5399 - Cryptography and Network Security Updated
5399 - Cryptography and Network Security Updated
Syllabus
Introduction, Need for security, Principles of Security, Plain text and Cipher Text, Encryption
and Decryption, Symmetric and Asymmetric Key Cryptography, Steganography, Key Range
and Key Size, Possible Types of Attacks.
Digital Certificates, Private Key Management, The PKI-X Model, Public Key Cryptography
Standards (PKCS), XML,PKI and Security, Hash functions, Key Pre-distribution, Blom’s
Scheme, Diffie-Hellman Key Pre-distribution, Kerberos.
Module V: IP Security
Peer to Peer Server, Create the WebSocket Server, Connect to Blockchain Peers, Handle
Messages from Peers, Synchronize the Blockchain across Peers.
Introduction of WLAN, 802.11 Standards (802.11a, 802.11b, 802.11g, 802.11n) security type,
Overview of SSID WLAN Security authentication (WEP, TKIP, WAP1, WAP2).
Malicious Logic, Types of Malicious Logic: Virus, Worm, Trojan Horse, Zombies, Denial of
Service Attacks, Intrusion, Intruders and their types, Intrusion Detection System, Intrusion
Prevention System.
Study Material
Cryptography & Network Security & BNCSD502C
1. Introduction to Security
Definition:
Security, in the context of information and data, refers to the protection of information
systems from unauthorized access, damage, or disruption. It encompasses measures and
protocols designed to safeguard the confidentiality, integrity, and availability of data.
Importance:
Example:
In an online banking system, security ensures that only the account holder can access their
account, that their account balance is accurate, and that they can access their account at any
time.
Reasons:
Privacy Concerns: Personal and sensitive data must be protected to maintain trust
and comply with regulations.
National Security: Protecting critical infrastructure and national defense systems
from cyber threats.
Example:
A healthcare provider needs to secure patient records to prevent unauthorized access, which
could lead to identity theft or exposure of personal health information.
3. Principles of Security
Plain Text:
Definition: Plain text is the original, unencrypted information or data that can be
easily read and understood by anyone. It is the raw data or message that you want to
protect using encryption. This data is in a readable format, and if intercepted by an
unauthorized person, they can easily understand its content.
Example: If you write an email that says, "Meet me at the park at 5 PM," this
message in its original, readable form is considered plain text.
Cipher Text:
Definition: Cipher text is the result of applying an encryption algorithm to plain text.
It is the scrambled, unreadable version of the data, which cannot be easily understood
without the proper key to decrypt it. The purpose of converting plain text into cipher
text is to protect the information from unauthorized access during transmission or
storage.
Example: Using a simple substitution cipher (where each letter is replaced with
another), the plain text "HELLO" could be transformed into "KHOOR" as cipher text.
Without knowing the substitution method (or key), it would be difficult for someone
to determine that "KHOOR" actually represents "HELLO."
How It Works:
When you want to send a secure message over the internet, you start with plain text.
For example, a password or a confidential email.
An encryption algorithm (a set of mathematical rules) is applied to this plain text,
along with an encryption key (a secret code used to transform the data), turning it into
cipher text. This cipher text looks like a random series of characters and cannot be
understood by anyone without the key.
When the intended recipient receives the cipher text, they use the corresponding
decryption algorithm and key to convert the cipher text back into plain text. This
ensures that the message remains secure and private while being transmitted.
Importance:
Security: By converting plain text into cipher text, sensitive information is protected
from unauthorized access, even if the communication is intercepted.
Confidentiality: Only those with the correct decryption key can access the original
message, ensuring that the data remains confidential.
Data Integrity: Encryption also helps in ensuring that the data has not been altered
during transmission.
Real-World Example:
Online Banking: When you log into your bank account online, your login credentials
(username and password) are sent to the bank’s server. However, before being sent
over the internet, these credentials are converted from plain text into cipher text using
an encryption protocol like SSL/TLS. This prevents hackers from intercepting and
reading your sensitive information.
Encryption:
Definition: Encryption is the process of converting plain text (readable data) into
cipher text (unreadable data) using an algorithm and a specific key. The main purpose
of encryption is to protect the confidentiality of the data, ensuring that only authorized
parties who have the correct key can access the original information.
Ms.Debdutta Mandal , Ms. Raima Saha
Assistant Professor, Dept. of Cyber Science & Technology
Brainware University, Kolkata
Page |5
Bachelor of Science (Honours) in Advanced Networking and Cyber Security – 2022 & Semester- V
Cryptography & Network Security & BNCSD502C
Section- A, Section- B, Section-C
Academic Session – 2024-25
How It Works:
o An encryption algorithm, also known as a cipher, takes the plain text as input.
o The algorithm processes the plain text using the key and transforms it into
cipher text. This cipher text appears as a random string of characters, making
it unintelligible to anyone who doesn’t have the key.
Example:
Decryption:
Definition: Decryption is the process of converting cipher text back into plain text
using a decryption algorithm and the correct key. This process is essentially the
reverse of encryption, allowing the authorized recipient to access the original data.
How It Works:
o The decryption algorithm uses the same or a related key (depending on the
type of encryption) to process the cipher text.
o The algorithm converts the cipher text back into its original form, which is the
plain text.
Example:
o Continuing from the earlier example, if you have the cipher text
"5d41402abc4b2a76b9719d911017c592" and the correct key, applying the
decryption algorithm will revert it back to the original message
"SECRET123".
Types of Encryption:
Symmetric Encryption: The same key is used for both encryption and decryption.
o Example: If you encrypt a file with a password (which acts as the key), the
same password is required to decrypt it.
Ms.Debdutta Mandal , Ms. Raima Saha
Assistant Professor, Dept. of Cyber Science & Technology
Brainware University, Kolkata
Page |6
Bachelor of Science (Honours) in Advanced Networking and Cyber Security – 2022 & Semester- V
Cryptography & Network Security & BNCSD502C
Section- A, Section- B, Section-C
Academic Session – 2024-25
Asymmetric Encryption: Two different but mathematically related keys are used—
one for encryption (public key) and one for decryption (private key).
o Example: When sending an encrypted email, the sender uses the recipient's
public key to encrypt the message. The recipient then uses their private key to
decrypt it.
Security: It protects data from unauthorized access and breaches, which is essential
for maintaining the security of personal, financial, and organizational information.
Real-World Example:
Online Shopping: When you make a purchase online, your credit card information is
encrypted before it is transmitted over the internet to the merchant’s server. This
encryption prevents hackers from stealing your credit card details. Once the encrypted
data reaches the merchant, it is decrypted so that the payment can be processed.
Process Flow:
2. Encryption Algorithm + Key: Transforms the plain text into cipher text.
4. Decryption Algorithm + Key: Converts the cipher text back to plain text.
Symmetric Encryption: The same key is used for both encryption and decryption.
Block Cipher: AES encrypts data in fixed-size blocks of 128 bits (16 bytes).
Key Sizes: AES supports key sizes of 128, 192, and 256 bits, providing different
levels of security.
1. Key Expansion: The encryption key is expanded into several round keys.
2. Initial Round: The data (128-bit block) undergoes an initial transformation with the
first round key.
4. Final Round: After the main rounds, a final transformation occurs, and the result is
the encrypted data (cipher text).
5. Decryption: The process is reversed to obtain the original plain text using the same
key.
Advantages of AES:
Security: AES is highly secure and resistant to all known attacks, including brute-
force attacks. Its large key sizes (128, 192, 256 bits) make it computationally
infeasible for hackers to break.
Efficiency: AES is fast and efficient in both software and hardware implementations,
making it suitable for a wide range of applications, including smartphones, VPNs, and
secure communication protocols like SSL/TLS.
Widely Used: AES is used globally in securing data for government institutions,
financial services, and many other industries.
Example of AES: If you use AES-256 to encrypt a message, it might take a readable plain
text like "HELLO123" and transform it into an unreadable cipher text like
"5a7d3f2b9876d4eaa12c". Only someone with the correct 256-bit key can decrypt this and
access the original message.
Definition: DES (Data Encryption Standard) is an older symmetric encryption algorithm that
was widely used for many years before AES became the standard. DES was developed by
IBM in the 1970s and adopted as the standard by NIST in 1977. It encrypts data using a 56-
bit key, which is now considered insecure due to its vulnerability to brute-force attacks.
Symmetric Encryption: Like AES, DES uses the same key for both encryption and
decryption.
Key Size: DES uses a 56-bit key (though the original key is 64 bits, 8 bits are used for
parity, leaving only 56 effective bits).
Rounds: DES uses 16 rounds of encryption, where each round involves permutations,
substitutions, and mixing with the key.
1. Key Generation: The 56-bit key is divided into two 28-bit halves and undergoes
transformations to produce 16 subkeys, one for each round of encryption.
3. Rounds: In each round, the data is split into two halves, and one half undergoes
complex transformations involving substitution and permutation, while the other half
is combined with the round key.
4. Final Permutation: After 16 rounds, the two halves are recombined and undergo a
final permutation, resulting in the cipher text.
Weaknesses of DES:
Ms.Debdutta Mandal , Ms. Raima Saha
Assistant Professor, Dept. of Cyber Science & Technology
Brainware University, Kolkata
Page |9
Bachelor of Science (Honours) in Advanced Networking and Cyber Security – 2022 & Semester- V
Cryptography & Network Security & BNCSD502C
Section- A, Section- B, Section-C
Academic Session – 2024-25
Small Key Size: The 56-bit key size makes DES vulnerable to brute-force attacks.
Modern computing power can exhaustively try all possible keys in a relatively short
time, which compromises its security.
Example of DES: Suppose you use DES to encrypt a message like "HELLO". The cipher
text might look like "A1F8E3B2", but because of the short key length, this cipher text can
potentially be decrypted by an attacker using brute-force method.
AES (Advanced
Feature DES (Data Encryption Standard)
Encryption Standard)
Key Size 128, 192, or 256 bits 56 bits
Block Size 128 bits 64 bits
10, 12, or 14
Rounds (depending on key 16
size)
Highly secure,
Security Vulnerable to brute-force attacks
resistant to attacks
Faster and more
Speed Slower compared to AES
efficient
Obsolete for modern security
Use Widely used globally
needs
Cryptography is the science of securing communication and information. Two major types of
cryptographic techniques are Symmetric Key Cryptography and Asymmetric Key
Cryptography. Both methods are used to protect data but differ in their approach to key
management and security.
