2) Table 1.2 Security Services (X.800) AUTHENTICATION ‘The asurance that the communicating entity i the ‘one that it aims to be. Peer Entity Authendication ‘Used in association with alopical connection to provide confidence inthe idemtity ofthe entities ‘connectod, ‘Data-Origin Authendcation {Ina connectioniess transfer, provides assurance that ‘the source of received datas as claimed. ACCESS CONTROL ‘The prevention of unauthorized use of x resource (Ce. this service controls wo cam have access toa resource, under what caditions acess can ceca, ‘and what those accessing the resource are allowed, todo), DATA CONFIDENTIALITY. ‘The protection of data from unauthorized disclosure. ‘Connection Confidentiality ‘The protection of all wser data on a connection Connectionless Confidentiality ‘The protection of all wer data ina single data Mock ‘Sdctve Held Conidetaity ‘The confident of seceded within the wer ata ona connection o in asngle data Hock. ‘Trafic Flow Confidentiality “The protection ofthe information that might be
Encryption method is completely unbreakable for a cipher-text only known attack > Chosen Plaintext (or) Ciphertext attacks is not possible Disadvantages > It requires a very long key which is expensive to produce and expensive to transmit. > Once a key is used it is dangerous to reuse it for second message. 6. Polyalphabetic Ciphers Another way to improve on the simple monoalphabetic technique is to use different monoalphabetic substitutions as one proceeds through the plaintext message. The general name for this approach is polyalphabetic substitution cipher. All these techniques have the following features in common: 1, Asset of related monoalphabetic substitution rules is used. 2. Akey determines which particular rule is chosen for a given transformation VIGEN'ERE CIPHER The best known, and one of the simplest, polyalphabetic ciphers is the Vigenére cipher. In this scheme, the set of related monoalphabetic substitution rules consists of the 26 Caesar ciphers with shifts of 0 through 25. Each cipher is denoted by a key letter, which is the ciphertext letter that substitutes for the plaintext letter a. Thus, a Caesar cipher with a shift of 3 is denoted by the key value. Express the Vigenére cipher in the following manner. Assume a sequence of plaintext letters and a key consisting of the sequence of letters, where typically < .The sequence of ciphertext letters is calculated as follows C = Cy Cy, Coy --- Cu = E(K, P) = Elko, kets ka, «+ +5 Km—1)s (Pos Pts P2s +++ Pn—1)] (Po + o)mod 26, (p; + ky) mod 26, .... (Pp.-1 + Km1) Mod 26, (Pm + Ko) MOd 26, (Psi + ki)MOd 26, .... (P2m—1 + km-1) mod 26, Thus, the first letter of the key is added to the first letter of the plaintext, mod 26, the second letters are added, and so on through the first letters of the plaintext. For the next letters of the plaintext, the key letters are repeated. This process continues until all of the plaintext sequence is encrypted. A general equation of the encryption process is Ci= (pi+ kimod m)mod 26 Decryption is a generalization of Equation pi= (Ci- kimod m)mod 26 To encrypt a message, a key is needed that is as long as the message. Usually, the key is a repeating keyword. For example, if the keyword is deceptive, the message “we are discovered save yourself” is encrypted as key: deceptivedeceptivedeceptive Plaintext: wearediscoveredsaveyourself ciphertext: ZICVTWONGRZGVTWAVZHCQYGLMGJ43.EXPLAIN ABOUT THE TRANSPOSITION TECHNIQUES IN DETAILS. All the techniques examined so far involve the substitution of a ciphertext symbol for a plaintext symbol. A very different kind of mapping is achieved by performing some sort of permutation on the plaintext letters. This technique is referred to as a transposition cipher. The simplest such cipher is the rail fence technique, in which the plaintext is written down as a sequence of diagonals and then read off as a sequence of rows. For example, to encipher the message “meet me after the toga party” with a rail fence of depth 2, we write the following mematrhtgpry etefete The encrypted message is MEMATRHTGPRYETEFETEOAAT This sort of thing would be trivial to cryptanalyze. A more complex scheme is to write the message in a rectangle, row by row, and read the message off, column by column, but permute the order of the columns. The order of the columns then becomes the key to the algorithm. For example, Key 4312567 Plaintext: attackp ostpone dunje £21 & woamxyz Ciphertext: | TTNAAPTMTSUOAODWCOIXKNLYPETZ Thus, in this example, the key is 4312567.To encrypt, start with the column that is labeled 1, in this case column 3.Write down all the letters in that column. Proceed to column 4, which is labeled 