Rollno 36 (A)
Rollno 36 (A)
36
Ques-1 Discuss the common security threats that target the application layer of a network. How
do these threats exploit vulnerabilities in applications, and what countermeasures can be
implemented to mitigate them? Provide examples of real-world attacks.
Ans-
1. Cross-Site Scripting (XSS)
Example- Attackers inject malicious scripts into web pages viewed by other users.
Impact- Can steal cookies, session tokens, or redirect users to malicious sites.
2. SQL Injection (SQLi)
Example- Malicious SQL statements are inserted into form fields or URLs.
Impact- Attackers can view, modify, or delete database contents; can also bypass
authentication.
3. Cross-Site Request Forgery (CSRF)
Example- Tricks users into executing unwanted actions on a web application where they're
authenticated.
Impact- Can result in unauthorized transactions or changes in user settings.
4. Man-in-the-Middle (MitM) Attacks
Example- Intercepting communications between two parties.
Impact- Sensitive data like login credentials and payment details can be stolen.
5. Buffer Overflow
Example- Input data exceeds buffer limits and overwrites adjacent memory.
Impact- Can crash applications or allow attackers to execute arbitrary code.
6. Directory Traversal
Example- Attackers manipulate URLs to access files and directories outside the web root.
Impact- Unauthorized access to system files or sensitive configuration data.
7. Session Hijacking
Example- Stealing or guessing valid session tokens.
Ques-2 Explain the Secure Electronic Transaction (SET) protocol and its role in securing online
transactions. Describe the steps involved in the SET protocol and how it ensures the
confidentiality and integrity of payment information. What are its advantages and limitations?
Ans-
The Secure Electronic Transaction (SET) protocol is a cryptographic protocol developed by Visa and
MasterCard in the mid-1990s to secure online credit card transactions over the internet. It was
designed to protect cardholder information during e-commerce transactions, ensuring that
sensitive data like credit card numbers are not exposed or intercepted. It provides confidentiality,
Authentication, Integrity, non-repudiation.
Steps in the SET Protocol-
1. Digital Certificates Issued
o All parties (cardholder, merchant, bank) get certificates from a Certificate Authority
(CA).
2. Cardholder Initiates Purchase
o Customer selects products and starts the payment process.
3. Creates Order & Payment Info
o Order Info (OI) – for the merchant.
o Payment Info (PI) – for the bank (e.g., credit card details).
4. Applies Dual Signature
o Links OI and PI together using a digital signature.
o Ensures data integrity and privacy.
5. Encrypts Data
o OI encrypted with merchant’s public key.
o PI encrypted with payment gateway’s public key.
6. Sends Data to Merchant
o Merchant verifies cardholder's signature and certificate.
o Forwards PI to the payment gateway.
7. Payment Gateway Authorizes Payment
o Decrypts PI, verifies it, and contacts the issuing bank.
o Sends approval or rejection to the merchant.
8. Merchant Confirms Purchase
o Sends a confirmation message to the cardholder.
Karan Rana Sec-A Roll No. 36
Advantages-
High Security- End-to-end protection of payment and order information.
Cardholder Privacy- Sensitive payment data is never visible to merchants.
Authentication- Strong verification of both customers and merchants.
Dual Signature- Ensures both payment and order info are protected together.
Limitations-
Complexity- Requires complex infrastructure (digital certificates, SET software).
Cost- High cost of implementation and maintenance for merchants and banks.
User Experience- Requires users to install SET-enabled software, which can be inconvenient.
Adoption- Never gained widespread popularity due to the rise of simpler protocols like
SSL/TLS with 3D Secure.
Karan Rana Sec-A Roll No. 36
Ques-3 What are the primary security concerns associated with electronic mail (email)? Discuss
the mechanisms used to secure email communication, such as encryption and digital signatures.
How do these mechanisms address issues like confidentiality, authenticity, and non-repudiation?
Ans-
The primary security concerns associated with electronic mail (email) stem from the fact that
traditional email protocols were not designed with strong security in mind.
1. Confidentiality- Emails can be intercepted in transit and read by unauthorized parties.
2. Integrity- Email contents can be modified without the sender or recipient knowing.
3. Authentication- It’s hard to verify if an email was truly sent by the person it claims to be from.
4. Non-repudiation- The sender can deny having sent an email without proper proof.
5. Phishing & Spoofing- Attackers impersonate legitimate contacts to steal data or infect systems.
6. Malware Attachments- Emails can carry harmful files that compromise systems.
Authentication Verified using public key infrastructure (PKI) and digital certs.
Ques-4 Describe the Pretty Good Privacy (PGP) protocol and its use in securing email
communication. Explain how PGP combines symmetric and asymmetric encryption to provide
security. What are the key components of PGP, and how do they work together?