Definition: Symmetric Key Cryptography, also known as Secret Key Cryptography, is a type
of encryption where the same key is used for both encryption and decryption of the data. This
means that both the sender and the receiver must have access to the same secret key, which
must be kept confidential to ensure the security of the communication.
Key Characteristics:
Single Key: A single key is used for both the encryption and decryption processes.
Speed: Symmetric algorithms are generally faster and require less computational
power than asymmetric algorithms, making them suitable for encrypting large
amounts of data.
Security: The security of symmetric encryption depends heavily on the secrecy of the
key. If the key is compromised, the entire communication is at risk.
Ms.Debdutta Mandal , Ms. Raima Saha
Assistant Professor, Dept. of Cyber Science & Technology
Brainware University, Kolkata
P a g e | 11
Bachelor of Science (Honours) in Advanced Networking and Cyber Security – 2022 & Semester- V
Cryptography & Network Security & BNCSD502C
Section- A, Section- B, Section-C
Academic Session – 2024-25
Common Algorithms:
DES (Data Encryption Standard): An older symmetric algorithm that uses a 56-bit
key. It is now considered insecure and has been largely replaced by AES.
3DES (Triple DES): An enhancement of DES that applies the DES algorithm three
times with three different keys, making it more secure but slower than AES.
Scenario: You want to securely send a confidential document to a colleague over the
internet.
1. Encryption: You use a symmetric encryption algorithm like AES and a secret
key, say "abc123", to encrypt the document.
3. Decryption: Your colleague receives the cipher text and uses the same key
"abc123" to decrypt it back into the original document.
Advantages:
Efficiency: Symmetric encryption is faster and more efficient for encrypting large
volumes of data.
Disadvantages:
Key Distribution: Securely sharing and managing the secret key can be difficult,
especially over an insecure network.
Scalability: In a network with many users, managing a separate key for each pair of
users becomes cumbersome.
Definition: Asymmetric Key Cryptography, also known as Public Key Cryptography, uses
two different but mathematically related keys: a public key and a private key. The public key
is used for encryption, and the private key is used for decryption. Unlike symmetric key
cryptography, the two keys are not identical, and the private key must be kept secret, while
the public key can be openly shared.
Key Characteristics:
Two Keys: There are two distinct keys—a public key (for encryption) and a private
key (for decryption).
Security: Even if the public key is known to everyone, the communication remains
secure because only the corresponding private key can decrypt the data.
Key Management: The public key can be freely distributed, which simplifies key
management, but the security depends on the private key remaining secret.
Common Algorithms:
ECC (Elliptic Curve Cryptography): A newer approach that offers similar security
to RSA but with smaller key sizes, leading to faster computations.
DSA (Digital Signature Algorithm): Primarily used for creating digital signatures,
ensuring the authenticity and integrity of a message.
1. Public Key: The client shares their public key with you.
2. Encryption: You use the client's public key to encrypt the email.
3. Cipher Text: The email is transformed into an unreadable format using the
client's public key.
4. Private Key: The client uses their private key (which only they possess) to
decrypt the email and read the original message.
Advantages:
Key Distribution: Only the public key needs to be shared, reducing the risks
associated with key distribution.
Security: The use of two keys enhances security, particularly for activities like digital
signatures and secure key exchange.
Disadvantages:
Symmetric Key
Aspect Asymmetric Key Cryptography
Cryptography
Same key for
Public key for encryption, private
Key Usage encryption and
key for decryption
decryption
Faster, suitable for Slower, better for small data or
Speed
large data encryption secure key exchange
Security depends on Security enhanced by using two
Security
keeping the key secret keys (public and private)
Challenging to
Easier to distribute public keys,
Key Distribution securely share and
private key remains secure
manage the secret key
Less scalable in large
More scalable, especially in
Scalability networks due to key
environments with many users
management issues
Encrypting large files, Secure communication, digital
Use Cases
data at rest signatures, key exchange
7. Steganography
unreadable to protect it, steganography hides the very existence of the data, making it
invisible to anyone who doesn't know where to look.
Etymology: The word "steganography" is derived from the Greek words "steganos" meaning
"covered" or "hidden" and "graphia" meaning "writing." So, steganography literally means
"hidden writing."
Types of Steganography:
1. Image Steganography:
o How It Works: The most common technique is Least Significant Bit (LSB)
modification. In this method, the least significant bits of each pixel in an
image are altered to store the hidden data. The changes are so small that they
are imperceptible to the human eye.
2. Audio Steganography:
o Example: A song file might have a hidden message embedded within the
sound data that can't be heard but can be extracted with the right tools.
3. Text Steganography:
o How It Works: Techniques include using white spaces, altering font sizes, or
even using patterns of letters or characters to conceal information.
4. Video Steganography:
o How It Works: Data can be embedded in the frames of a video file, often
using the LSB method similar to image steganography, but applied to the
frames of the video.
o Example: A short video clip might have secret information hidden within
certain frames, which can only be extracted by someone who knows where
and how to look.
5. Network Steganography:
o Example: Data could be hidden in the timing of TCP/IP packets sent over a
network, making it difficult to detect without specialized tools.
Uses of Steganography:
Example of Steganography:
Imagine you have a photograph that you want to send to a friend, but you also want to
include a secret message with it. By using steganography, you could embed your message
within the image file itself, altering the pixels in such a way that the changes are invisible to
Ms.Debdutta Mandal , Ms. Raima Saha
Assistant Professor, Dept. of Cyber Science & Technology
Brainware University, Kolkata
P a g e | 16
Bachelor of Science (Honours) in Advanced Networking and Cyber Security – 2022 & Semester- V
Cryptography & Network Security & BNCSD502C
Section- A, Section- B, Section-C
Academic Session – 2024-25
the naked eye. Your friend, knowing how to extract the hidden message, could retrieve it
using special software or a decryption key.
Steganography Process: The hidden message is embedded into the image by altering
the LSBs of the pixel values. The image looks the same to anyone who views it, but
your friend, with the correct method or key, can extract the hidden message.
Advantages of Steganography:
Invisibility: The primary advantage is that the hidden data is invisible and does not
attract attention, unlike encrypted data, which clearly signals that something is being
hidden.
Disadvantages of Steganography:
Limited Capacity: The amount of data that can be hidden within a file is often
limited. For example, you can only embed a small message within an image without
making noticeable changes.
Key Size:
Definition: The key size in cryptography refers to the length of the key used in an
encryption algorithm. It is typically measured in bits, and it represents the number of
possible combinations for the key. The key size is a critical factor in determining the
security of an encryption system—larger key sizes generally mean stronger security.
Importance:
o The larger the key size, the more difficult it is for an attacker to crack the
encryption by brute force (i.e., trying every possible key until the correct one
is found).
o A longer key provides a greater number of possible combinations, making the
encryption more resistant to attacks.
Examples:
o AES-128: A 128-bit key means there are 21282^{128}2128 possible key
combinations. This is an extremely large number, making brute-force attacks
impractical.
o AES-256: A 256-bit key offers 22562^{256}2256 possible combinations,
which is vastly more secure than a 128-bit key, though it may require more
computational resources.
Key Range:
Definition: The key range is the total number of possible keys that can be generated
with a given key size. It’s directly related to the key size; as the key size increases, the
key range (the number of possible keys) increases exponentially.
Calculation:
o For a key size of N bits, the key range is 2N2^N2N.
o For example, with an 8-bit key, the key range is 28=2562^8 = 25628=256
possible keys.
Impact on Performance:
DES (Data Encryption Standard): Uses a 56-bit key. Now considered insecure due
to the small key size.
3DES (Triple DES): Uses three 56-bit keys (effectively 168 bits). Provides stronger
security than DES but is slower and less efficient.
AES (Advanced Encryption Standard): Supports key sizes of 128, 192, and 256
bits. AES-128 is commonly used and provides a good balance between security and
performance.
RSA (Rivest-Shamir-Adleman): An asymmetric algorithm that typically uses key
sizes of 2048 or 4096 bits. The large key sizes are necessary due to the mathematical
complexity involved in RSA encryption.
Balancing Security and Performance: When choosing a key size, it's important to
balance the need for security with the available computational resources and the
performance requirements of the system. For most applications, AES-128 or AES-256
offers sufficient security with acceptable performance.
Future Considerations:
Cryptography, while a powerful tool for securing data, is not invulnerable. Various types of
attacks can target cryptographic systems, aiming to break the encryption, steal sensitive
information, or disrupt communications. Understanding these attacks is crucial for designing
robust security measures. Here, we’ll explore some of the most common types of attacks in
cryptography.
Definition: A brute force attack is the simplest form of attack against a cryptographic system.
It involves systematically trying every possible key until the correct one is found. Given
enough time and computational power, a brute force attack can eventually break any
encryption, but the time required increases exponentially with the key size.
How It Works:
The attacker uses software to generate and test all possible keys.
For example, if the key is 4 bits long, there are 16 possible keys (from 0000 to 1111).
The attacker tests each one until the correct key is found.
Key Size: Using longer key sizes significantly increases the number of possible keys,
making brute force attacks impractical. For instance, AES-256 has 2256possible keys,
an enormous number that would take billions of years to crack with current
technology.
Example: A 128-bit key has 2128 possible combinations. Even with a supercomputer, testing
each key would take an astronomically long time.
2. Phishing Attack
Definition: Phishing is a type of social engineering attack where the attacker tricks
individuals into revealing sensitive information such as usernames, passwords, or credit card
numbers by masquerading as a trustworthy entity.
How It Works:
The attacker sends an email, message, or creates a website that looks legitimate.
The victim is lured into providing sensitive information, believing they are interacting
with a genuine organization or person.
This information is then used by the attacker to gain unauthorized access to accounts
or systems.
Example: An email that appears to be from a bank asks the user to click a link and enter their
login details. The link leads to a fake website controlled by the attacker.
Definition: In a Man-in-the-Middle attack, the attacker secretly intercepts and possibly alters
the communication between two parties who believe they are directly communicating with
each other.
