Unit 02. NIS (22620)
Unit 02. NIS (22620)
• A strong password is essential for protecting user accounts, confidential data, and
system security from unauthorized access.
• Weak passwords can be easily guessed or hacked using brute-force attacks.
• Following password selection strategies and criteria helps in creating secure and
hard-to-crack passwords.
Marathi Tip: "मजबूत पासवर्ड म्हणजे बिनतोड कुलूप!—नेहमी संममश्र अक्षरे , संख्या, आमण
मवशेष मिन्हे वापरा!"
Marathi Tip: "पासवर्ड मोठा, जमिल आमण वेगळा असावा—'password123' सारखे सोपे पासवर्ड
वापरू नका!"
➢ Password Attacks and Their Types (Most Imp ha question fix yeto)
Definition:
Password Attacks
Shoulder Surfing
Piggybacking
Dumpster Diving
Example:
• A hacker watches a person enter their ATM PIN at a bank.
• A student sees a classmate type their password in the college lab.
Prevention:
• Use privacy screens on laptops and mobiles.
• Cover the keypad while entering a PIN.
• Be aware of surroundings in public places.
• Use biometric authentication instead of typing passwords.
Marathi Tip: "Shoulder Surfing म्हणजे कोणीतरी तुमच्या खाांद्यावरून डोकावतांय आबण
पासवडड पाहतोय!"
Example:
• A hacker follows an employee through a secure office door without swiping an
access card.
• Someone enters a password-protected Wi-Fi network by secretly using another
person’s credentials.
Prevention:
• Never hold the door open for strangers in a secure area.
• Use ID badges and biometric access for entry.
• Monitor security cameras at entry points.
• Enable multi-factor authentication (MFA) for digital access.
Marathi Tip: "Piggybacking म्हणजे अनबिकृत व्यक्ती तुमच्यािरोिर प्रवेश बमळवते, तुम्हाला
न कळत!"
3 Dumpster Diving
Definition:
• Dumpster diving is an attack where hackers search trash bins or discarded materials
to find sensitive information like passwords, bank details, and confidential
documents.
• Many people throw away paper notes, expired access cards, and old hard drives
without destroying them properly.
Example:
• A hacker finds a bank statement in the trash and uses the account details.
• An attacker recovers login credentials from an old hard drive thrown away by a
company.
Prevention:
• Shred paper documents before disposing of them.
• Destroy old hard drives and USBs before discarding them.
• Never write passwords on sticky notes or paper.
• Use password managers to store credentials securely.
Marathi Tip: "Dumpster Diving म्हणजे ट्र ॅ शमध्ये पासवडड शोिणारा हॅकर—कधीही गोपनीय
कागद सरळ किऱ्यात िाकू नका!"
➢ 2.2 Biometric
Definition:
• Biometric authentication is a security method that uses unique physical or behavioral
characteristics to verify an individual's identity.
• It is commonly used in smartphones, offices, banks, and high-security environments to
replace traditional passwords.
Data Capture
Feature Extraction
Data Comparison
Authentication Decision
Diagram Explanation
• Data Capture → The biometric sensor scans and records physical/behavioral traits.
• Feature Extraction → Identifies unique features in the collected data.
• Data Comparison → Compares new data with stored biometric templates.
• Authentication Decision → Grants or denies access based on the match percentage.
Advantages of Biometric
1 High Security & Accuracy – Unique for every individual, reducing fraud.
2 Fast & Convenient – No need for passwords; quick authentication.
3 Prevents Identity Theft – Hard to duplicate or fake.
4️ Long-term Cost Savings – Reduces expenses on ID cards and password resets.
Dis-advantages of Biometric
1 Privacy Concerns & Data Misuse – Biometric data cannot be changed if stolen.
2 Expensive Implementation – High costs for scanners and maintenance.
3 Environmental & Physical Limitations – Dirt, injuries, or noise affect accuracy.
4️ False Acceptance & Rejection Errors – System may fail to recognize authorized users.
Marathi Tip: "Biometric म्हणजे सुरबिततेसाठी तुमच्या शरीराची ओळख पट्वणे—जसे की,
म ं गरमरंि वापरून मोबाईल अनलॉक करणे!"
➢ Types of Biometrics
1. Fingerprint Recognition
How It Works?
