Computer System Security (Full PDF
Computer System Security (Full PDF
UNIT ,
Introduction
CON TEN TS
Part-1 Introduction, What is .......:.... ,.................. 1-2W to 1-9W
Computer Security and
What to learn ?
~!"-
J, .__ ·
i,_,•,,j,-,;~ '-I PART- 1 1-~ ..'' •
"I~(ro\J:~cr/.01;;,Vf!if'.f} s Cf?mputer Securit;·~nd W,hat to Learn L
' ....- - - - - - - - ' · ;
Questions'-An~~ers · .
~sw~r L1
1. Computer security is the protection of information systems from theft
or damage to the hardware, software and to the information on them.
2. It includes controlling physical access to the hardware, as well as
protecting against harm that may come via network access, data and
code injection, and due to malpractice by operators.
We can design the policies for information security within an organization by
providing:
1. Confidentiality: Only authorized users can access the data resources
and information.
2. Integrity : Only authorized users should be able to modify the data
when needed.
3. Availability: Data should be available to users when needed.
4. Authentication : Communicating with the authorized.
Answer·· I
Computer security has three main goals :
1. Confidentiality: Making sure people cannot acquire information they
should not (keeping secrets).
2. Integrity: Making sure people cannot change information they should
not (protecting data).
3. Availability: Making sure people cannot stop the computer from doing
its job.
c. This might slow down the processing speed of our computer, delete
important files and access personal information.
3. Install anti-spyware software :
a. Spyware is a software program that collects personal information
or information about an organization without their approval.
b. This information is redirected to a third party website.
c. Anti-Spyware software is solely dedicated to combat spyware.
d. Anti-spyware software offers real time protection.
e. It scans all the incoming information and helps in blocking the
threat once detected.
4. Use complex and secure passwords :
a. For maintaining system security we have to use strong and complex
passwords.
b. Complex passwords are difficult for the hackers to find.
5. Check on the security settings of the browser :
a Browsers have various security and privacy settings that we should
review and set to the level we desire.
b. Recent browsers give us ability to tell websites to not track our
movements, increasing our privacy and security.
~Q-_
-!1-~-1-_~7-:--1 What are the advantages and disadvantages of computer
security?
Que 1.8. IWrite short note on security policy used for computer
systems.
Answer ~
General policies :
1. This is the policy which defines the rights of the staff and access level to
the systems.
2. It is included even in the communication protocol as a preventive measure
in case there are any disasters.
Server policies :
1. This defines who should have access to the specific server and with
what rights.
2. It also includes which software's should be installed, level of access to
internet, how they should be updated.
Firewall access and configuration policies :
1. It defines who should have access to the firewall and what type of
access, like monitoring, rules change.
2. It also includes which ports and services should be allowed.
Backup policies :
1. It defines who is the responsible person for backup, what should be the
backup, where it should be backed up, how long it should be kept and
the frequency of the backup.
VPN policies :
1. These policies generally go with the firewall policy, it defines those
users who should have a VPN access and with what rights.
2. For site-to-site connections with partners, it defines the access level of
the partner to our network, type of encryption to be set.
Discuss different security models in details.
Ans_we!' J
Advantages :
1. It simple and easy to implement.
2. It provides a number of different policies that can be selected based on
need.
Disadvantages :
1. The model does nothing to enforce confidentiality.
2. The Biba model does not support the granting and revocation of
authorization.
3. To use this model all computers in the system must support the labeling
of integrity for both subjects and objects. So there are problems with
using the Biba model in a network environment .
Answer
""'
Security mechanisms used to provide security in computer system
are:
1. Encipherment :
a. Encipherment is an algorithm used for performing encryption or
decryption by converting information from plaintext to ciphertext.
b. Cryptography and steganography are used for enciphering.
2. Data integrity :
a. Data integrity is the maintenance and the assurance of the accuracy
of the data over its entire life-cycle.
b. Data integrity is preserved by comparing check value received to
the check value generated.