How It Works:
The attacker positions themselves between the two parties (e.g., by exploiting an
unsecured Wi-Fi connection).
The attacker can eavesdrop on the communication, steal sensitive information, or
modify the data being exchanged without either party realizing it.
Example: An attacker intercepts communication between a user and a bank’s website. The
attacker can view the user’s credentials or alter the data being sent.
4. Replay Attack
Definition: A replay attack involves intercepting and retransmitting valid data to gain
unauthorized access to a system or service. This attack exploits the fact that the intercepted
data was originally valid and can be reused to perform a similar action.
How It Works:
The attacker captures the data being sent between two parties.
The captured data (such as a login token or transaction request) is then sent again by
the attacker to execute the same operation without the user’s consent.
Timestamping: Including a timestamp in the data to ensure that old messages cannot
be reused.
Nonce Values: Using a unique, random number (nonce) for each session or
transaction that must match with the server’s expected value.
Session Tokens: Issuing tokens that are valid for a single session only.
Definition: A Denial of Service (DoS) attack aims to make a service, system, or network
unavailable to its intended users by overwhelming it with a flood of illegitimate requests or
by exploiting vulnerabilities.
How It Works:
The attacker sends a large number of requests to the target, overwhelming its
resources and causing it to crash or become unresponsive.
Alternatively, the attacker may exploit a bug or vulnerability that causes the system to
fail when certain conditions are met.
Traffic Filtering: Using firewalls and Intrusion Detection Systems (IDS) to filter out
malicious traffic.
Rate Limiting: Limiting the number of requests a user can make in a given period.
Redundancy: Distributing the service across multiple servers to handle increased
traffic loads.
Example: An attacker sends thousands of requests per second to a website, causing it to slow
down and eventually crash, making it unavailable to legitimate users.
6. Side-Channel Attacks
How It Works:
The attacker measures physical parameters (like the time taken to perform
cryptographic operations or the power consumed) to deduce the secret key or other
sensitive information.
The attack does not require direct access to the encrypted data itself but rather relies
on external observations.
7. Cryptanalysis Attacks
How It Works:
The attacker uses mathematical techniques to analyze the structure of the cipher,
looking for patterns or weaknesses.
This may involve analyzing multiple encrypted messages, chosen plain text, or even
exploiting poorly implemented algorithms.
Which encryption algorithm uses the same key for both encryption and decryption?
A) RSA
B) AES
C) ECC
D) Diffie-Hellman
A) Decryption
B) Authentication
C) Encryption
D) Hashing
A) DES
B) 3DES
C) AES
D) RSA
A) Encrypting data
B) Hiding information within non-secret text or data
C) Generating digital signatures
D) Creating hash values
A) RSA
B) ECC
C) AES
D) Diffie-Hellman
A) Decryption speed
B) Key distribution
C) Encryption speed
D) Data availability
A) Confidentiality
B) Integrity
C) Availability
D) Authentication
A) Encrypting data
B) Decrypting data
C) Generating hash values
D) Hiding messages
A) By encrypting data
B) By verifying the data has not been altered
C) By hiding data within other data
D) By distributing keys securely
A) Encrypting messages
B) Hiding ownership information in digital media
C) Generating digital signatures
D) Decrypting hidden messages
A) Encrypting data
B) Hiding information
C) Verifying data integrity
D) Distributing keys
A) RSA
B) ECC
C) AES
D) Diffie-Hellman
A) Decrypting data
B) Encrypting data
C) Hiding messages
D) Verifying integrity
C) Phishing attacks
D) SQL injection attacks
A) To encrypt messages
B) To verify the authenticity and integrity of messages
C) To hide messages within other data
D) To generate encryption keys
1.What is cryptography?
15.What is phishing?
20.How does asymmetric key cryptography solve the key distribution problem?
1.Explain the importance of network security and the types of threats it addresses.
2.Discuss the core principles of security and their significance in maintaining a secure system.
3.Describe the process of encryption and decryption, and differentiate between symmetric and
asymmetric key cryptography.
4.Explain the concept of steganography and its various methods with examples.
5.Discuss the impact of key size on the security and performance of cryptographic algorithms.
6.What are the possible types of attacks in network security, and how can they be mitigated?
7.Explain the role of digital signatures in ensuring data integrity and authenticity.
8.Describe the key distribution problem and how asymmetric key cryptography addresses it.
10.Explain how brute force attacks work and the strategies to defend against them.
12.Describe the man-in-the-middle attack and how encryption can protect against it.
14.Explain the concept of key range and its significance in cryptographic security.
18.What are the challenges of key management in symmetric key cryptography, and how can
they be addressed?
Components:
o Public Key: The public key of the certificate holder.
o Subject: The entity (person, organization, or device) that owns the certificate.
o Issuer: The CA that issued the certificate.
o Serial Number: A unique identifier for the certificate.
o Validity Period: The start and end dates during which the certificate is valid.
o Signature Algorithm: The algorithm used by the CA to sign the certificate.
o Digital Signature: The CA’s signature on the certificate, which can be
verified using the CA’s public key.
X.509 Standard: The most widely used standard for digital certificates, defining the
format for public key certificates.
SSL/TLS Certificates: Secure web traffic by encrypting the data exchanged between
a web server and a browser.
Code Signing Certificates: Used to sign software, ensuring that the code has not
been tampered with since it was signed.
Email and Document Signing Certificates: Ensure the authenticity and integrity of
emails and documents by allowing the sender to digitally sign them.
Client Certificates: Used to authenticate users to a server, often as part of a mutual
TLS setup.
SSL/TLS on Websites: When you visit a website with "https" in the URL, your
browser checks the site's SSL certificate to ensure that the site is legitimate and that
the connection is secure.
Code Signing: Microsoft requires developers to sign their software with a digital
certificate before it can be distributed via the Windows Store or run on Windows
systems without warnings.
Email Security with S/MIME: Secure/Multipurpose Internet Mail Extensions
(S/MIME) uses digital certificates to encrypt and digitally sign emails.
Role of the Private Key: The private key is the secret counterpart to the public key in
a public key infrastructure (PKI). It is used to decrypt messages encrypted with the
corresponding public key and to create digital signatures.
Risks of Compromise: If a private key is compromised, an attacker can impersonate
the key owner, decrypt sensitive information, or sign malicious documents,
potentially leading to severe security breaches.
HSMs in Banking: Financial institutions often use HSMs to store and manage
private keys for transaction processing and secure communications, ensuring that
these keys are protected from unauthorized access.
Key Management in Cloud Environments: Cloud service providers offer key
management services that allow users to generate, manage, and rotate keys securely,
while ensuring that private keys are never exposed outside the service.
Government PKI: Many governments use PKI-X models to manage digital identities
for citizens and employees, enabling secure access to online services and digital
signing of documents.
Enterprise PKI: Large organizations often deploy hierarchical PKI models internally
to manage employee access, secure communications, and protect sensitive data.
PKCS #1: The RSA Cryptography Standard, which defines the mathematical
properties and representations of RSA keys, as well as encryption and signature
algorithms based on RSA.
PKCS #7: Cryptographic Message Syntax Standard, which defines a general syntax
for data that may have cryptography applied to it, such as digital signatures and
encryption.
Ms.Debdutta Mandal , Ms. Raima Saha
Assistant Professor, Dept. of Cyber Science & Technology
Brainware University, Kolkata
P a g e | 38
Bachelor of Science (Honours) in Advanced Networking and Cyber Security – 2022 & Semester- V
Cryptography & Network Security & BNCSD502C
Section- A, Section- B, Section-C
Academic Session – 2024-25
PKCS #10: Certification Request Syntax Standard, used for requesting digital
certificates from a CA.
PKCS #12: Personal Information Exchange Syntax Standard, which defines a format
for storing and transporting a user's private keys, certificates, and other sensitive
information.
PKCS #15: Cryptographic Token Information Format Standard, which defines how
cryptographic tokens (such as smart cards) should store cryptographic information.
Windows Certificate Store: Windows uses PKCS #12 files to import and export
certificates, keys, and intermediate certificates in a secure format.
SSL/TLS Implementation: PKCS standards are integral to the implementation of
SSL/TLS protocols, which secure web traffic across the internet.
Definition: Extensible Markup Language (XML) is a flexible text format used for
structuring and transmitting data across the internet. It is widely used in web services,
data interchange, and configuration files.
Use in Security: XML is used to define security-related data structures and protocols,
such as digital signatures, encryption formats, and authentication assertions.
XML Signature: A standard for digitally signing XML data, ensuring the integrity
and authenticity of the data. It allows specific portions of an XML document to be
signed, providing flexibility in how signatures are applied.
XML Encryption: A standard for encrypting XML data, ensuring confidentiality.
XML Encryption allows for partial encryption of an XML document, so that only
sensitive portions are protected.
How XML and PKI Work Together: Digital certificates are often used to sign and
encrypt XML data, ensuring that the data is securely transmitted and that its origin
can be authenticated.
Practical Applications: XML and PKI are used in web services security (WS-
Security), e-commerce transactions, and federated identity management (FIM)
systems.
MD5: Once widely used but now considered insecure due to vulnerabilities that allow
collisions.
SHA-1: Also deprecated due to collision vulnerabilities, though it was widely used in
SSL certificates.
SHA-2 Family (SHA-256, SHA-512): The current standard for secure hash
functions, used in various security applications, including SSL/TLS and blockchain.
SHA-3: The latest standard, designed to be secure against all known types of attacks,
with a different internal structure compared to SHA-2.
Data Integrity: Hash functions are used to verify that data has not been altered
during transmission or storage. For example, file downloads often include a hash
value so that users can verify the integrity of the downloaded file.
Digital Signatures: Hash functions are used in conjunction with digital signatures to
ensure that the signed data has not been tampered with.
Password Storage: Hash functions are used to store passwords securely. Instead of
storing the password itself, the hash of the password is stored, making it difficult for
attackers to recover the original password.
Definition: Blom’s Scheme is a key pre-distribution method that allows any two
nodes in a network to securely establish a shared secret key. It is based on the use of a
symmetric matrix and provides scalability while keeping storage requirements low.