1. The fingerprint scanner captures unique ridges and valleys of a finger.
2. It converts the fingerprint into a digital template using algorithms.
3. The system compares the scanned print with stored templates.
4️. If a match is found, access is granted; otherwise, it is denied.
Advantages:
• Fast and reliable authentication (takes less than a second).
• Easy to integrate with mobile devices and attendance systems.
• Requires minimal storage space compared to other biometrics.
• Difficult to guess or duplicate manually.
Limitations:
• Can be bypassed using fake fingerprints (e.g., gummy fingers).
• If fingers are dirty, wet, or injured, scanning fails.
• Not suitable for shared devices (multiple users).
• Not effective for elderly people (finger ridges fade with age).
Examples:
• Smartphones (Fingerprint Unlock)
• Banking (ATM Biometric Authentication)
• Attendance Systems (Offices, Schools)
Marathi Tip: "म ं गरमरंि म्हणजे ओळख पट्वण्याचा जलद आबण सोपा मार्ड—पण बोिं खराब असतील
तर तो सतो!"
2. Handprint Recognition
How It Works?
1. The scanner captures the entire hand shape, vein pattern, and thickness.
2. A 3D digital model of the hand is created.
3. The system compares the handprint with stored biometric data.
4️. If a match is found, authentication is successful.
Advantages:
• More secure than fingerprints (analyzes veins inside the hand).
• Works even if fingerprints are damaged.
• Difficult to duplicate compared to fingerprints.
• Useful in high-security access systems.
Limitations:
• Requires larger storage space due to 3D modeling.
• Hand size changes over time (not suitable for children).
• Scanners are costly and bulky.
• Takes longer to process compared to fingerprints.
Examples:
• High-security offices & laboratories
• Factories for worker attendance
Marathi Tip: "Handprint म्हणजे ब ां र्रबप्रांट्पेिा मोठा डे ट्ा, पण अबिक सुरबित पद्धत!"
3. Retina Scan
How It Works?
1. The user looks into an infrared scanner.
2. The scanner detects unique blood vessel patterns in the retina.
3. It compares this pattern with stored templates.
4️. If a match is found, access is granted.
Advantages:
• Most accurate biometric method (retina patterns never change).
• Impossible to fake or duplicate.
• Works even in low light conditions.
• Highly useful for military and high-security areas.
Limitations:
• Expensive hardware required.
• Requires close proximity scanning, causing user discomfort.
• Can fail due to eye diseases (e.g., cataracts).
• Not suitable for mass authentication (slow process).
Examples:
• Military defense access
• Bank vaults, secret research labs
Marathi Tip: "Retina Scan म्हणजे **र्ोळ्याच्या रक्तवामहन्या स्कॅन करून ओळख पिवणे—सवाड त अिूक,
पण महागर्े !"
4. Pattern Recognition (Facial & Vein Recognition) (Fakt read kara , never asked yet)
How It Works?
1. AI-based software captures facial features, vein structures, or body posture.
2. The system creates a digital facial map or vein pattern.
3. It matches this pattern with stored biometric data.
4️. If the face or vein pattern matches, authentication is successful.
Advantages:
• Contactless authentication (no need to touch devices).
• Can work in low-light conditions using infrared cameras.
• Fast and convenient for user authentication.
• Used in public security and surveillance.
Limitations:
• Facial changes (beard, makeup, aging) may reduce accuracy.
• Can be fooled by high-resolution photos or deepfake AI.
• Less secure than fingerprint or retina scans.
• Privacy concerns (face data stored in databases).
Examples:
• Smartphone Face Unlock (iPhone Face ID, Android Face Recognition)
• AI-based surveillance in malls, stadiums, and airports
Marathi Tip: "Pattern Recognition म्हणजे चेहऱ्याच्या बकांवा शरीराच्या वैबशष्ट्ाांवर आिाररत
ओळख!"
Advantages:
• Hands-free authentication (remote access possible).
• No extra hardware needed (microphone is enough).
• Useful for visually impaired users.
• Works in telephonic banking systems.
Limitations:
• Background noise can reduce accuracy.
• Cannot recognize voices during throat infections.
• Easily recorded and replayed by hackers.
• Not suitable for noisy environments.