3. Digital signature :
a. A digital signature is a means by which the sender can electronically
sign the data and the receiver can electronically verify the signature.
b. Public and private keys can be used.
4. Authentication exchange : In authentication exchange, two entities
exchange some messages to prove their identity to each other.
5. Traffic padding: Traffic padding means inserting some fake data into
the data traffic to prevent the unauthorized attempt to use the traffic
analysis.
6. Routing control : Routing control means selecting and continuously
changing different available routes between sender and receiver to
prevent the opponent from eavesdropping on a particular route.
7. N otarization:
a. Notarization means selecting a third trusted party to control the
communication between two entities.
b. The receiver can involve a trusted third party to store the sender
request in order to prevent the sender from later denying that they
m11de a request.
I
Que 1.12. What are the components of security policy ?
;Answer
Following are the components of security policy :
1. Training: A strong training program that is contextually appropriate
for each position gives staff members the knowledge they need to
understand and properly respond to cyber threats.
2. Passwords : Strong passwords is a line of defense - especially when
hackers are trying to force their way into your network.
Computer System Security 1-9 W (CC-Sem-3 & 4)
3. Mobile devices :
a. Many companies have Bring Your Own Devices (BYOD) policies to
manage and track the mobile devices brought in by employees.
b. These policies set expectations for which devices employees can
use the security these devices require, and how the data on these
devices will be managed.
4. Internet use :
a. Certain types of internet usage can put our organization at a higher
cyber security risk.
b. To prevent this risk, write clear policies that define how employees
may use the internet, what types of content should be avoided, and
what devices should be used to do so.
5. Social media :
a. Hackers can leverage social media to distribute malware and gain
access to user accounts.
b. In particular, the messenger functionality associated with many of
these networking sites provides a convenient way for attackers to
send compromised files or misleading messages.
T-2 ,-,;,,/' - ,
,---,-,,,,---,
<"""
-,-,-
· ~::~~ 0~' ,)::~
ee};or
''<:- _·,,,..
Vuln,e'rab
-,
··· , or
.,:~,..... ,.<
I
1.,15. Differentiate between active and passive attack.
1-12 W (CC-Sem-3 & 4) Introduction
Answer
.B asis.for ,, Active attack " . P assive attack
' comparison . <
.. f
'
I
Qu~ 1.J6~. Write a short note on marketplace for vulnerabilities.
~swer ,, I
1. Vulnerable consumers fail to understand their preferences and lack the
knowledge, skills, or freedom to act on them.
2. To protect them, we can censor information, restrict choices, and
mandate behaviors.
3. One-fifth of the public is functionally illiterate and substantial majority
of consume~s (adolescents included) appear to be marketplace literate.
4. Rather than curtail consumer prerogatives to protect a vulnerable
minority, education reform focused on the values, knowledge, and skills
necessary to create and navigate responsive markets should be
developed.
5. Reformed adult and adolescent education can refine, expand, and
accelerate learner's informal and experiential understanding of
marketplace fundamentals.
6. The aim is to significantly replace trial and error with a robust
understanding of markets, markets habitually governed by social virtues.
, 1
Computer System Security l-13W(CC-Sem-3 &4)
7. Evidence suggests that these aims can be better achieved via adolescent
choice and should be the focus of adult basic education reform.
4. Hackers are creating a kind Trojan file, and android apk files. The apk
files that will be distributed all over the internet. Those who download
this file will be hacked easily.
5. Potential cyber attacks that is most common in error 404 hacking :
a. Web application attacks :
i. A web application is a client-server computer program which
uses web browsers and web technology to allow its visitors to
store and retrieve data to/from the database over the internet.
ii. If there is flaw in the web application, it allows the attacker to
manipulate data using SQL injection attack.
b. N etwork security attacks :
1. Network security attacks are unauthorized actions against
private, corporate or governmental IT assets in order to destroy
them; modify them or steal sensitive data.