2, then column 2, then column 1, then columns 5, 6, and 7.A pure transposition cipher is easily recognized because it has the same letter frequencies as the original plaintext. For the type of columnar transposition just shown, cryptanalysis is fairly straightforward and involves laying out the ciphertext in a matrix and playing around with column positions. Digram and trigram frequency tables can be useful. ‘The transposition cipher can be made significantly more secure by performing more than one stage of transposition. The result is a more complex permutation that is not easily reconstructed. Thus, if the foregoing message is reencrypted using the same algorithm,Key: 2242567 Input: ttnaapt mtsuoao dwcoixk nlypetz output: NSCYAUOPTTWLTMDNAOTEPAXTTOKZ To visualize the result of this double transposition, designate the letters in the original plaintext message by the numbers designating their position. Thus, with 28 letters in the message, the original sequence of letters is 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 After the first transposition, we have 03 10 17 24 04 11 18 25 02 09 16 23 01 08 15.22 05 12 19 26 06 13 20 2707 14 21 28 MEMATRHTGPRYETEFETEOAAT 14.EXPLAIN STEGANOGRAPHY IN DETAIL. A plaintext message may be hidden in one of two ways. The methods of steganography conceal the existence of the message, whereas the methods of cryptography render the message unintelligible to outsiders by various transformations of the text. A simple form of steganography, but one that is time-consuming to construct, is one in, which an arrangement of words or letters within an apparently innocuous text spells out the real message. For example, the sequence of first letters of each word of the overall message spells out the hidden message. Figure shows an example in which a subset of the words of the overall message is used to convey the hidden message. ‘3rd March Dear George, Greetings +0 att 2% Oxford. Many thanks for your letter and for the Summer examination package. All Entry Forms and Fees Forms should 6: for final despatch 40 the Syndicate by 2Oth or at the very latest, I"m told. by the 215% Admin has improved here; though there's room for improvement stitt; just give us all two more years and welll really show you! Please don't let these wretched 164 proposals destroy your basic O and A pattern. Certainty this sort of change, if implemented immediately, would bring chaos. Sincerely yours.Various other techniques have been used historically; some examples are the following: Character marking: Selected letters of printed or typewritten text are overwritten in pencil. The marks are ordinarily not visible unless the paper is held at an angle to bright light. Invisible ink: A number of substances can be used for writing but leave no visible trace until heat or some chemical is applied to the paper. Pin punctures: Small pin punctures on selected letters are ordinarily not visible unless the paper is held up in front of a light. Typewriter correction ribbon: Used between lines typed with a black ribbon, the results of typing with the correction tape are visible only under a strong light Steganography has a number of drawbacks when compared to encryption. It requires a lot of overhead to hide a relatively few bits of information, although using a scheme like that proposed in the preceding paragraph may make it more effective. Also, once the system is discovered, it becomes virtually worthless. This problem, too, can be overcome if the insertion method depends on some sort of key. The advantage of steganography is that it can be employed by parties who have something to lose should the fact of their secret communication (not necessarily the content) be discovered. Encryption flags traffic as important or secret or may identify the sender or receiver ‘as someone with something to hide. 15. DESCRIBE ABOUT THE FOUNDATIONS OF MODERN CRYPTOGRAPHY Modern encryption is the key to advanced computer and communication security. This stream of cryptography is completely based on the ideas of mathematics such as number theory and computational complexity theory as well as concepts of probability Characteristics of Modern Cryptography There are four major characteristics that separate modem cryptography from the classical approach. Table 1.5 Differences between Traditional Encryption and Modern Encryption Traditional Encryption Modern Encryption For making ciphertext, manipulation is done in the characters of the plaintext For making ciphertext, operations are performed on binary bit sequence The whole of the ecosystem is required to ‘communicate confidentiality Here, only the parties who want to execute secure communication possess