Purpose: The scheme is designed to ensure that even if some keys are compromised,
the remaining keys remain secure.
Sensor Networks: Blom’s Scheme is often used in sensor networks where secure
communication between nodes is required, but the nodes have limited computational
and storage capabilities.
Ad Hoc Networks: In ad hoc networks, where the network topology is dynamic,
Blom’s Scheme provides a flexible method for securing communications between
nodes without the need for a centralized authority.
Key Components:
o Key Distribution Center (KDC): The KDC is a trusted third party that
consists of two services: the Authentication Server (AS) and the Ticket
Granting Server (TGS).
o Authentication Server (AS): The AS authenticates users and issues a Ticket
Granting Ticket (TGT), which is used to obtain service tickets from the TGS.
o Ticket Granting Server (TGS): The TGS issues service tickets that allow
users to access specific network services.
o Service Ticket: A ticket that is presented to a network service to authenticate
the user and grant access.
Authentication Process:
o Initial Authentication: The user logs in and is authenticated by the AS,
which issues a TGT.
o Service Request: The user presents the TGT to the TGS to request a service
ticket.
o Service Access: The service ticket is presented to the target service, which
verifies the ticket and grants access.
Mutual Authentication: Kerberos ensures that both the client and the server verify
each other’s identities before establishing a connection.
Session Keys: Kerberos uses session keys to encrypt communication between the
client and the server, ensuring confidentiality and integrity.
Replay Protection: The use of timestamps and nonces in Kerberos tickets helps
prevent replay attacks.
A) Private Key
B) Public Key
C) Serial Number
D) CRL
A) RA
B) CA
C) KDC
D) HSM
A) PKCS#7
B) PKCS#1
C) PKCS#12
D) PKCS#5
Which property of hash functions ensures that the same input always produces the same
output?
A) Fast Computation
B) Deterministic
C) Pre-image Resistance
D) Collision Resistance
A) PKCS#7
B) PKCS#12
C) X.509
D) SHA-256
A) Hashing passwords
B) Protecting sensitive parts of XML documents
C) Storing digital certificates
D) Authenticating users
A) A key pre-distribution scheme ensuring any two nodes can establish a shared key
B) A method for encrypting large data sets
C) A protocol for user authentication
D) A standard for digital signatures
Which process in Kerberos involves the user receiving a Ticket Granting Ticket (TGT)?
A) Initial Authentication
B) Service Request
C) Ticket Validation
D) Key Distribution
A) Key
B) Hash Value
C) Signature
D) Ciphertext
Choose the standard that is commonly used for securing email messages.
A) PKCS#7
B) PKCS#1
C) PKCS#12
D) X.509
A) RSA, Diffie-Hellman
B) MD5, SHA-1, SHA-256
C) AES, DES
D) Kerberos, Blom's Scheme
5.Which property of hash functions ensures that the same input always produces the same
output?
17.In Kerberos, which process involves the user receiving a Ticket Granting Ticket (TGT)?
2.Describe the role of a Certificate Authority (CA) in the Public Key Infrastructure (PKI).
3.Discuss the various Public Key Cryptography Standards (PKCS) and their applications.
5.Describe the key properties of hash functions and their importance in cryptography.
6.Explain how XML Signature is used to provide integrity and authentication in digital
communications.
7.Discuss the Diffie-Hellman Key Exchange method and its significance in secure
communications.
8.Explain the concept of a Certificate Revocation List (CRL) and its role in PKI.
9.Describe the function and importance of the Ticket Granting Server (TGS) in the Kerberos
authentication protocol.
10.Compare and contrast different hash functions, including MD5, SHA-1, and SHA-256.
12.Discuss the X.509 standard for digital certificates and its applications.
13.Describe the key pre-distribution methods and their benefits in cryptographic systems.
14.Discuss the various methods of private key management and their importance in
maintaining security.
15.Explain the role and applications of XML Encryption in securing digital communications.
17.Explain the initial authentication process in Kerberos and the importance of the Ticket
Granting Ticket (TGT).
18.Discuss the importance of hash functions in cryptography and provide examples of their
applications.
19.Explain the use of PKCS#7 in securing email messages and other communications.
Vulnerabilities: Due to its ubiquity, TCP/IP is a common target for attacks, such as
IP spoofing, packet sniffing, and session hijacking. Protocols like ARP (Address
Resolution Protocol) and DNS (Domain Name System) are also vulnerable to specific
attacks like ARP spoofing and DNS cache poisoning.
Security Enhancements: Modern implementations of TCP/IP include built-in
security mechanisms like SSL/TLS for encrypted communication, IPSec for IP-level
security, and secure routing protocols.
Web Browsing (HTTP/HTTPS): The Hypertext Transfer Protocol (HTTP) runs over
TCP, while HTTPS (secure HTTP) uses SSL/TLS to encrypt traffic between a client
and server.
Email Transmission (SMTP, IMAP, POP3): Email protocols like SMTP (sending)
and IMAP/POP3 (retrieving) operate over TCP, requiring additional security
mechanisms like TLS to ensure confidentiality.
Chapter 2: Firewalls
Purpose: Firewalls create a barrier between a trusted internal network and untrusted
external networks (like the internet) to protect sensitive data and systems.
Packet Filtering Firewalls: Operate at the network layer (Layer 3) and transport
layer (Layer 4) by inspecting the headers of incoming/outgoing packets. Packet
filtering firewalls allow or block traffic based on source/destination IP addresses,
ports, and protocols. Example: Cisco Access Control Lists (ACLs).
Stateful Inspection Firewalls: Track the state of active connections and make
decisions based on the context of the traffic. Stateful firewalls understand whether a
packet is part of an existing connection or a new one. Example: iptables in Linux.
Proxy Firewalls (Application Firewalls): Act as intermediaries between clients and
servers, performing deep inspection of the entire data payload and filtering based on
application-layer data (Layer 7). Example: Squid proxy server.
Next-Generation Firewalls (NGFW): Combine traditional firewall functionality
with advanced features like deep packet inspection (DPI), intrusion detection and
prevention (IDS/IPS), and application-layer control. Example: Palo Alto Networks
NGFW.
Rule Sets: Define access control lists (ACLs) that specify which traffic is allowed or
blocked based on IP addresses, ports, and protocols.
Least Privilege: Only allow the minimum necessary traffic to pass through the
firewall.
Logging and Monitoring: Enable logging of firewall traffic and alerts for suspicious
activities to detect potential intrusions.
Regular Updates: Firewalls should be updated regularly to patch vulnerabilities and
ensure compatibility with new network technologies.
Enterprise Use: Organizations like banks use firewalls to protect sensitive customer
data, such as personal and financial information.
Home Networks: Personal firewalls are used on devices like laptops to block
unauthorized access to private files or prevent malware from communicating with
command-and-control servers.
Transport Mode: Encrypts only the payload of the IP packet, leaving the original
headers intact. This mode is used for end-to-end encryption between devices.
Tunnel Mode: Encrypts both the payload and the header of the IP packet,
encapsulating the entire original packet inside a new IP header. This mode is
commonly used in site-to-site VPNs, where the endpoints are routers or gateways.
Site-to-Site VPNs: IPSec in tunnel mode is used to securely connect two offices over
the internet, ensuring that data is encrypted as it travels between the networks.
Remote Access VPNs: IPSec in transport mode is used to secure communication
between a remote user and their corporate network, ensuring that sensitive data
remains encrypted while in transit.
OpenVPN: A widely used, open-source VPN protocol known for its flexibility and
security. It uses SSL/TLS for encryption and can traverse firewalls and NAT.
IKEv2/IPSec: A modern VPN protocol that offers strong encryption, fast connection
times, and robustness in handling network changes (e.g., switching between Wi-Fi
and cellular data).
External Intrusions: Attacks originating from outside the network, such as hacking
attempts, brute-force attacks, or denial-of-service (DoS) attacks.
Internal Intrusions: Attacks carried out by insiders (employees or contractors) who
misuse their access privileges to steal, manipulate, or destroy data.
Definition: An Intrusion Prevention System (IPS) not only detects intrusions like an
IDS but also actively blocks or mitigates identified threats in real time.
How IPS Works: IPS monitors network traffic, scans for malicious activities, and
takes proactive measures such as dropping malicious packets or blocking specific IP
addresses.
Definition: Internet security protocols are sets of rules that govern how data is
securely transmitted over the internet, ensuring data confidentiality, integrity, and
authentication.
Role of Encryption: Encryption is central to many internet security protocols, as it
ensures that data is unreadable to unauthorized parties during transmission.
SSL Handshake: The client and server exchange cryptographic keys to establish a
secure session. The handshake involves authenticating the server's digital certificate,
agreeing on encryption algorithms, and generating session keys.
Encryption and Decryption: Once the handshake is complete, SSL encrypts the data
exchanged between the client and server. The encrypted data can only be decrypted
by the recipient, ensuring confidentiality.
Secure Websites: Websites that use "https://" in the URL rely on SSL/TLS to encrypt
traffic, ensuring secure communication between users and web servers.
E-commerce: SSL is critical for securing online payment transactions, protecting
sensitive information like credit card numbers and personal data.
Chapter 8:
Definition: Transport Layer Security (TLS) is the successor to SSL and is a more
secure protocol for encrypting communications over a network. It ensures data
confidentiality, integrity, and authenticity.
TLS Versions: The most widely used versions are TLS 1.2 and TLS 1.3. TLS 1.3
introduces significant security improvements, including faster handshakes and the
elimination of weaker cryptographic algorithms.
Web Security: TLS is used to secure most of the web today, including securing
HTTPS connections, online banking, and email transmission.
VPNs: TLS is often used in VPN protocols, such as OpenVPN, to secure the
communication channel between the client and the VPN server.
Email Encryption: PGP is widely used for encrypting email messages to ensure
privacy and protect sensitive information from being intercepted.
File Encryption: In addition to emails, PGP can be used to encrypt files, ensuring the
confidentiality and integrity of data.
A) Application Layer
B) Transport Layer
C) Internet Layer
D) Network Interface Layer
What type of firewall inspects packets and blocks them based on source and destination
addresses?
A) Proxy Firewall
B) Packet-Filtering Firewall
C) Stateful Inspection Firewall
D) Next-Generation Firewall
Which IPsec component provides data integrity and authentication without encryption?