11. As more enterprises invite employees to access data from
mobile devices, networks become vulnerable to data theft or
total destruction of the data or network.
c. Mobile security attacks :
1. Mobile security, or mobile device security, has become
increasingly important in mobile computing.
11. The security of personal and business information now stored
on smartphones.
iii. More and more users and businesses use smartphones to
communicate, but also to plan and organize their users' work
and also private life.
1v. Within companies, these technologies are causing profound
changes in the organization of information systems and
therefore they have become the source of new risks.
v. Indeed, smartphones collect and compile an increasing amount
of sensitive information to which access must be controlled to
protect the privacy of the user and the intellectual property of
the company.
Answer ,, i
Buffer overflow attack can be prevented using :
1. Address Space Randomization (ASLR) :
a. It randomly moves around the address space locations of data
regions.
b. Buffer overflow attacks need to know the locality of executable
code, and randomizing address spaces makes this virtually
impossible.
2. Data execution prevention :
a. It flags certain areas of memory as non-executable or executable,
which stops an attack from running code in a non-executable region.
3. Structured Exception Handler Overwrite Protection (SEHOP) :
a. It helps to stop malicious code from attacking Structured Exception
Handling (SEH), a built-in system for managing hardware and
software exceptions.
b. It prevents an attacker from being able to make use of the SEH
overwrite exploitation technique.
c. At a functional level, an SEH overwrite is achieved using a stack-
based buffer overflow to overwrite an exception registration record,
stored on a thread's stack.
l
Que l,.22\ Explain integer overflow attack.
.~~~.erh I
1. An integer overflow attack occurs when an attacker causes a value in
the program to be large enough to overflow unexpectedly.
2. A common form of this attack is to cause a buffer to be allocated that is
too small to hold data copied into it later, thus enabling a buffer overflow
attack.
3. We, are able to detect buffer overflow attacks in the same way as a
normal buffer overflow attack.
4. An integer overflow is the condition that occurs when the result of an
arithmetic operation, such as multiplication or addition, exceeds the
maximum size of the integer types used to store it.
Computer System Security 1-17W(CC-Sem-3&4)
,~sw~r ,l
1. A format string vulnerability is a bug where user input is passed as the
format argument to printf, scanf, or another function in that family.
2. The format argument has many different specifies which could allow an
attacker to leak data if they control the format argument to printf. Since
printf and scanf are variadic functions, they will continue popping data
off of the stack according to the format.
3. For example, if we can make the format argument "%x.%x.%x.%x",
printf will pop off four stack values and print them in hexadecimal,
potentially leaking sensitive information.
4. Printf can also index to an arbitrary "argument" with the following
syntax: "%n$x" (where n is the decimal index of the argument we want).
.· ~. . \ ,
.:'{f
'
PART-4 I..;,.•~·,,:~
• ' ' <'
ILocal Icanary I sfp I ret II~ ILocal jcanaryl sfp I ret II str I ::~f
friilk1ffl
Computer System Security 1-19 W (CC-Sem-3 & 4)
a. Random canary :
i. In random canary, random string is chosen at program startup.
u. Insert canary string into every stack frame.
iii. Verify canary before returning from function :
a. Exit program if canary changed.
b. Turns potential exploit into DoS.
iv. To corrupt, attacker must learn current random string.
b. Terminator canary :
1. String functions will not copy beyond terminator.
ii. Attacker cannot use string functions to corrupt stack.
iii. Heap protection :
a It protects function pointers and setjump buffers by encrypting
them.
b. It has less effective and more noticeable performance effects.
1
,Clue 1.27.. Explain heap spray attack with its techniques ?
Object T
'. fl!·'.1:¥7·~ '.
d After overflow of buf (buffer).
bufl256J
f,1,1,:;;.· 1,217'_:e ,f
e. Here, attacker does not know where browser places shell code on the
heap.