the secret key These are weaker as compared to modem ‘encryption The encryption algorithm formed by this encryption technique is stronger as compared to traditional encryption algorithms Itbelieves in the concept of security through obscurity Its Security depends on the publicly known mathematical algorithmContext of Cryptography Cryptology, the study of cryptosystems, can be subdivided into two branches ~ * Cryptography ‘© Cryptanalysis Cryptography Cryptography is the art and science of making a cryptosystem that is capable of providing information security. Cryptography deals with the actual securing of digital data. It refers to the design of mechanisms based on mathematical algorithms that provide fundamental information security services. Cryptanalysis The art and science of breaking the cipher text is known as cryptanalysis. Cryptanalysis, is the sister branch of cryptography and they both co-exist. The cryptographic process results in the cipher text for transmission or storage. It involves the study of cryptographic mechanism with the intention to break them. Cryptanalysis is also used during the design of the new cryptographic techniques to test their security strengths. Note - Cryptography concerns with the design of cryptosystems, while cryptanalysis studies the breaking of cryptosystems. ‘Types of Modern Cryptography Different algorithms have come up with powerful encryption mechanisms incorporated in them. It gave rise to two new ways of encryption mechanism for data security. These are: ‘© Symmetric key encryption © Asymmetric key encryption Key Itcan be a number, word, phrase, or any code that will be used for encrypting as welll as decrypting any ciphertext information to plain text and vice versa. Symmetric and asymmetric key cryptography is based on the number of keys and the way these keys work. Let us know about both of them in details: ‘Symmetric key encryption Symmetric key encryption technique uses a straight forward method of encryption. Hence, this is the simpler among these two practices. In the case of symmetric key encryption, the encryption is done through only one secret key, which is known as "Symmetric Key", and this key remains to both the parties. The same key is implemented for both encodings as well as decoding the information. So, the key is used first by the sender prior to sending the message, and on the receiver side that key is used to decipher the encoded message. One of the good old examples of this encryption technique is Caesar's Cipher. Modern ‘examples and algorithms that use the concept of symmetric key encryption are RC4, QUAD, AES, DES, Blowfish, 3DES, etc, Asymmetric Key Encryption Asymmetric Encryption is another encryption method that uses two keys, which is a new and sophisticated encryption technique. This is because it integrates two cryptographic keys for implementing data security. These keys are termed as Public Key and Private Key. The “public key", as the name implies, is accessible to all who want to send an encrypted message. The other is the “private key” that is kept secure by the owner of that public key or the one who is encrypting.Encryption of information is done through public key first, with the help of a particular algorithm. Then the private key, which the receiver possesses, will use to decrypt that encrypted information. The same algorithm will be used in both encodings as well as decoding. Examples of asymmetric key encryption algorithms are Diffie-Hellman and RSA algorithm ‘Security Services of Cryptography ‘* Confidentiality of information. + Data Integrity ‘+ Authentication. © Message authentication. © Entity authentication. ‘+ Non-repudiation. Cryptography Primitives Cryptography primitives are nothing but the tools and techniques in Cryptography that can be selectively used to provide a set of desired security services ~ Encryption + Hash functions + Message Authentication codes (MAC) + Digital Signatures The following table shows the primitives that can achieve a particular security service on their own, Table 1.6 Primitives and Security Service Primitives(—}) Encryption | Hash Function | MAC Digital il Service Signature Confidentiality Yes No No No Integrity No Sometimes Yes Yes Authentication No No Yes Yes ‘Non Reputation No No Sometimes Yes Perfect Security Perfect Secrecy (or information-theoretic secure) means that the ciphertext conveys no information about the content of the plaintext ..... However, part of being provably secure is that you need as much key material as you have plaintext to encrypt Information Theory Information theory studies the quantification, storage, and communication of information. It was originally proposed