A) Only encryption
B) Confidentiality, integrity, and authentication
C) Only authentication
D) Only integrity
A) Preventing intrusions
B) Monitoring and alerting on suspicious activities
C) Encrypting network traffic
D) Managing network bandwidth
A) Hashing
B) Public Key Encryption
C) Symmetric Key Encryption
D) Digital Signatures
Which type of firewall can understand and filter traffic based on applications?
A) Packet-Filtering Firewall
B) Next-Generation Firewall (NGFW)
C) Stateful Inspection Firewall
D) Proxy Firewall
Which VPN protocol is known for being one of the oldest and less secure?
A) IPsec
B) PPTP (Point-to-Point Tunneling Protocol)
C) SSL/TLS
D) L2TP (Layer 2 Tunneling Protocol)
What function does the Transport Layer perform in the TCP/IP model?
A) Routing packets
B) End-to-end communication services
C) Data encryption
D) Physical transmission of data
A) Address resolution
B) Physical transmission of data
C) Packet routing
D) Data encryption
A) Encrypting data
B) Controlling network traffic based on security rules
C) Analyzing network performance
D) Providing VPN access
Which protocol provides secure web communication by using public key encryption?
A) FTP
B) SMTP
C) HTTPS (HyperText Transfer Protocol Secure)
D) DNS
What is the main advantage of stateful inspection firewalls over packet-filtering firewalls?
A) Faster performance
B) Context-aware decision making
C) Simpler configuration
D) Greater application support
In a VPN, what does the L2TP protocol often pair with for enhanced security?
A) PPTP
B) IPsec
C) SSL/TLS
D) HTTP
A) Addressing
B) Data encapsulation
C) Packet routing
D) Error detection
5.Which property of hash functions ensures that the same input always produces the same
output?
17.In Kerberos, which process involves the user receiving a Ticket Granting Ticket (TGT)?
21.What is TCP/IP?
30.What is the main difference between Remote Access VPN and Site-to-Site VPN?
37.Explain the difference between Transport Mode and Tunnel Mode in IPsec.
4.What are Virtual Private Networks (VPNs) and how do they enhance security?
5.Differentiate between Network Intrusion and Host Intrusion, and describe the roles of IDS
and IPS.
6.What are the differences between SSL and TLS, and how do they secure data transmission?
7.Describe the importance and components of Pretty Good Privacy (PGP) in email security.
8.Explain the function of the Internet Layer in the TCP/IP model and its key protocols.
9.What are the functions of Data Encapsulation and Packet Routing in TCP/IP?
10.How do firewalls contribute to network security and what are their main functions?
11.Describe the difference between Stateful Inspection Firewalls and Proxy Firewalls.
12.What are the key features and improvements of Transport Layer Security (TLS) over Secure
Socket Layer (SSL)?
13.Explain the roles of Authentication Header (AH) and Encapsulating Security Payload (ESP)
in IPsec.
14.How does a Virtual Private Network (VPN) ensure secure remote access?
15.Discuss the importance of Intrusion Detection Systems (IDS) and Intrusion Prevention
Systems (IPS) in network security.
16.Describe the concept of data confidentiality, integrity, and authentication in internet security
protocols.
17.What are the main functions of Secure Socket Layer (SSL) in protecting internet
communications?
18.Explain the role of cryptographic hashes and digital signatures in Pretty Good Privacy
(PGP).
19.What is the significance of Address Resolution Protocol (ARP) in the Internet Layer of
TCP/IP?
20.How do firewalls enhance threat mitigation and data protection in network security?
1.2 Examples:
Daily Example: When you log into your email account, you type your username and
password. The system checks (authenticates) whether these details match what it has
on file before allowing you to access your emails.
Chapter 2: Passwords
Definition: A password is a secret string of characters that users create to prove their
identity. It’s one of the most basic forms of authentication.
Password Manager: Many people use password managers to generate and store
complex passwords securely.
2.4 Examples:
Daily Example: Using a complex password for your online banking app like
"Pa$$w0rd2024!" instead of something simple like your birthdate protects your
account from being hacked.
Definition: Tokens are physical or digital devices used to confirm a user’s identity in
addition to or instead of a password. These can be hardware (e.g., a USB key) or
software-based (e.g., an app-generated code).
One-Time Password (OTP) Tokens: These generate a unique code that is valid for a
single session or transaction.
Smart Cards: Physical cards with embedded chips that store credentials and require
insertion into a reader.
Software Tokens: Apps on mobile devices that generate time-based or event-based
codes (e.g., Google Authenticator).
Definition: Combining something you know (like a password) with something you
have (like a token) for stronger security. This is commonly referred to as 2FA.
3.4 Examples:
Daily Example: When you log into your email account from a new device, the
service may ask for a code sent to your phone. That code is your token, adding an
extra layer of security.
When a user logs in, their certificate is verified by checking the digital signature of
the CA that issued it. If the certificate is valid and trusted, the user is granted access.
4.3 Benefits:
Security: Certificates are much harder to forge than passwords. They offer strong
authentication for systems that require higher security.
Convenience: Once configured, certificates can offer seamless authentication without
needing to remember or input passwords.
4.4 Examples:
Daily Example: When accessing a secure corporate VPN, your system may use a
certificate issued by your company to verify that you are an authorized employee.
5.3 Benefits:
Security: Biometrics are difficult to replicate, making them more secure than
traditional passwords.
Convenience: Users don’t need to remember anything—authentication is quick and
easy.
5.4 Challenges:
False Positives/Negatives: There is a small chance that the system either incorrectly
grants or denies access.
Privacy Concerns: Storing and managing sensitive biometric data poses privacy risks
if the data is compromised.
5.5 Examples:
Chapter 6: Kerberos
1. User Authentication: The user logs in, and their credentials are validated by the Key
Distribution Center (KDC).
2. Ticket Granting Ticket (TGT): If the user is authenticated, they receive a TGT,
which is used to request access to other services without needing to log in again.
3. Service Ticket: When the user tries to access a service, the TGT is used to request a
service ticket from the KDC. The service ticket allows the user to access the service
securely.
Mutual Authentication: Both the user and the service confirm each other’s identity,
preventing man-in-the-middle attacks.
No Password Transmission: The user’s password is never sent across the network,
enhancing security.
6.4 Examples:
Definition: The KDC is a trusted server in the Kerberos protocol that is responsible
for handling the authentication process. It issues two types of tickets: the Ticket
Granting Ticket (TGT) and service tickets.
Authentication Server (AS): The KDC first acts as the Authentication Server,
verifying the user’s credentials.
Ticket Granting Server (TGS): The KDC then acts as the TGS, issuing service
tickets that grant users access to different services.
7.4 Examples:
Definition: A security handshake is the process where two systems (e.g., a user’s
computer and a server) exchange information to authenticate each other and establish
a secure connection.
Weak Key Exchange: Using outdated or weak cryptographic algorithms can allow
attackers to intercept or decrypt data.
Lack of Mutual Authentication: If both parties don’t verify each other, attackers can
impersonate one of the systems (man-in-the-middle attacks).
Replay Attacks: An attacker could capture data from a previous session and reuse it
to impersonate a legitimate user.
8.3 Example:
Daily Example: Imagine you call your bank, and they ask for your name, but you
never verify that you’re really speaking to your bank. This lack of mutual verification
could be exploited by a scammer pretending to be your bank.
Kerberos-based SSO: After the initial authentication, users can access multiple
services without having to log in again. Kerberos handles issuing the necessary tickets
for each service.
SAML (Security Assertion Markup Language): A common method used for SSO
in web applications, where a user logs in once and accesses multiple applications
within the same organization (e.g., Google Apps).
OAuth/OpenID Connect: Common for logging into third-party applications using
credentials from major platforms like Google or Facebook.
9.4 Examples:
Daily Example: If you sign into Gmail, and from there you can access Google Drive,
Google Photos, and YouTube without needing to log in again, that’s an example of
SSO in action.
A) Data encryption
B) Verifying identity
C) Preventing malware
D) Managing network traffic
A) Token
B) Biometric
C) Password
D) Certificate
A) Single-factor
B) Includes letters, numbers, symbols
C) Plain-text storage
D) Publicly shared
A) Tokens
B) Biometrics
C) Passwords
D) Certificates
A) Convenience
B) Single point of failure
C) Enhanced security
D) Reduced complexity
A) DNA
B) Fingerprint
C) Social security number
D) Postal address
A) HTTP
B) SSL
C) IPsec
D) Kerberos
A) Issuing tickets
B) Managing web traffic
C) DNS resolution
D) Encrypting emails
A) Man-in-the-Middle Attacks
B) Single sign-on benefits
C) Biometric authentication
D) Two-factor authentication
A) Authentication methods
B) Login prompts
C) System performance
D) Network congestion
A) Token-Based SSO
B) Federated SSO
C) Kerberos-Based SSO
D) Biometric SSO
A) User credentials
B) Issues Ticket Granting Tickets (TGTs)
C) System availability
D) Data integrity
A) Hardware cost
B) Privacy concerns
C) Physical changes affect accuracy
D) Static nature of data
A) Single-factor
B) Encryption and digital signatures
C) Username and password
D) Social engineering attacks
A) Password
B) Something you are
C) Token
D) Certificate
A) Token
B) Biometric
C) Certificate-Based
D) Password
A) Authentication protocols
B) Secure web communications
C) Token management
D) Network routing
1. What is authentication?
11. What is the role of the Key Distribution Center (KDC) in Kerberos?
18. What is the primary function of the Authentication Service (AS) in Kerberos?
19. What are digital certificates used for in secure web communications?
2. Describe the components and functions of a Key Distribution Center (KDC) in the Kerberos
protocol.