1-20W(CC-Sem-3&4) Introduction
buf1256]
CON TEN TS ·
Part-1 Confidentia~ty Polii:Jes, .. :.......... ...•.....:... 2-2W' to 2-6W
Confinement Principle ·
Part-2 Detour Unix U~~i- ID~ Process ... ,:........ , 2-6W to 2-l0W
IDs and Privil~ges, More•on
Gonfinement ··r~c~iqu~s, sy~t~m ·
Call foterposition; lj:J"I"Qr 404 Digital
•. · Hacking jn Indii1 Par.t C,:hast3, .'./,
0 ; ,., • ', ' :, . N
2-1 W(CC-Sem-3&4)
2-2 W (CC-Sem-3 & 4) Confidentiality Policies
* -.
,,., ,.,, · I I
( , 'J <
PART-1
'";, • . 0 · . F . •.z :'<,. • • .• • •• •
'ti,~~j]J{f,dentiality,Policies:·Confinement frinciple.
· Questio~s-Answers .
:~"!er . j
Issues with Bell-LaPadula model :
1. The transfer of information from a high-sensitivity document to
lower-sensitivity document may happen in the Bell-LaPadula model via
the concept of trusted subjects.
2. Trusted subjects are not restricted by the property.
3. This model only addresses confidentiality, control of writing (one form
of integrity).
4. Covert channels such as Trojan horses and requesting system resources
to learn about other users that are mentioned but are not addressed
comprehensively
5. The tranquility principle of the Bell-LaPadula model states that the
classification of a subject or object does not change while it is being
referenced.
6. This principle limits its applicability to systems where security levels do
not change dynamically.
Computer System Security
2-3 W (CC-Sem-3 &4)
·I
Que 2.3,. · Explain Discretionary Access Control (DAC).
,M~"<Ver ·)
L Discretionary access control (DAC) is a type of security access control
that grants or restricts object access via an access policy determined by
an object's owner group and/or subjects.
2. DAC mechanism controls are defined by user identification with supplied
credentials during authentication, such as username and password.
3. In DAC, each system object has an owner, and each initial object owner
is the subject that causes its creation.
4. DACs are discretionary because the subject (owner) can transfer
authenticated objects or information access to other users. In other
words, the owner determines object access privileges .
.Que 2~4. ,] Explain the issues related with DAC.
:4sw~~ . J
Issues related with DAC are :
L Difficult to enforce a system-wide security policy i.e., a user can leak
classified documents to an unclassified user.
2. Only support coarse-grained privileges i.e., CGA is the top-level
authorization decision that is made at the perimeter of a system. This
decision will be based upon the requested resource and action being tied
to the user.
3. Unbounded privilege escalation.
4. Only based on users identity and ownership, ignoring security relevant
information such as :
a. Users role
b. Function of the program
c. Trustworthiness of the program :
i. Compromised program can change access to the user object.
ii. Compromised program inherit all the permission granted to the
user.
d Sensitivity of the data
e. Integrity of the data
this relation and any attribute can be accessed using this key or
value.
~µe ~:!~· ·I What are the advantage and disadvantages of DAC and
MAC?
'Ahs"'.;~r· ·J
Advantages of Discretionary Access Control (DAC) :
a. Intuitive
b. Easy to implement
Disadvantages of Discretionary Access Control (DAC) :
a. Inherent vulnerability
b. Maintenance of ACL (Access Control List) of capability lists
c. Maintenance of.Grant/Revoke.
d. Limited power of negative authorized.
Advantages of Mandatory Access Control (MAC) :
a. Ensure a high degree of protection; prevent any illegal flow of
information.
b. Suitable for military and high security types of applications.
Disadvantages of Mandatory Access Control (MAC) :
a. Require strict classification of subjects and objects.
b. Applicable to few environments.
;'bie ,2,8;,··1 Differentiate between DAC and MAC.
.:~ ,~:;t;l~:
1. The confinement principle is the principle of preventing a server from
leaking information that the user of the service considers confidential.
2. The confinement principle deals with preventing a process from taking
disallowed act ions.
3. Consider a client/server situation: the client sends a data request to the
server; the server uses the data, performs some function, and sends the
results (data) back to the client.