by Claude Shannon in 1948 to find fundamental limits on signal processing and communication operations such as data compression.Its impact has been crucial to the success of the Voyager missions to deep space, the invention of the compact disc, the feasibility of mobile phones, the development of the Internet, the study of linguistics and of human perception, the understanding of black holes, and numerous other fields. The field is at the intersection of mathematics, statistics, computer science, physics, neurobiology, information engineering, and electrical engineering. The theory has also found applications in other areas, including statistical inference, natural language processing, cryptography, neurobiology, human vision, the evolution and function of molecular codes (bioinformatics), model selection in statistics, thermal physics, quantum computing, linguistics, plagiarism detection, pattern recognition, and anomaly detection. Important sub-fields of information theory include source coding, algorithmic complexity theory, algorithmic information theory, information-theoretic security, Grey system theory and measures of information. Applications of fundamental topics of information theory include lossless data compression (e.g. ZIP files), lossy data compression (e.g. MP3s and JPEGs), and channel coding (e.g. for DSL), Information theory is used in information retrieval, intelligence gathering, gambling, and even in musical compo: ‘A key measure in information theory is entropy. Entropy quantifies the amount of uncertainty involved in the value of a random variable or the outcome of a random process. For ‘example, identifying the outcome of a fair coin flip (with two equally likely outcomes) provides. less information (lower entropy) than specifying the outcome from a roll of a die (with six equally likely outcomes). Some other important measures in information theory are mutual information, channel capacity, error exponents, and relative entropy. Product Cryptosystems A product cipher combines two or more transformations in a manner intending that the resulting cipher is more secure than the individual components to make it resistant to cryptanalysis The product cipher combines a sequence of simple transformations such as substitution (S-box), permutation (P-box), and modular arithmetic, For transformation involving reasonable number of n message symbols, both of the foregoing cipher systems (the S-box and P-box) are by themselves wanting The combination could yield a cipher system more powerful than either one alone. This approach of alternatively applying substitution and permutation transformation has been used by IBM in the Lucifer cipher system, and has become the standard for national data encryption standards such as the Data Encryption Standard and the Advanced Encryption Standard. A product cipher that uses only substitutions and permutations is called a SP-network. Feistel ciphers are an important class of product ciphers.CRYPTANALYSIS Cryptanalysis is the art of trying to decrypt the encrypted messages without the use of the key that was used to encrypt the messages. Cryptanalysis uses mathematical analysis & algorithms to decipher the ciphers. The success of cryptanalysis attacks depends ‘+ Amount of time available ‘+ Computing power available + Storage capacity available The following is a list of the commonly used Cryptanalysis attacks; Brute force attack- this type of attack uses algorithms that try to guess all the possible logical combinations of the plaintext which are then ciphered and compared against the original cipher. Dictionary attack- this type of attack uses a wordlist in order to find @ match of either the plaintext or key. Itis mostly used when trying to crack encrypted passwords. Rainbow table attack- this type of attack compares the cipher text against pre- computed hashes to find matches. Other Attacks using Cryptanalysis Known-Plaintext Analysis (KPA): Attacker decrypts ciphertext with known partial plaintext. Chosen-Plaintext Analysis (CPA): Attacker uses ciphertext that matches arbitrarily selected plaintext via the same algorithm technique. Ciphertext-Only Analy: (COA): Attacker uses known ciphertext collections. Man-in-the-Middle (MITM) Attack: Attack occurs when two parties use message or key sharing for communication via a channel that appears secure but is actually compromised. Attacker employs this attack for the interception of messages that pass through the communications channel. Hash functions prevent MITM attacks, Adaptive Chosen-Plaintext Attack (ACPA): Similar to a CPA, this attack uses chosen plaintext and ciphertext based on data learned from past encryption.