Ans-
Pretty Good Privacy (PGP) is a data encryption and decryption protocol used to secure digital
communications, especially email. It was developed by Phil Zimmermann in 1991 and is known for
providing strong privacy, authentication, and integrity.
Ques-5 Compare and contrast PGP and S/MIME as email security protocols. What are the key
differences in their approaches to encryption and authentication? In what scenarios would one
be preferred over the other?
Ans-
Karan Rana Sec-A Roll No. 36
Encryption Uses symmetric encryption for Same hybrid method- symmetric for
Approach message content and asymmetric content, asymmetric for key
encryption for exchanging keys. distribution.
Authentication Based on users signing each other’s Uses digital certificates signed by a
Method keys to establish trust. trusted CA to authenticate users.
Ques-6 Explain the Secure Socket Layer (SSL) protocol and its role in securing communication
over the internet. Describe the SSL handshake process and how it establishes a secure
connection. What are the key components of SSL?
Ans-
Karan Rana Sec-A Roll No. 36
Secure Socket Layer (SSL) is a security protocol developed to secure communication over the
internet by establishing an encrypted link between a client (such as a web browser) and a server
(like a website). The main role of SSL is to ensure that all data transmitted between the client and
server remains private, confidential, and tamper-proof.
SSL works by using a combination of asymmetric encryption (for key exchange and authentication)
and symmetric encryption (for fast, secure data transfer). It also relies on digital certificates issued
by trusted Certificate Authorities (CAs) to authenticate the server’s identity, helping users trust the
website they are connecting to.
By securing the connection, SSL prevents eavesdropping, data tampering, and man-in-the-middle
attacks, making it especially important for sensitive online activities like banking, shopping, and
logging into accounts. Though SSL has been largely replaced by its more secure successor, TLS
(Transport Layer Security), the term "SSL" is still commonly used to refer to secure HTTPS
connections on the web.
Ques-7 How does Transport Layer Security (TLS) improve upon SSL? Discuss the key differences
between SSL and TLS, and explain why TLS is considered more secure. Provide an example of a
scenario where TLS is used.
Ans-
Transport Layer Security (TLS) is the successor to Secure Sockets Layer (SSL), both of which are
cryptographic protocols designed to provide secure communication over a network. TLS was
Karan Rana Sec-A Roll No. 36
introduced to address the security flaws in SSL and improve overall performance and encryption
strength.
Versions SSL 2.0, SSL 3.0 (both deprecated) TLS 1.0 to TLS 1.3 (TLS 1.2 and 1.3
widely used)
Cipher Suites Supports weaker algorithms Stronger default cipher suites and
forward secrecy
Handshake Less efficient and more exposed Streamlined with better key negotiation
Process
Even if someone intercepts your connection, they cannot read or modify the data.
Without TLS, sensitive data could be exposed to attackers. That’s why TLS is a core part of web
security today.
Ques-8 What is the role of digital certificates in SSL/TLS? Explain how certificates are used to
authenticate servers and establish trust in a secure connection. What happens if a certificate is
invalid or expired?
Ans-
Digital certificates are a core part of SSL/TLS protocols, which are used to secure communication
over the internet (e.g., HTTPS). Their main function is to authenticate servers and establish trust
between a client (like a web browser) and a server (like a website).
Karan Rana Sec-A Roll No. 36
Does not match the domain name- A warning is shown, and the connection may be
blocked.
Ques-9 Describe the Wireless Transport Layer Security (WTLS) protocol and its use in securing
wireless communication. How does WTLS differ from TLS, and what unique challenges does it
address in wireless networks?
Ans-
Wireless Transport Layer Security (WTLS) is a security protocol designed to provide confidentiality,
integrity, and authentication specifically for wireless communication. It is a part of the Wireless
Application Protocol (WAP) framework and is adapted from the standard Transport Layer Security
Karan Rana Sec-A Roll No. 36
(TLS) protocol, but optimized for the constraints of mobile and wireless environments. WTLS
secures data transmitted between mobile devices and wireless gateways by encrypting the data to
ensure privacy, validating its integrity to detect any tampering, and authenticating the parties
involved to prevent impersonation. It also includes features like data compression to reduce
bandwidth usage and is built to handle unreliable wireless connections. WTLS was commonly used
in early mobile internet applications such as mobile banking and email, helping ensure safe
communication over low-bandwidth and insecure wireless networks.
Target Devices Designed for mobile/wireless Designed for wired networks and
devices powerful devices
Header Size Uses smaller headers to reduce Larger headers suitable for fast
overhead networks
Data Compression Includes built-in compression Typically does not use compression
Error Tolerance Tolerates packet loss and delays Assumes reliable transport like TCP
Handshake Process Simplified and optimized for low Full TLS handshake with more
power overhead
3. Unreliable Connections
Wireless links can suffer from high latency, packet loss, and frequent disconnections.
WTLS is designed to be more tolerant of errors and delays than standard TLS.