4. In confinement principle, access control affects the function of the server
in two ways:
a. Goal of service provider : The server must ensure that the
resources it accesses on behalf of the client include only those
resources that the client is authorized to access.
b. Goal of the service user: The server must ensure that it does not
reveal the client's data to any other entity which is not authorized
to see the client's data.
1. Detolir is defined as few words about Unix user IDs and IDs associated
with Unix processes.
2. Every us2r in Unix like operating system is identified by different integer
numher, this unique number is called as Usei::ID.
3. There are three types of UID defined for a process, which can be
dynamically changed as per the privilege of task.
4. The three different types of UIDs defined are :
Computer System Security 2-7W (CC-Sem-3 &4)
Answer
Every file and directory in our UNIX/Linux system has following three
permissions :
1. Read : This permission gives us the authority to open and read a file.
Read permission on a directory gives us the ability to lists it's content.
2. Write:
a. The write permission gives us the authority to modify the contents
ofa file.
b. The write permission on a directory gives us the authority to add,
remove and rename files stored in the directory.
3. Execute:
a. In Windows, an executable program usually has an extension" .exe"
and which we can easily run.
b. In Unix/Linux, we cannot run a program unless the execute
permission is set.
c. If the execute permission is not set, we might still be able to see/
modify the program code (provided read & write permissions are
set), but not run it.
':~~;;;2if Define SUID, SGID and sticky bits with basic difference.
2-8W(CC-Sem-3 &4) Confidentiality Policies
'~S}Ver '. ,, I
1. There are three special permissions that are available for executable
files and directories.
2. These permissions allow the file being executed to be executed with
the privileges of the owner or the group. These are :
a. SUID permission :
i. SUID is set user identification. SUID is a special permission
assigned to a file .
n. These permissions allow the file being executed to be executed
with the privileges of the owner.
b. SGID permission :
i. SGID is set group identification.
ii. When the Set Group ID bit is set, the executable is run with
the authority of the group.
c. Sticky bit: When the sticky bit is set on a directory, only the root
user, the owner of the directory, and the owner of a file can
remove files within the directory.
Difference :
Aiis~er
~t...,).J.,.¼1/";;«<, . A:,
"
'I
2-9W (CC-Sem-3 &4)
Computer System Security
d. We then use the chroot system call to change the root directory to
be at the base of this new tree and start the process running in that
chrooted environment.
e. Since it cannot actually reference paths outside the modified root,
it cannot maliciously read or write to those locations.
2. Jailkits:
a. Jailkit is a set of utilities to limit user accounts to specific files using
chroot() or specific commands.
b. Setting up a chroot shell, a shell is limited to some specific command
and can be automated using theRe utilities.
c. Jailk.it is a specialized tool that is developed with a focus on security.
d It will abort in a secure way if the configuration is not secure, and
it will send useful log messages that explain what is wrong to system
log.
e. Jailk.it is known to be used in network security appliances.
3. FreeBSD jail :
a. FreeBSD is a popular free and open source operating system that is
based on the Berkeley Software Distribution (BSD) version of the
Unix operating system.
b. It runs on processors such as the Pentium that are compatible with
Intel'sx86.
c. FreeBSD is an alternative to Linux that will run Linux applications.
d The jail mechanism is an implementation of FreeBSD's OS-level
virtualization that allows system administrators to partition a
FreeBSD-derived computer system into several independent mini-
systems called jails, all sharing the same kernel, with very little
overhead.
e. The need for the FreeBSD jails came from a small shared-
environment hosting provider's desire to establish a clean, clear-
cut separation between their own services and those of their
customers, mainly for security and ease of administration.
4. System call interposition :
a. System call interposition is a powerful technique for regulating and
monitoring program behaviours.
b. It gives security systems the ability to monitor all of the application's
interaction with network, file system and other sensitive system
resources.
ic9,~.~-:~.i4J Explain error 404 digital backing in India part 2 chase.