You might also like
Computer Network Lab Manual
PDF
No ratings yet
Computer Network Lab Manual
151 pages
CCS359 - Quantum Computing Manual (WOL)
PDF
No ratings yet
CCS359 - Quantum Computing Manual (WOL)
25 pages
CNS New Unit 1
PDF
No ratings yet
CNS New Unit 1
31 pages
A Seminar Report
PDF
100% (2)
A Seminar Report
39 pages
Architectural Design Challenges + Elasticity
PDF
No ratings yet
Architectural Design Challenges + Elasticity
8 pages
CS8711 - Cloud Computing Laboratory Record: Department of Computer Science & Engineering
PDF
No ratings yet
CS8711 - Cloud Computing Laboratory Record: Department of Computer Science & Engineering
5 pages
CS8581 Networks Lab Manual
PDF
100% (2)
CS8581 Networks Lab Manual
67 pages
Unit5 CS8792 CNS Notes PEC
PDF
No ratings yet
Unit5 CS8792 CNS Notes PEC
59 pages
It8073 Information Security Reg 17 Question Bank
PDF
0% (1)
It8073 Information Security Reg 17 Question Bank
4 pages
BCA603T Cryptography and Network Security: Unit - I Contents
PDF
No ratings yet
BCA603T Cryptography and Network Security: Unit - I Contents
42 pages
Final Document
PDF
No ratings yet
Final Document
73 pages
Network and Communication Lab: 1. Two Dimensional Parity Check
PDF
No ratings yet
Network and Communication Lab: 1. Two Dimensional Parity Check
24 pages
Lecture 1 - PPT - CNS
PDF
No ratings yet
Lecture 1 - PPT - CNS
16 pages
Unit 1-5 CS8079 HCI QBank Panimalar College PDF
PDF
No ratings yet
Unit 1-5 CS8079 HCI QBank Panimalar College PDF
49 pages
Iii Year Vi Sem CS6659 Artificial Intelligence
PDF
No ratings yet
Iii Year Vi Sem CS6659 Artificial Intelligence
44 pages
IT8074 - Service Oriented Architecture
PDF
No ratings yet
IT8074 - Service Oriented Architecture
196 pages
Unit 1
PDF
100% (1)
Unit 1
54 pages
VTU Exam Question Paper With Solution of 18CS72 Big Data and Analytics Feb-2022-Dr. v. Vijayalakshmi
PDF
No ratings yet
VTU Exam Question Paper With Solution of 18CS72 Big Data and Analytics Feb-2022-Dr. v. Vijayalakshmi
25 pages
CNS 3-1 Lab Manual
PDF
100% (2)
CNS 3-1 Lab Manual
34 pages
CB3491 QBank
PDF
No ratings yet
CB3491 QBank
27 pages
CS8792 CNS Two Marks Questions With Answers
PDF
No ratings yet
CS8792 CNS Two Marks Questions With Answers
15 pages
InformationSystemsSecurityByNinaGodbole Good Read
PDF
No ratings yet
InformationSystemsSecurityByNinaGodbole Good Read
4 pages
Ccs341 DW Lab Manual Chumma Chumma Practical Notes
PDF
No ratings yet
Ccs341 DW Lab Manual Chumma Chumma Practical Notes
89 pages
Iare DWDM and WT Lab Manual PDF
PDF
No ratings yet
Iare DWDM and WT Lab Manual PDF
69 pages
Cyber Security - Organizational Implications
PDF
No ratings yet
Cyber Security - Organizational Implications
40 pages
CCS374 Web Application Security
PDF
No ratings yet
CCS374 Web Application Security
18 pages
CS3361 - Data Science Laboratory
PDF
No ratings yet
CS3361 - Data Science Laboratory
31 pages
Ccs354-Network Security Laboratory
PDF
No ratings yet
Ccs354-Network Security Laboratory
52 pages
DAA Question Bank
PDF
No ratings yet