Examples:
• Phone banking authentication
• Voice assistants like Siri, Alexa, Google Assistant
Marathi Tip: "Voice Pattern म्हणजे िोलण्याच्या लकिी ओळखून प्रवेश दे णे!"
6. Signature & Writing Pattern Recognition (Fakt read kara , never asked yet)
How It Works?
1. The system captures the user’s handwriting movements.
2. It analyzes writing speed, pressure, and angles.
3. The system compares the signature with stored biometric data.
4️. If a match is found, authentication is granted.
Advantages:
• Can be used for legal verification.
• More secure than a simple signature match.
• Difficult to replicate by human forgers.
• Useful for digital contracts.
Limitations:
• Handwriting changes over time.
• Less accurate than fingerprint or retina scans.
• Can be forged with practice.
• Not suitable for fast authentication.
Examples:
• Bank cheque verification
• Legal document signing (e-signatures)
Marathi Tip: "Signature pattern म्हणजे हस्तािराची बवबशष्ट लकि ओळखून ओळख पट्वणे—जसे
की, बँकेत िेकवर तुमिी सही खरी आहे का हे तपासणे!"
7. Keystroke Recognition
How It Works?
1. Records the user’s typing rhythm, key pressure, and typing speed.
2. Stores the unique pattern as a biometric template.
3. During login, it compares the typing pattern with stored data.
4️. If the pattern matches, authentication is successful.
Advantages:
• Continuous authentication (can detect unauthorized users over time).
• No additional hardware required.
• Can detect fraudulent activities.
• Useful for online banking security.
Limitations:
• Typing styles change over time.
• Slower compared to fingerprints.
• Difficult to implement on shared computers.
Examples:
• Fraud detection in online banking
• Cybersecurity systems
Marathi Tip: "Keystroke म्हणजे ट्ाइबपांर्च्या वेर्ावर आबण पद्धतीवर आिाररत ओळख—जसे की,
Example:
• A student cannot access the university's admin dashboard.
• A cashier can access sales data but not employee salaries.
Marathi Tip: "Access Control म्हणजे कोणाला कोणता प्रवेश द्यायचा हे ठरवणे—जसे की,
मवद्यार्थ्ाडला मरन्सिपलच्या ऑम समध्ये रवेश नाही!"
Example:
• Entering a password before accessing an email account.
• Fingerprint scanning before unlocking a smartphone.
Types of Authentication:
• Something You Know → Passwords, PIN codes.
• Something You Have → Smart card, OTP (One-Time Password).
• Something You Are → Biometrics (fingerprint, retina scan).
Marathi Tip: "Authentication म्हणजे तुमची ओळख पट्वणे—जसे की, ATM वापरताना
पासवर्ड िाकणे!"
Example:
• A student can view exam results but cannot modify them.
• An HR manager can access employee salary records, but a regular employee cannot.
Marathi Tip: "Authorization म्हणजे परवानर्ी दे णे—जसे की, मसक्युररिी गार्ड ला मबन्सडंगमध्ये
रवेश आहे पण बॉसच्या केमबनमध्ये नाही!"
Definition:
• Audit is the process of systematically reviewing and examining security logs, user
activities, and system operations to ensure compliance with security policies and
detect unauthorized access or threats.
• It helps in identifying vulnerabilities, tracking suspicious activities, and ensuring
data integrity.
Purpose of an Audit:
• Ensures system security and compliance with policies.
• Detects unauthorized access and security breaches.
• Identifies weaknesses in the system that need improvement.
• Prevents fraud and cyberattacks by monitoring user behavior.
Example:
• A bank audits its customer transactions to detect unauthorized money transfers.
• A company reviews employee login records to identify unusual login attempts.
Marathi Tip: "Audit म्हणजे सुरिा व्यवस्थेची चौकशी आबण तपासणी—जसे की, बँकेतील
व्यवहार तपासून सवणूक शोधणे!"
➢ Policies in Security
• In security, access control defines who can access data, systems, and resources. The
three major access control models are:
These models help organizations secure sensitive data and prevent unauthorized access.
Features:
• User-based access control → The owner grants or revokes access.
• Access Control Lists (ACLs) → Defines who can read, write, or execute files.
• Flexible permissions → Users can easily change access rights.
• Low security → Users can mistakenly grant access to unauthorized persons.