.: 'eI''-.,·'"I
i~ "w
l n:uS
.,.-~-~:."'S.V•'-; ~- \ ,.,
1. In error 404 digital hacking in India part 2 chase experts discuss about
some attack related to cyber attack and the attacker can control the
overall system if proper security is not provided to the system.
2. Some attacks discuss in error 404 digital hacking India part 2 chase are :
2-l0W(CC-Sem-3 &4) Confidentiality Policies
a. Israel's power grid hit by a big hack attack. It is one of the worst
cyber attacks ever.
b. In 2014 a hydropower plant in upstate New York got h acked.
c. Iran's infrastructure including its main nuclear power plant is being
targeted by a new and dangerous powerful cyber worm.
d Bangladesh best group hacked into nearly 20,000 Indian website
-including the Indian Border Security Force.
e. First virus that could crash power grid or destroy pipeline is available
online for anyone to download and tinker with.
f. India's biggest data breach when the SBI debit card branch happens.
When this happened bank where initially in a state of denial but
subsequently they had to own up cyber security breach that took
place in Indian history.
Answer
1. A VM is an isolated environment with access to a subset of physical
resources of the computer system.
2. Each VM appears to be running on the bare hardware, giving the
appearance of multiple instances of the same computer, though all are
supported by a single physical system.
3. A process VM is a virtual platform created for an individual process and
destroyed once the process terminates.
4. Virtually all operating systems provide a process VM for each one of the
applications running, but the more interesting process VMs are those
which support binaries compiled on a different instruction set.
5. A system VM supports an OS together with many user processes. When
the VM runs under the control of a normal OS and provides a platform-
independent host for a single application we have an application VM, for
example, Java Virtual Machine (JVM).
·Que 2.16. 1 Explain confinement principles with its techniques.
Computer System Security 2-11 W (CC-Sem-3 & 4)
Answer .J
Confinement principle: Refer Q. 2.9, Page 2-6W, Unit-2.
Confinement principles techniques: Refer Q. 2.13, Page 2-8W, Unit-2.
j
"Que ~ -} 7. Describe the types ofVM based isolation.
··Answer
Following are the types of Virtual Machine based isolation :
a. Process virtual machines :
1. Process virtual machines support individual processes or a group of
processes and enforce isolation between the processes and operating
system environment.
2. Process virtual machines can run processes compiled for the same
Instruction Set Architecture based (ISA) or for a different ISA as
long as the virtual machine runtime supports the translation.
3. Isolation policies are provided by a runtime component which runs
the processes under its control.
4. Isolation is guaranteed because the virtual machine runtime does
not allow direct access to the resources.
b. System virtual machines (Hypervisor virtual machines):
1. System virtual machines provide a full replica of the underlying
platform and thus enable complete operating systems to be run
within it.
2. The virtual machine monitor (also called the hypervisor) runs at
the highest privilege level and divides the platforms hardware
resources amongst multiple replicated guest systems.
3. All accesses by the guest systems to the underlying hardware
resources are then mediated by the virtual machine monitor.
4. This mediation provides the necessary isolation between the virtual
machines.
5. System virtual machines can be implemented in a pure-isolation
mode in which the virtual systems do not share any resources
between themselves or in a sharing-mode in which the VM Monitor
multiplexes resources between the machines.
6. Pure-isolation mode virtual machines are as good as separate
physical machines.
c. Hosted virtual machines :
1. Hosted Virtual Machines are built on top of an existing operating
system called the host. 1
I
2-12 W (CC-Sem-3 & 4) Confidentiality Policies
Answer
. -
1. A rootkit is a computer program designed to provide continued privileged
access to a computer while actively hiding its presence.
2. Rootkit is a collection of tools that enabled administrator-level access to
a computer or network.
3. Root refers to the Admin account on Unix and Linux systems, and kit
refers to the software components that implement the tool.
4. RootKits he generally associated with malware such as Trojans, worms,
viruses that conceal their existence and actions from users and other
system processes.
5. A rootkit allows us to maintain command and control over a computer
without the computer user/owner knowing about it.