4. Battery Constraints
Cryptographic operations can drain battery life.
WTLS minimizes processing requirements to save power on mobile devices.
Karan Rana Sec-A Roll No. 36
Ques-10 Discuss the common vulnerabilities associated with SSL/TLS protocols. How can these
vulnerabilities be exploited by attackers, and what measures can be taken to mitigate them?
Provide examples of past SSL/TL S-related attacks.
Ans-
Here’s a concise overview of common SSL/TLS vulnerabilities and how attackers can exploit them-
1. Outdated Protocols (SSL 2.0/3.0, TLS 1.0/1.1)
Exploit- Attackers force a downgrade to these weak protocols (e.g., POODLE attack).
Risk- Can decrypt or manipulate encrypted data.
Karan Rana Sec-A Roll No. 36
POODLE 2014 Exploited SSL 3.0 fallback and block cipher padding
BEAST 2011 Targeted CBC mode in TLS 1.0 to decrypt secure data
Ques-11 What is IP Security (IPSec), and why is it important for securing communication at the
network layer? Explain the two main modes of IPSec- transport mode and tunnel mode. Provide
examples of where each mode is used.
Ans-
IP Security (IPSec) is a suite of protocols that secures IP communications by authenticating and
encrypting each IP packet at the network layer. It plays a crucial role in providing end-to-end
security, regardless of the application or transport protocol used. IPSec ensures data confidentiality
through encryption, data integrity by verifying that packets haven’t been altered, and
Karan Rana Sec-A Roll No. 36
2. Tunnel Mode
Description-
o Entire IP packet (header + payload) is encrypted and encapsulated within a new IP
packet.
o Adds a new IP header for routing.
Use Case-
o Common in site-to-site VPNs, connecting two networks securely over the internet.
o Used by security gateways like routers or firewalls.
Example-
o A company uses IPSec tunnel mode to securely connect its head office and branch
office over the internet.
Karan Rana Sec-A Roll No. 36
Ques-12 Describe the Authentication Header (AH) protocol in IPSec. What is its primary purpose,
and how does it ensure data integrity and authentication? What are the limitations of AH?
Ans-
The Authentication Header (AH) is a protocol in the IPSec suite that provides data integrity,
authentication, and anti-replay protection, but it does not offer encryption. Its main purpose is to
ensure that the data has not been tampered with and that it comes from a trusted source. AH
works by applying a cryptographic hash (using algorithms like HMAC-SHA1 or HMAC-SHA256) over
the packet, including parts of the IP header and payload. This hash is then verified by the receiving
device to confirm the authenticity and integrity of the data. However, AH has some limitations- it
does not provide confidentiality, meaning the data is still visible during transmission; it is not NAT-
Karan Rana Sec-A Roll No. 36
friendly because it includes the IP header in the hash, which can be altered by network devices;
and it is less commonly used today, as the ESP protocol is preferred for its broader security
features, including encryption.
Limitations of AH -
No encryption – does not provide confidentiality, so data remains visible.
Not NAT-compatible – includes parts of the IP header in the hash, which NAT may change.
Less used today – most systems prefer ESP, which offers encryption along with integrity and
authentication.
Ques-13 Explain the Encapsulating Security Payload (ESP) protocol in IPSec. How does ESP
provide confidentiality, integrity, and authentication? Compare and contrast ESP with the
Authentication Header (AH).
Ans-
Encapsulating Security Payload (ESP) is a core protocol within the IPSec suite that provides
confidentiality, integrity, and optional authentication for data sent over IP networks. It’s widely
used to secure communications in VPNs and other network security solutions. IPSec provides-
i. Confidentiality – Encrypts data to keep it private
ii. Integrity – Ensures data hasn’t been tampered with
Karan Rana Sec-A Roll No. 36
Overhead Slightly higher (due to encryption) Lower than ESP with encryption
Ques-14 Discuss the importance of key management in IPSec. What is the role of the Internet
Key Exchange (IKE) protocol in IPSec, and how does it facilitate secure key exchange? Provide a
brief overview of the IKE process.
Ans-
Importance of Key Management-
Key management is critical in IPSec because it ensures that encryption and authentication keys are-
Generated securely
Exchanged safely
Updated regularly
Karan Rana Sec-A Roll No. 36
Ques-15 How is IPSec used in Virtual Private Networks (VPNs)? Explain how IPSec ensures secure
communication over public networks. Provide an example of a scenario where IPSec-based VPNs
are used to connect remote offices.
Ans-
IPSec (Internet Protocol Security) is a suite of protocols used to secure IP communications by
authenticating and encrypting each IP packet in a data stream. It plays a major role in VPNs (Virtual
Private Networks) by enabling private and secure communication over public networks, such as the
internet.
IPSec ensures secure communication by providing-
1. Encryption
Encrypts data so that it cannot be read by unauthorized parties.
Karan Rana Sec-A Roll No. 36