DAA Question Bank
9 pages
Iot QB
PDF
No ratings yet
Iot QB
2 pages
CS3451 Os
PDF
No ratings yet
CS3451 Os
2 pages
cd3291 Dsa Study Material
PDF
No ratings yet
cd3291 Dsa Study Material
169 pages
6.CNS Unit Wise Question Bank
PDF
100% (2)
6.CNS Unit Wise Question Bank
2 pages
CS3451-OS Syllabus 2021
PDF
No ratings yet
CS3451-OS Syllabus 2021
1 page
NS Question Bank
PDF
No ratings yet
NS Question Bank
9 pages
Algorithm For Asynchronous Check Pointing and Recovery
PDF
No ratings yet
Algorithm For Asynchronous Check Pointing and Recovery
4 pages
CS2302 Computer Networks Anna University Engineering Question Bank 4 U
PDF
No ratings yet
CS2302 Computer Networks Anna University Engineering Question Bank 4 U
48 pages
CNS - 2 Marks
PDF
100% (1)
CNS - 2 Marks
28 pages
Unit1 Web Essentials
PDF
No ratings yet
Unit1 Web Essentials
25 pages
Web Lab Question Bank
PDF
100% (1)
Web Lab Question Bank
2 pages
CB3491-CCS 2marks
PDF
No ratings yet
CB3491-CCS 2marks
12 pages
Introduction To AI and Production Systems
PDF
No ratings yet
Introduction To AI and Production Systems
20 pages
CCS354 Network Security 2 Marks Question & Answers
PDF
No ratings yet
CCS354 Network Security 2 Marks Question & Answers
13 pages
Ccs334 Big Data Analytics
PDF
0% (1)
Ccs334 Big Data Analytics
2 pages
Data Mining Syllabus
PDF
No ratings yet
Data Mining Syllabus
1 page
CW3551 Data and Information Security Nov Dec 2023 Question Paper Download
PDF
33% (3)
CW3551 Data and Information Security Nov Dec 2023 Question Paper Download
2 pages
Cryptography Model Question Paper Mca 5th Sem
PDF
100% (1)
Cryptography Model Question Paper Mca 5th Sem
4 pages
Assignment No. 1 Class: T.E. Computer Subject: Theory of Computation
PDF
No ratings yet
Assignment No. 1 Class: T.E. Computer Subject: Theory of Computation
6 pages
WAS QuestionBank
PDF
No ratings yet
WAS QuestionBank
9 pages
Question Bank For Ai
PDF
0% (1)
Question Bank For Ai
2 pages
CCS354 Set1
PDF
No ratings yet
CCS354 Set1
2 pages
CCS356 Object Oriented Software Engineering Apr May 2024 Question Paper Download
PDF
No ratings yet
CCS356 Object Oriented Software Engineering Apr May 2024 Question Paper Download
3 pages
Content Beyond Syllabus New
PDF
No ratings yet
Content Beyond Syllabus New
56 pages
CB3491 Cryptography and Cyber Security Nov Dec 2023 Question Paper Download
PDF
No ratings yet
CB3491 Cryptography and Cyber Security Nov Dec 2023 Question Paper Download
3 pages
Ccs Full Notes
PDF
No ratings yet
Ccs Full Notes
222 pages
CCS354 NS Lab QP With Mark Allotment
PDF
No ratings yet
CCS354 NS Lab QP With Mark Allotment
5 pages
ESSS Lab Manual
PDF
No ratings yet
ESSS Lab Manual
21 pages
hEALTH CARE ANALYTICS
PDF
No ratings yet
hEALTH CARE ANALYTICS
2 pages
CCS340 - Cyber Security (Unit1) Notes & QB 06-02-2025
PDF
No ratings yet
CCS340 - Cyber Security (Unit1) Notes & QB 06-02-2025
40 pages
ccs362 Security and Privacy in Cloud Important Questions
PDF
No ratings yet
ccs362 Security and Privacy in Cloud Important Questions
2 pages