6.
Once 'a rootkit has been installed, the controller of the rootkit has the
ability to remotely execute files and change system configurations on
the host machine.
A rootkit on an infected computer can also access log files and spy on the
7.
legitimate computer owner's usage. -
I
I
1•,'.
j
Computer System Security 2-13W(CC-Sem-3&4)
Answer j
Following are the various types ofrootk.its :
1. Application rootkits :
a Application rootkits replace legitimate files with infected rootkit
files on our computer.
b. These rootkits infect standard programs like Microsoft Office,
Notepad, or Paint.
c. Attackers can get access to our computer every time we run those
prograins.
d Antivirus programs can easily detect them since they both operate
on the application layer.
2. Kernel rootkits :
a. Attackers use these rootkits to change the functionality of an
operating system by inserting malicious code into it.
b. This gives them the opportunity to easily steal personal information.
3. Bootloader·rootkits:
a. The bootloader mechanism is responsible for loading the operating
system on a computer.
b. These rootkits replace the original bootloader with an infected one.
c. This means that bootloader rootkits are active even before the
operating system is fully loaded.
4. Hardware and firmware rootkits :
2--14 W (CC-Sem-3 & 4) Confidentiality Policies
Answer -
1. An Intr_u sion Detection System (IDS) is a network security technology
originally built for detecting vulnerability exploits against a target
application or computer.
2. Intrusion Prevention Systems (IPS) extended IDS solutions by adding
t he ability to block threats in addition to detecting them and has become
the dominant deployment option for IDS/IPS technologies.
3. An IDS needs only to detect threats and as such is placed out-of-band on
the network infrastructure, meaning that it is not in the true real-time
communication path between the sender and receiver of information .
4. IDS solutions will often take advantage of a SPAN (Switched Port
Analyzer) port to analyze a copy of the inline traffic stream
5. The IDS monitors traffic and report its results to an administrator, but
cannot automatically take action to prevent a detected exploit from
taking over the system.
6. Attackers are capable of exploiting vulnerabilities very quickly once
they enter the network, rendering the IDS an inadequate deployment
for prevention device.
Que 2.23. IExplain the types of intrusion detection system.
Answer ·
Following are the types of intrusion detection system :
1. N etwork Intrusion Detection System (N IDS) :
a. It is an independent platform that identifies intrusions by examining
network traffic and monitors multiple hosts.
b. It gains access to network traffic by connecting to a network hub, a
network switch configured for port mirroring, or a network tap.
c. In a NIDS, sensors are placed at choke points in the network to
monitor, often in the Demilitarized Zone (DMZ) or at network
borders.
d. Sensors capture all network traffic and analyze the content of
individual packets for malicious traffic.
e. An example of a NIDS is Snort.
2-16W(CC-Sem-3 &4) Confidentiality Policies
I
'Que 2,26~ What are the features of intrusion detection system ?
~swer --
.I
~.«: ..,.
,:Fig~_~:iiil
1. A packet decoder : It take;" packets from different networks and
prepares them for preprocessing or any further action. It basically
decodes the coming network packets.
2. A preprocessor : It prepares and modifies the data packets and also
performs defragmentation of data packets, decodes the TCP streams.
3. A detection engine : It performs the packet detection on basis of
Snort rules. If any packet matches the rules, appropriate action is
. taken, else it is dropped.
4. Logging and alerting system : The detected packet is either logged
in system files or incase of threats, the system is alerted.
5. Output modules : They control the type of output from the logging
and alert system.
~,e 2~8. IWhat is an intrusion detection system ? What are the
difficulties in anomaly detection ? LAI\TU'2019-20",Marks 10 j
Answer
1. Today in computers and on the internet attack is easier than defense.
There are many reasons for this, but the most important is the complexity
of these systems.
2. Complexity is the worst enemy of security. The more complex a system
is, the less secure it is.
3. A hacker typically targets the "attack surface" of a system. The attack
surface of a system contains all the possible points that a hacker might
target.