4. Explain how biometric authentication works and its advantages and considerations.
5. Outline the process and security benefits of using SSL/TLS for web communications.
6. Describe the authentication process in the Kerberos protocol and its key features.
8. Explain the concept of authentication tokens and their types and benefits.
9. Discuss the role of hashing algorithms in password storage and their importance.
10. Describe the process and security benefits of using digital certificates in HTTPS.
11. What are the considerations for implementing biometric authentication in a system?
12. Explain the potential pitfalls of security handshakes and how they can be mitigated.
13. Describe how Single Sign-On (SSO) improves user experience and security.
15. Discuss the advantages and challenges of using hardware tokens for authentication.
Ms.Debdutta Mandal , Ms. Raima Saha
Assistant Professor, Dept. of Cyber Science & Technology
Brainware University, Kolkata
P a g e | 77
Bachelor of Science (Honours) in Advanced Networking and Cyber Security – 2022 & Semester- V
Cryptography & Network Security & BNCSD502C
Section- A, Section- B, Section-C
Academic Session – 2024-25
17. Describe the role and security measures of the Authentication Service (AS) in Kerberos.
18. Discuss the security and convenience benefits of using biometric authentication.
19. Explain the importance of regular password changes and the best practices for creating
strong passwords.
20. Describe the process and advantages of using software tokens for authentication.
Module V: IP Security
This section explores key concepts related to IP security, peer-to-peer communication, and
how to set up WebSocket servers and connect blockchain peers. It is crucial to understand
these processes as they form the foundation for secure, decentralized network
communications.
Scalability: More nodes can easily join the network, expanding its capacity.
Resilience: Since there is no central server, the network is more resistant to failures or
attacks on individual nodes.
Cost Efficiency: There’s no need for costly centralized infrastructure.
1.3 Examples:
File Sharing: Systems like BitTorrent use P2P technology to allow users to share
large files directly with each other.
Cryptocurrencies: Bitcoin and other blockchain-based currencies use P2P networks
to validate and record transactions without a central authority.
Real-time Communication: Ideal for applications that require instant updates, such
as chat applications, gaming, or stock price updates.
Efficiency: Unlike HTTP, WebSockets minimize the overhead associated with
sending and receiving data, making it faster and more efficient.
1. Set Up the Environment: Install a WebSocket server package (e.g., ws for Node.js).
2. Initialize the Server: Create a WebSocket server that listens on a specified port.
3. Handle Incoming Connections: Use event listeners to manage new client
connections.
4. Send and Receive Messages: The server can send messages to connected clients, and
clients can send messages back.
Consistency: For the blockchain to remain consistent across all nodes, each peer
needs to be connected to multiple other peers to receive updates about the latest
blocks and transactions.
Security: A strong peer-to-peer connection ensures the network’s resilience against
attacks, as it decentralizes control over the blockchain.
1. Discover Peers: Blockchain nodes use peer discovery protocols to find other nodes.
This can be done through hardcoded peers, DNS seeds, or by querying connected
nods.
Bitcoin: When you run a Bitcoin node, it automatically connects to other nodes to
download the latest blocks and transactions.
Ethereum: Nodes in the Ethereum network are constantly sharing new transactions
and verifying smart contracts via peer-to-peer communication.
Transaction Messages: Inform other nodes about new transactions that need
to be validated.
Block Messages: Share new blocks that are mined or validated, allowing the
blockchain to stay synchronized across peers.
1. Message Reception: Nodes listen for incoming messages from peers using protocols
like WebSocket or TCP.
Definition: Blockchain synchronization refers to the process where all nodes in the
network maintain an identical copy of the blockchain. Synchronization ensures that
every node has the same data and that the blockchain remains consistent and
immutable.
Network Delays: Peers may receive updates at different times, which can temporarily
cause forks (multiple chains) or outdated data.
Fork Resolution: If two different valid blocks are broadcast at the same time, the
network must resolve which block is the correct one to keep the blockchain
synchronized.
Bitcoin Forks: In the event of a temporary fork, the Bitcoin network resolves it by
ensuring that the longest valid chain is adopted by all peers. This prevents
inconsistencies in transaction records.
Ethereum Synchronization: Ethereum clients (like Geth) synchronize by
downloading the latest blocks and state from the network to ensure they have an up-
to-date copy of the blockchain.
A) Centralized control
B) Decentralization
C) Single point of failure
D) Limited scalability
Which protocol enables real-time, full-duplex communication channels over a single TCP
connection?
A) HTTP
B) WebSocket
C) FTP
D) SMTP
A) Data encryption
B) Token exchange
C) Protocol upgrade
D) Client authentication
A) Centralized ledger
B) Immutable records
C) Limited transparency
D) Data redundancy
A) ws.send()
B) wss.clients.forEach()
C) ws.close()
D) ws.broadcast()
A) socket.io
B) ws
C) websocket
D) net
What is a blockchain?
A) A central database
B) A decentralized ledger
C) A peer list
D) A transaction pool
A) Stake validation
B) Computational puzzle solving
C) Token distribution
D) Peer connection
A) Manual updates
B) Static data exchange
C) Periodic updates
D) Random updates
A) User credentials
B) List of transactions
C) Peer information
D) Network topology
A) Peer disconnection
B) Resolving conflicts and ensuring agreement
C) Data encryption
D) Token generation
A) Block messages
B) Transaction messages
C) Peer messages
D) Control messages
2.What protocol enables real-time, full-duplex communication channels over a single TCP
connection?
8.Define a blockchain.
4.What are the key concepts of blockchain technology? Explain each in detail.
5.Outline the steps involved in creating a simple WebSocket server with example code.
6.Describe the structure of a blockchain, including the contents of a block and how they are
linked.
7.Explain the importance of consensus algorithms in blockchain and describe how they work.
12.What are the challenges in maintaining data consistency in P2P networks, and how can they
be addressed?
13.Discuss the security risks associated with P2P networks and how to mitigate them.
15.Explain how WebSocket servers handle connections and messages, including broadcasting
to multiple clients.
Operating System (OS) security is essential for protecting the integrity, availability, and
confidentiality of the system and the data it stores or processes. It involves various tools,
techniques, and best practices to ensure the OS can resist attacks, maintain performance, and
recover from failures. Below is a detailed overview of the key concepts involved in OS
security.
1.2 Examples:
Daily Example: If you have an office key, you can enter the building, but you might
not have access to every room. Similarly, in an OS, an administrator may have access
to system files, but a regular user can only access their own files.
Definition: User management refers to the processes and tools used to manage user
accounts, privileges, and access to resources on an operating system. It is a key
component of OS security that ensures each user has the appropriate level of access.
Ms.Debdutta Mandal , Ms. Raima Saha
Assistant Professor, Dept. of Cyber Science & Technology
Brainware University, Kolkata
P a g e | 88
Bachelor of Science (Honours) in Advanced Networking and Cyber Security – 2022 & Semester- V
Cryptography & Network Security & BNCSD502C
Section- A, Section- B, Section-C
Academic Session – 2024-25
User Types:
o Administrator/Superuser: Has full control over the system and can install
software, change system settings, and manage other user accounts.
o Standard Users: Have limited access, typically restricted to using the
applications and files assigned to them.
Creating and Deleting Users: Administrators can create new user accounts or
remove old ones to control who has access to the system.
Managing User Roles and Permissions: Defining what each user can or cannot do
on the system, such as installing programs, accessing certain files, or using specific
applications.
Password Policies: Setting requirements for password complexity, expiration, and
resets to ensure that user credentials remain secure.
2.3 Examples:
Daily Example: If you have multiple family members sharing a computer, each
person may have their own account with different permissions. Parents
(administrators) might be able to install apps, while children (standard users) can only
use pre-installed programs.
User management helps prevent unauthorized access, limits the damage from
compromised accounts, and ensures that users only access resources necessary for
their tasks.
The firewall evaluates each data packet that tries to enter or leave the system. Based
on the firewall’s rules, it decides whether to allow or block the packet.
3.4 Examples:
Windows Defender Firewall: Comes built-in with Windows OS, helping to block
unauthorized access while permitting legitimate communication.
Linux iptables: A command-line utility for configuring the rules of the built-in Linux
firewall, used to manage incoming and outgoing traffic based on the user’s needs.
Chapter 4: Policy
Definition: A security policy is a formal set of rules that governs how security will be
implemented on a system. It defines the security requirements for users, software, and
hardware, as well as the procedures for monitoring and enforcing compliance.
Key Elements:
o Acceptable Use: Guidelines on how users should use the system and its
resources.
o Password Policies: Requirements for password length, complexity,
expiration, and history.
o Backup and Recovery: Procedures for backing up critical data and restoring
it in the event of a failure.
4.2 Examples:
Security policies ensure consistent application of security controls across the system.
They help minimize risks, prevent misuse, and provide guidelines for responding to
security incidents.
Chapter 5: Registry
The Registry contains keys and values that define how the system operates, including
startup configurations, hardware drivers, user profiles, and application settings.
Keys: Containers that can hold subkeys and values.
Values: Specific data entries within a key, such as configuration settings.
5.4 Examples:
System Tuning: You can use the Registry to enable or disable specific Windows
features, like turning off certain services or adjusting performance settings.
Malware Exploits: Some malware programs modify the Registry to automatically
run each time the computer starts, making it harder to detect and remove.
Ensuring the security of the Registry is critical because unauthorized changes can
compromise the system’s stability, security, and performance. Administrators must
regularly monitor the Registry for unusual activity and lock down critical settings.
Definition: Disaster Recovery (DR) refers to the strategies and processes for
recovering IT systems and data after a catastrophic event, such as a natural disaster,
cyberattack, or hardware failure.
Backups: Regularly scheduled backups of system files, user data, and configurations
are essential for quick recovery.
Recovery Plan: A detailed plan outlining how the system will be restored after an
outage. This includes roles, responsibilities, and specific steps to follow during a
disaster.
Redundancy: Systems may be duplicated across multiple physical or cloud locations
to ensure that, if one system fails, another can take over with minimal downtime.
6.3 Examples:
Disaster Recovery ensures business continuity, even in the face of catastrophic system
failures or cyberattacks. It minimizes downtime, prevents data loss, and ensures a
smooth recovery.
Patch Management: Regular updates and patches are critical to fixing security
vulnerabilities in the operating system.
7.3 Examples:
Patch Management: A company may install monthly security updates for Windows
to protect against the latest vulnerabilities discovered by Microsoft.
Proper OS security management ensures that the operating system remains up to date,
free from vulnerabilities, and configured to resist attacks.
IAS verifies the identity of users or devices attempting to access the network by
checking their credentials (e.g., username, password, certificate) against a central
database, such as Active Directory.