• Common in operating systems → Used in Windows and Linux file permissions.
• Prone to malware risks → If a user account is hacked, attackers can modify
permissions.
Example:
• In Windows, the file owner can allow or deny access to other users.
• In Linux, the chmod command is used to set file permissions.
Marathi Tip: "DAC म्हणजे मालकाच्या मजीवर प्रवेश अबिकार—जसे की, तुमच्या
मोबाईलमधील ोडर कोणाला द्यायिा हा मनणडय तुम्ही घेता!"
Features:
• System-enforced security → Users cannot modify permissions.
• Used in classified environments → Government, military, and banking systems.
• Security labels are assigned → Example: "Top Secret," "Confidential," "Public."
• Highly secure → Prevents unauthorized access and reduces hacking risks.
• Prevents data leakage → Only specific users can access sensitive data.
• Complex to manage → Requires administrators to define policies.
Example:
• Military security systems → Only high-clearance officers can access confidential
files.
• Bank databases → Customers can see their account details but cannot access other
accounts.
Marathi Tip: "MAC म्हणजे सांर्णकाच्या बनयमाांवर आिाररत प्रवेश बनयांत्रण—जसे की,
बँकेच्या मसस्टममध्ये ग्राहक क्त स्वतः िे खाते पाहू शकतो!"
3 Role-Based Access Control (RBAC) (Fakt read kara , never asked yet)
Definition:
• RBAC assigns access permissions based on user roles instead of individual users.
• Users are assigned roles like Admin, Manager, Employee, Guest, etc., and they get
permissions based on their role.
• It is widely used in large organizations to simplify security management.
Features:
• Role-based security model → Users cannot modify their own permissions.
• Easier to manage in large organizations → No need to assign permissions to each
user.
• More secure than DAC → Users only get access relevant to their job.
• Prevents privilege misuse → Employees cannot access unnecessary data.
• Reduces administrative workload → Administrators only manage roles, not
individual users.
• Supports least privilege principle → Users get only necessary access to perform
tasks.
Example:
• In a company:
o HR Managers can access employee records.
o Finance Team can access salary details.
o Employees can access their own profiles but not others' data.
• In a hospital:
o Doctors can access patient records.
o Receptionists can only check appointment details.
Marathi Tip: "RBAC म्हणजे भूबमकेवर आिाररत प्रवेश बनयांत्रण—जसे की, हॉन्सििलमध्ये
र्ॉक्टरांना ररपोिटड स पाहता येतात, पण ररसेप्शमनस्टला नाही!"
❖ Summer 2022
1. Explain the terms : (2marks)
(i) Shoulder surfing
(ii) Piggybacking
2. Explain the mechanism of fingerprint & voice pattern in Biometrics. (4marks)
3. Describe the features of DAC access control policy. (4marks)
4. Define access control & explain authentication mechanism for access control. (4marks)
❖ Winter 2022
1. Explain shoulder surfing attack. (2marks)
2. Explain working of biometric access control with any type of example. (4marks)
3. Explain the term Authorization and Authentication with respect to security. (4marks)
4. Write short note on DAC & MAC. (4marks)
❖ Summer 2023
1. Identify any four individual user responsibilities in computer security. (2marks)
2. Define following with suitable example : (4marks)
(i) DAC
(ii) MAC
3. Describe piggy backing and shoulder surfing. (4marks)
4. Describe any four password selection criteria. (4marks)
❖ Winter 2023
1. List any four biometric mechanisms. (2marks)
2. Explain any two password attacks. (4marks)
3. Describe : (4marks)
(i) Piggybacking
(ii) Dumpster diving.
4. State the features of (4marks)
(i) DAC
(ii) MAC.
❖ Summer 2024
1. State any four advantages of Biometrics. (2marks)
2. Enlist types of Biometrics & explain any one Biometrics type in detail. (4marks)
3. Define the following terms : (4marks)
(i) Authentication
(ii) Authorization
4. Explain working of fingerprint mechanism and its limitations. (4marks)
❖ Winter 2024
1. Describe the dumster diving with its prevention mechanism. (4marks)
2. Define password selection strategies. (4marks)
3. Describe the following term w.r.t. biometric. (6marks)
i Finger Print Analysis
ii Retina Scan
iii Keystroke