NIS QB Answers 22
NIS QB Answers 22
4m
Ans :
Transposition techniques
Unlike substitution techniques, where characters are replaced with other characters,
transposition techniques focus on changing the positions of characters within the message. Here
are some common transposition techniques:
Example : The key for the columnar transposition cipher is a keyword e.g., ORANGE. The row
length that is used is the same as the length of the keyword.
To encrypt a below plaintext: COMPUTER PROGRAMMING
In the above example, the plaintext has been padded so that it neatly fits in a rectangle. This is
known as a regular columnar transposition. An irregular columnar transposition leaves these
characters blank, though this makes decryption slightly more difficult. The columns are now
reordered such that the letters in the key word are ordered alphabetically.
3. The key is sent back to the client in the form of a ticket-granting ticket, or TGT. This
is a simple ticket that is issued by the authentication service. It is used for authentication
the client for future reference.
4. The client submits the ticket-granting ticket to the ticket-granting server, or TGS, to
get authenticated.
5. The TGS creates an encrypted key with a timestamp, and grants the client a service
ticket.
6. The client decrypts the ticket, tells the TGS it has done so, and then sends its own
encrypted key to the service server.
7. The service server decrypts the key, and makes sure the timestamp is still valid. If it is,
the service contacts the key distribution center to receive a session that is returned to the
client.
8. The client decrypts the ticket. If the keys are still valid, communication is initiated
between client and server.
Explain configuration & limitations of firewall. 4m
Ans :
Policies of firewall: a) All traffic from inside to outside and vice versa must pass through the
firewall. To achieve this all access to local network must first be physically blocked and access
only via the firewall should be permitted. As per local security policy traffic should be
permitted. b) The firewall itself must be strong enough so as to render attacks on it useless.
Configuration of firewall
There are 3 common firewall configurations.
1. Screened host firewall, single-homed bastion configuration
2. Screened host firewall, dual homed bastion configuration
3. Screened subnet firewall configuration
1. Screened host firewall, single-homed bastion configuration
In this type of configuration a firewall consists of following parts
i)A packet filtering router
(ii)An application gateway.
allowed only if it is destined for application gateway, by verifying the destination address field
of incoming IP packet. It also performs the same task on outing data by checking the source
proxy function. Here Internal users are connected to both application gateway as well as to
packet filters therefore if packet filter is successfully attacked then the whole Internal Network is
opened to the attacker
Convert the given plain test into cipher text using single columnar technique using
following data
Ans :
remaining
Cover media is the file in which we will hide the hidden data, which may also be encrypted
using stego-key. The resultant file is stego medium. Cover-media can be image or audio file.
Stenography takes cryptography a step further by hiding an encrypted message so that no one
suspects it exists. Ideally, anyone scanning your data will fail to know it contains encrypted data.
Stenography has a number of drawbacks when compared to encryption. It requires a lot of
overhead to hide a relatively few bits of information. I.e. One can hide text, data, image, sound,
and video, behind image.
Applications :
1. Confidential communication and secret data storing
2. Protection of data alteration
3. Access control system for digital content distribution
4. Media Database systems
State difference between Firewall and Intrusion Detection System? 2m
State of needs of Firewalls. 2m
Ans :
A firewall is a network security device that monitors incoming and outgoing network traffic
and permits or blocks data packets based on a set of security rules.
Its purpose is to establish a barrier between your internal network and incoming traffic from
external sources (such as the internet) in order to block malicious traffic like viruses and
hackers.
Firewalls can be an effective means of protecting a local system or network of systems from
network-based security threats while at the same time affording access to the outside world via
wide area networks and the Internet.
Describe the DMZ with suitable example.2m
Ans :
DMZ (Demilitarized Zone): a computer host or small network It is inserted a a private network
and the as “neutral zone” in company‟s outside public network. avoids outside users from
getting direct It access a data server. A DMZ optional but more to company‟s is an secure
approach a firewall. can effectively acts a proxy server. toItas The typical DMZ configuration
has a separate computer or host in network which receives requests from users within the private
network access a web sites or public network. Then DMZ host to initiates sessions for such
requests on the public network but not it is able initiate a session back into the private network.
only toIt can forward packets which have been requested a host. The public by network‟s users
who are outside the company access only the can DMZ host. store the web pages which be
served It can company‟s can toto the outside users. Hence, the DMZ give access can‟t the other
company‟s data. By any way, outsider penetrates the if an DMZ‟s security the web pages may
get corrupted but other company‟s information can be safe.
Examples:
1) Web servers It‟s possible for web servers communicating with internal database servers be
deployed a DMZ. This makes internal databases more to in secure, these are the repositories
responsible for storing sensitive as information. Web servers connect with the internal database
can server directly or through application firewalls, even though the DMZ continues to provide
protection.
2) servers DNS A server stores a database of public addresses and their DNSIP associated
hostnames. usually resolves or converts those names Itto IP addresses when applicable. servers
use specialized software DNS and communicate with one another using dedicated protocols.
Placing a server within the DMZ prevents external requests from DNS gaining access the
internal network. Installing a second toDNS server on the internal network also serve additional
security.
3)Proxy servers A proxy server often paired with a firewall. Other computers use isit to view
Web pages. When another computer requests a Web page, the proxy server retrieves and
delivers the appropriate requesting itit to machine. Proxy servers establish connections behalf of
clients, on shielding them from direct communication with a server. They also isolate internal
networks from external networks and save bandwidth by caching web content.
Classify following cyber-crimes: i) Cyber stalking ii) Email harassment 2 m
Ans :
i) Cyber stalking : Cyber Stalking means following some ones activity over internet. This can
be done with the help of many protocols available such as e- mail, chat rooms, user net groups.
OR
Cyber stalking :Cyberstalking/ Harassment refers to the use of the internet and other
technologies to harass or stalk another person online, and is potentially a crime in the India
under IT act-2000. This online harassment, which is an extension of cyberbullying and in-
person stalking, can take the form of e-mails, text messages, social media posts, and more and is
often methodical, deliberate, and persistent.
ii) Email harassment
:
Email harassment is usually understood to be a form of stalking in which one or more people
send consistent, unwanted, and often threatening electronic messages to someone else
OR
Email harassment : Cybercrime against individual
Define AS, TGS with respect to Kerberos.2m
Ans :
In the context of Kerberos (a network authentication protocol), the terms AS and TGS are
defined as:
- AS (Authentication Server):
It is the component of the Key Distribution Center (KDC) that authenticates users and issues
Ticket Granting Tickets (TGTs) after verifying the user’s credentials.
---
---
---
---
1. Confidentiality –
Uses encryption to keep data private during transmission.
2. Data Integrity –
Ensures the data is not altered or tampered with during transfer.
3. Authentication –
Verifies the identity of the sender and receiver using keys.
4. Anti-Replay Protection –
Detects and blocks repeated or delayed packets to prevent attacks.
---
Main Components of IPSec:
- AH (Authentication Header):
Provides authentication and data integrity, but no encryption.
Modes of IPSec:
1. Transport Mode:
Encrypts only the data (payload), used for end-to-end communication.
2. Tunnel Mode:
Encrypts the entire IP packet, used in VPNs for site-to-site communication.
---
---