Once the user is authenticated, IAS provides authorization for what resources or
services the user can access, and it logs these actions for accounting purposes.
8.3 Examples:
IAS provides centralized control over who can access network resources and ensures
that only authorized users are granted access. It also offers detailed logging for
tracking and auditing network activity, which is crucial for detecting and responding
to security incidents.
Which access control model assigns rights based on the identity of the user and is at the
discretion of the object owner?
What type of user account typically provides limited access and is used for temporary
access?
A) Guest account
B) Local account
C) Domain account
D) Administrator account
Which tool is used in Unix/Linux systems for creating user accounts from the command
line?
A) useradd
B) usermod
C) userdel
D) usercreate
Which type of firewall tracks the state of active connections and makes decisions based on
the state and context of the traffic?
A) Packet Filtering
B) Stateful Inspection
C) Stateless Filtering
D) Application Layer Filtering
A) Files
B) Folders
C) Values
D) Programs
Which registry hive contains configuration settings for the local machine?
A) HKEY_CURRENT_USER
B) HKEY_CLASSES_ROOT
C) HKEY_USERS
D) HKEY_LOCAL_MACHINE
What is a common tool used for applying patches and updates in Linux systems?
A) Windows Update
B) apt
C) Windows Defender
D) regedit
Which protocol is commonly used by IAS for remote user authentication and accounting?
A) RADIUS
B) LDAP
C) HTTPS
D) FTP
A) PAP
B) CHAP
C) EAP
D) OAuth
A) Users have only the permissions they need to perform their tasks
B) Users have maximum permissions
C) Users have no permissions
D) Users have administrative permissions
A) apt
B) yum
C) reg.exe
D) firewall-cmd
Which type of firewall is installed on individual computers and protects them from network
threats?
A) Network-based Firewall
B) Host-based Firewall
C) Application Firewall
D) Cloud Firewall
2.Explain the difference between Discretionary Access Control (DAC) and Mandatory Access
Control (MAC).
5.Name a command-line tool used for creating user accounts in Unix/Linux systems.
11.Identify two major hives in the Windows registry and their purposes.
14.What does RTO stand for, and why is it significant in disaster recovery planning?
15.What tool is commonly used for managing software updates and patches in Linux systems?
17.What protocol does IAS typically use for remote user authentication and accounting?
19.Name a tool used to edit the Windows registry from the command line.
1. Explain the concept of authorization and its significance in operating system security.
2. Compare and contrast Discretionary Access Control (DAC) and Mandatory Access Control
(MAC).
4. What are the key responsibilities involved in user management within an operating system?
5. Describe the process of creating a user account in Unix/Linux systems using the command
line.
6. Define a software firewall and explain its role in protecting a computer system.
7. Explain the "Default Deny" rule in firewall settings and its importance in security.
8. Discuss the differences between stateful inspection and packet filtering in firewalls.
11. What are the main hives in the Windows registry, and what are their functions?
13. Compare full, incremental, and differential backups, highlighting their pros and cons.
14. What is the significance of Recovery Time Objective (RTO) in disaster recovery planning?
15. What are some common tools used for applying patches and updates in Linux systems?
16. Explain the role and functions of Internet Authentication Service (IAS) in Windows Server.
17. What is the RADIUS protocol, and how does it work in the context of IAS?
18. Describe the principle of least privilege and its importance in operating system security
management.
19. What are the key steps involved in editing the Windows registry using the command line?
Ms.Debdutta Mandal , Ms. Raima Saha
Assistant Professor, Dept. of Cyber Science & Technology
Brainware University, Kolkata
P a g e | 98
Bachelor of Science (Honours) in Advanced Networking and Cyber Security – 2022 & Semester- V
Cryptography & Network Security & BNCSD502C
Section- A, Section- B, Section-C
Academic Session – 2024-25
20. Explain the differences between host-based and network-based firewalls and their
respective use cases
Introduction to WLAN
Wireless Local Area Networks (WLANs) allow devices to connect and communicate
wirelessly within a local area. Unlike traditional wired networks, WLANs use radio frequency
(RF) technology to transmit data. WLANs have become ubiquitous in homes, businesses, and
public spaces due to their convenience and flexibility. The most common standard for WLANs
is IEEE 802.11, which defines protocols for implementing wireless connectivity.
802.11 Standards
The IEEE 802.11 standards have evolved over time to improve data rates, range, and reliability.
Here are some key 802.11 standards:
1. 802.11a: Introduced in 1999, 802.11a operates in the 5 GHz frequency band and
supports data rates up to 54 Mbps. It uses Orthogonal Frequency Division Multiplexing
(OFDM) to reduce interference and improve signal quality. Due to its higher frequency,
it offers less range but is less susceptible to interference compared to 2.4 GHz bands.
2. 802.11b: Also introduced in 1999, 802.11b operates in the 2.4 GHz frequency band and
supports data rates up to 11 Mbps. It uses Direct Sequence Spread Spectrum (DSSS)
technology. While it has a longer range than 802.11a, it is more prone to interference
from other devices operating in the 2.4 GHz band.
3. 802.11g: Ratified in 2003, 802.11g also operates in the 2.4 GHz band but supports data
rates up to 54 Mbps using OFDM, similar to 802.11a. It is backward compatible with
802.11b, allowing devices using either standard to communicate on the same network.
4. 802.11n: Introduced in 2009, 802.11n operates in both the 2.4 GHz and 5 GHz bands
and supports data rates up to 600 Mbps. It introduced Multiple Input Multiple Output
(MIMO) technology, which uses multiple antennas to improve data throughput and
range. 802.11n is backward compatible with 802.11a/b/g.
Security Types
Securing WLANs is critical to protect against unauthorized access and data breaches. Various
security protocols have been developed to enhance WLAN security:
1. Wired Equivalent Privacy (WEP): WEP was the first security protocol for WLANs,
introduced in the original 802.11 standard. It uses a static encryption key to secure data.
However, WEP has significant vulnerabilities, including weak encryption algorithms
and the use of static keys, making it relatively easy to crack.
3. Wi-Fi Protected Access (WPA): WPA was introduced to replace WEP and uses TKIP
for encryption. It includes additional security features like a message integrity check
and dynamic key rotation. While WPA was a significant improvement over WEP, it
has since been succeeded by WPA2.
4. Wi-Fi Protected Access 2 (WPA2): WPA2, part of the 802.11i standard, is the most
widely used security protocol for WLANs today. It uses the Advanced Encryption
Standard (AES) for encryption, providing robust security. WPA2 supports both
personal (pre-shared key) and enterprise (802.1X authentication) modes, making it
suitable for home and business environments.
Overview of SSID
The Service Set Identifier (SSID) is a unique identifier that distinguishes one WLAN from
another. It acts as the network name, allowing devices to identify and connect to the correct
network. An SSID can be up to 32 characters long and is broadcast by the wireless router or
access point. While broadcasting the SSID makes it easier for devices to find and connect to
the network, it can also expose the network to potential attackers. For enhanced security, some
administrators choose to disable SSID broadcasting, although this does not provide substantial
protection against determined attackers.
1. Wired Equivalent Privacy (WEP): As mentioned earlier, WEP uses static keys and
provides basic encryption. However, due to its vulnerabilities, it is no longer
recommended for securing WLANs.
2. Temporal Key Integrity Protocol (TKIP): TKIP, used in WPA, improves upon WEP
by dynamically generating keys for each session and each packet. It is a more secure
alternative to WEP but has been largely replaced by more robust protocols.
3. Wi-Fi Protected Access (WPA): WPA introduced TKIP and improved message
integrity checks. It provides better security than WEP but has been succeeded by
WPA2.
4. Wi-Fi Protected Access 2 (WPA2): WPA2 uses AES for encryption, offering strong
security. It supports two modes: WPA2-Personal (using a pre-shared key) and WPA2-
Enterprise (using 802.1X authentication with a RADIUS server). WPA2 is the current
standard for WLAN security, providing robust protection for both home and enterprise
networks.
Which IEEE 802.11 standard operates in the 5 GHz frequency band and supports data rates
up to 54 Mbps?
A) 802.11b
B) 802.11a
C) 802.11g
D) 802.11n
A) OFDM
B) DSSS
C) MIMO
D) AES
Which 802.11 standard introduced Multiple Input Multiple Output (MIMO) technology?
A) 802.11a
B) 802.11b
C) 802.11g
D) 802.11n
Which protocol uses the Advanced Encryption Standard (AES) for encryption?
A) WEP
B) TKIP
C) WPA
D) WPA2
Which security protocol was introduced as an interim solution to address the weaknesses of
WEP?
A) TKIP
B) AES
C) WPA2
D) SSID
A) 802.11a
B) 802.11n
C) 802.11g
D) None of the above
A) Dynamic key
B) Static key
C) Rotating key
D) None of the above
Which security protocol provides the best security for WLANs among the given options?
A) WEP
B) TKIP
C) WPA2
D) WPA
A) To encrypt data
B) To provide IP addresses
C) To identify the network
D) To act as the network name
Which wireless security protocol introduced a message integrity check to protect against
packet tampering?
A) WEP
B) WPA
C) WPA2
D) TKIP
A) WEP
B) TKIP
C) AES
D) OFDM
3. What technology does 802.11b use and what are its data rate capabilities?
13. What does WPA stand for and what was its purpose?
15. What is the function of a message integrity check in wireless security protocols?
18. What does the principle of least privilege entail in WLAN security?
6. Discuss the vulnerabilities of WEP and why it is no longer recommended for WLAN
security.
8. What are the key features of WPA and how does it enhance WLAN security?
10. How does certificate-based authentication work in WLANs, and what are its benefits?
12. What is the role of the Key Distribution Center (KDC) in Kerberos protocol?
14. Discuss the common security handshake pitfalls and their implications.
15. Explain the concept and benefits of Single Sign-On (SSO) in WLAN security.
16. How does 802.11n enhance WLAN performance compared to earlier standards?
17. Discuss the benefits and challenges of using biometric authentication in WLANs.
18. Explain the security features of WPA2 and why it is preferred over WPA.
19. Describe the function of SSID in WLANs and its role in network security.
Malicious logic refers to any code or software designed to disrupt, damage, or gain
unauthorized access to computer systems. It includes various forms of malicious software
(malware) and other harmful activities that threaten computer security. Understanding the
Ms.Debdutta Mandal , Ms. Raima Saha
Assistant Professor, Dept. of Cyber Science & Technology
Brainware University, Kolkata
P a g e | 106
Bachelor of Science (Honours) in Advanced Networking and Cyber Security – 2022 & Semester- V
Cryptography & Network Security & BNCSD502C
Section- A, Section- B, Section-C
Academic Session – 2024-25
different types of malicious logic, their mechanisms, and countermeasures is crucial for
safeguarding information systems.
1. Virus
Definition
A computer virus is a type of malicious software that attaches itself to a host file or boot sector
of a computer. When the infected file is executed, the virus activates and replicates, spreading
to other files and systems.
Characteristics
Payload Delivery: Upon activation, viruses can deliver a payload, which might range
from harmless pranks to destructive actions like data corruption.
Examples
Melissa Virus: Spread through email attachments, causing significant email traffic.
ILOVEYOU Virus: Sent as an email attachment, it overwrote files and sent itself to
contacts in the victim's address book
2. Worm
Definition
A worm is a standalone malicious program that replicates itself to spread across networks
without the need for a host file. Worms exploit vulnerabilities in network protocols to
propagate.
Characteristics
Payload Delivery: Worms may carry payloads that cause harm, such as deleting files
or creating backdoors.
Examples
Morris Worm: One of the first worms, it exploited vulnerabilities in UNIX systems,
causing widespread disruption.
3. Trojan Horse
Definition
Characteristics
Examples
Zeus Trojan: A notorious banking Trojan that stole sensitive financial information.
Ms.Debdutta Mandal , Ms. Raima Saha
Assistant Professor, Dept. of Cyber Science & Technology
Brainware University, Kolkata
P a g e | 108
Bachelor of Science (Honours) in Advanced Networking and Cyber Security – 2022 & Semester- V
Cryptography & Network Security & BNCSD502C
Section- A, Section- B, Section-C
Academic Session – 2024-25
Definition
Zombies are compromised computers controlled by an attacker, often without the knowledge
of the owner. A network of zombies is called a botnet, which can be used for various malicious
purposes.
Characteristics
Remote Control: Attackers use command and control (C&C) servers to manage
zombies.
Examples
Definition
Denial of Service (DoS) attacks aim to make a system or network resource unavailable to its
intended users by overwhelming it with a flood of illegitimate requests.
Characteristics
Volume-Based Attacks: Flood the target with excessive traffic to exhaust bandwidth.
Examples
Ping of Death: Sends malformed or oversized packets to crash the target system.
Ms.Debdutta Mandal , Ms. Raima Saha
Assistant Professor, Dept. of Cyber Science & Technology
Brainware University, Kolkata
P a g e | 109
Bachelor of Science (Honours) in Advanced Networking and Cyber Security – 2022 & Semester- V
Cryptography & Network Security & BNCSD502C
Section- A, Section- B, Section-C
Academic Session – 2024-25
SYN Flood: Exploits the TCP handshake process to consume server resources.
Intrusion
Definition
Intrusion refers to unauthorized access to a computer system or network. Intrusions can lead to
data theft, system damage, and other malicious activities.
Types of Intrusion
Definition
Intruders, also known as hackers or attackers, are individuals or groups that attempt to gain
unauthorized access to computer systems.
Types of Intruders
Script Kiddies: Inexperienced attackers who use pre-made tools and scripts to exploit
vulnerabilities.
Definition
An Intrusion Detection System (IDS) monitors network or system activities for malicious
actions or policy violations. It alerts administrators when suspicious activities are detected.
Ms.Debdutta Mandal , Ms. Raima Saha
Assistant Professor, Dept. of Cyber Science & Technology
Brainware University, Kolkata
P a g e | 110
Bachelor of Science (Honours) in Advanced Networking and Cyber Security – 2022 & Semester- V
Cryptography & Network Security & BNCSD502C
Section- A, Section- B, Section-C
Academic Session – 2024-25
Types of IDS
Host-Based IDS (HIDS): Monitors individual systems for suspicious activities, such
as unauthorized file modifications.
Benefits: Provides real-time alerts, helps identify ongoing attacks, and enhances overall
security posture.
Limitations: Can produce false positives, requires constant updates, and may not detect
new or unknown threats.
Definition
An Intrusion Prevention System (IPS) not only detects but also actively prevents and blocks
potential threats. It sits in-line with network traffic and takes immediate action upon detecting
malicious activities.
Types of IPS
Behavioral-Based Prevention: Identifies and blocks actions that deviate from normal
behavior.
Benefits: Provides proactive protection, reduces the risk of successful attacks, and
enhances response capabilities.
Limitations: Can impact network performance, may produce false positives, and
requires regular updates to remain effective.
A) Useful code
B) Malicious software
C) Legal software
D) Open-source software
A) Network packets
B) Host files or boot sectors
C) User passwords
D) IP addresses
A) Via email
B) By attaching to files
C) By exploiting network vulnerabilities
D) Through physical media
A) It replicates itself
B) It spreads via networks
C) It masquerades as legitimate software
D) It encrypts files
A) Intranet
B) Extranet
C) Botnet
Ms.Debdutta Mandal , Ms. Raima Saha
Assistant Professor, Dept. of Cyber Science & Technology
Brainware University, Kolkata
P a g e | 112
Bachelor of Science (Honours) in Advanced Networking and Cyber Security – 2022 & Semester- V
Cryptography & Network Security & BNCSD502C
Section- A, Section- B, Section-C
Academic Session – 2024-25
D) Mainframe
A) Stealing data
B) Disrupting service
C) Gaining root access
D) Installing malware
A) Data corruption
B) Network slowdown
C) Unauthorized file access
D) Phishing emails
A) Virus
B) Worm
C) Trojan Horse
D) Adware
A) Legitimate users
B) Compromised computers
C) Security tools
D) Network switches
A) Denial of Service
B) Trojan Horse
C) Virus
D) Rootkit
A) Blocking traffic
B) Detecting unauthorized access
C) Encrypting data
D) Generating malware
What is the key difference between an IDS and an Intrusion Prevention System (IPS)?
A) Script kiddie
B) Disgruntled employee
C) Hacker
D) Network administrator
A) Monitoring traffic
B) Blocking malicious activities
C) Generating reports
D) Scanning for viruses
A) Legitimate software
B) Network device
C) Firewall
D) User account
A) Phishing
B) Man-in-the-Middle
C) Denial of Service
D) SQL injection
A) Encrypting files
B) Launching DDoS attacks
C) Installing patches
D) Monitoring network traffic
A) A controlling server
B) A compromised computer
C) An attack vector
D) A security protocol
A) User activity
B) Network traffic
C) Power usage
D) System temperature
Which malicious logic can replicate itself and spread to other computers?
A) Worm
B) Adware
C) Spyware
D) Rootkit
A) Script kiddie
B) Disgruntled employee
C) Advanced Persistent Threat
D) Insider threat
A) By blocking them
B) By logging them
5.What is a botnet?
19.What are the functions of the Key Distribution Center (KDC) in Kerberos?
3.How do worms propagate, and what measures can be taken to prevent their spread?
6.Discuss the different types of Denial of Service (DoS) attacks and their impacts.
8.How does an Intrusion Prevention System (IPS) differ from an IDS, and what are its benefits?
9.Who are script kiddies, and what impact do they have on cybersecurity?
10.How do botnets operate and what are the common strategies for mitigating their threats?
11.Explain the role of the Key Distribution Center (KDC) in the Kerberos authentication
protocol.
13.What measures can be taken to prevent the spread of worms in a network environment?
14.Describe the security implications of botnets and the challenges in combating them.
15.How do Denial of Service (DoS) attacks affect organizations, and what are effective
mitigation strategies?
16.Discuss the role and effectiveness of Intrusion Detection Systems (IDS) in cybersecurity.
17.Explain the differences between Intrusion Detection Systems (IDS) and Intrusion
Prevention Systems (IPS).
18.What are the motivations and methods used by script kiddies in cyberattacks?
19.How do botnets impact cybersecurity, and what are the common methods for detecting and
mitigating them?
20.Describe the authentication process in the Kerberos protocol and its security benefits.
21.How does Certificate-Based Authentication work, and what are its advantages in securing
communications?
MCQ ANSWERS:
MODULE I
MODULE II
1. B | 2. B | 3. B | 4. B | 5. B | 6. A | 7. A | 8. B | 9. A | 10. B |
11. A | 12. C | 13. B | 14. A | 15. B | 16. A | 17. A | 18. B | 19. A | 20. B
MODULE III
1.A | 2. C | 3. B | 4. A | 5. B | 6. B | 7. A | 8. B | 9. B | 10. C |
11. B | 12. B | 13. B | 14. B | 15. B | 16. C | 17. B | 18. B | 19. D | 20. A
MODULE IV
1. B | 2. C | 3. B | 4. A | 5. C | 6. A | 7. B | 8. D | 9. A | 10. A |
11.B | 12. B | 13. A | 14. B | 15. B | 16. A | 17. C | 18. B | 19. B | 20. A
MODULE V
1.B | 2. B | 3. B | 4. C | 5. B | 6. B | 7. A | 8. B | 9. B | 10. C |
11.B | 12. B | 13. C | 14. B | 15. B
MODULE VI
1. B | 2. A | 3. A | 4. A | 5. A | 6. B | 7. B | 8. B | 9. B | 10. D |
11. B | 12. D | 13. A | 14. B | 15. B | 16. A | 17. B | 18. A | 19. C | 20. B
MODULE VII
1.B | 2. B | 3. D | 4. B | 5. D | 6. A | 7. A | 8. C | 9. B | 10. C |
11. B | 12. C | 13. C | 14. D | 15. C
MODULE VIII
1.B | 2. B | 3. C | 4. C | 5. C | 6. B | 7. B | 8. B | 9. C | 10. B |
11.A | 12. B | 13. A | 14. B | 15. B | 16. A | 17. A | 18. C | 19. B | 20. B |
21.B | 22. A | 23. A | 24. A | 25. A