4. A complex system means a large attack surface, and that means a huge
advantage for the hacker.
5. The hacker just has to find one vulnerability. He can also attack
constantly until successful.
6. At the same time, the defender has to secure the entire attack surface
from every possible attack all the time.
7. Also the cost to attack a system is only a fraction of the cost to defend it.
8. This is one of the reasons why security is so hard, even though over the
years there is significant improvement in security technologies.
Que 2.30. ·I What is Access Control list (ACL) and also define what
are the technologies used in access control ?
IAKTU 2019-20, Marks 10 I
I
Access control list :
a An access-control list is a list of permissions attached to an object.
b. An ACL specifies which users or system processes are granted access to
objects, as well as what operations are allowed on given objects.
c. Each entry in a typical ACL specifies a subject and an operation.
d An access control list (ACL) is a table that tells a computer operating
system which access rights each user has to a particular system object,
such as a file directory or individual file.
e . Each object has a security attribute that identifies its access control list.
Access control technology includes :
1. Access Technology Architectures :
a Internet of Things (IoT) access control
b. .Physical Access Control System (PACS)
2. Communications technologies :
a Radio Frequency Identification (RFID) access control
b. Near Field Communication (NFC) access control
c. Bluetooth Access Control (BAC) access control
d Wireless access control technology.
3. Authentication technologies :
a Biometric access control technology
b. Smart card access control technology
2-20 W (CC-Sem-3 & 4) Confidentiality Policies
Answer
\,f '. ,·I
= :t;G
Goal and solution :
1. Software Fault Isolation (SFI) is an alternative for unsafe languages,
example C, where memory safety is not granted but needs to be enforced
at runtime by program instrumentation.
2. SFI is a program transformation which confines a software component
to a memory sandbox. This is done by pre-fixing every memory access
with a carefully designed code sequence which efficiently ensures that
the memory access occurs within the sandbox.
SFI approach :
1. Traditionally, the SFI transformation is performed at the binary level
and is followed by an a posteriori verification by a trusted SFI verifier.
2. Because the verifier can assume that the code has undergone the SFI
transformation, it can be kept simple, thereby reducing both verification
time and the Trusted Computing Base.
3. This approach is a simple instance of Proof Carrying Code where the
complier is untrusted and the binary verifier is either trusted or verified.
4. Traditional SFI is well suited for executing binary code from an
untrusted origin.
{
I
J
/
I
I
,1
k
3,
UNIT
Secure Architecture
Principles Isolation
and Leas
CON TEN TS
Par t-1 Access Control Concepts, Unix .............. 3-2W to 3- SW
and Windows .~ccess Qontrol
Summary, Other ,Issues in
Access Contrp l . ·
!>-1 W(CC-Sem-3&4)
3-2W(CC-Sem-3&4) Secure Architecture Principles Isolation & Leas
~.;__._......._...;.;;._~-- ·1
"'""-.,. PART-1 , .
Assess Control Cqncepts: Unix and Windows Access
Contr<>l Summary, Other Issues in Access Control.
• Qu~stfons-Answers
',•
· L,ong An~er
.F >.
Type and.Medium Answer Type Questions
'v • ., , ,,
Answer
Implementation of RBAC :
1. Windows and Linux environments use for implementation process.
2. Each group has individual file permissions and each user is assigned to
groups based on their work role.
3. RBAC assigns access based on roles. This is different from groups since
users can belong to multiple groups but should only be assigned to one
role.
4. _Example roles are: accountants, developer, among others.
Implementation of MAC :
1. Windows Vista-8 used a variant of MAC which is also called Mandatory
Integrity Control (MIC).
2. This type of MAC system added Integrity Levels (IL) to process/files
running in the login session.
3. The IL represented the level of trust the object would have.
4. Subjects were assigned an IL level, which was assigned to their access
token.
5. IL levels in MIC were: low, medium, high, and system.
6. Under this system, access to an object was prohibited unless the user
had the same level of trust, or higher than the object.
7. Windows limited the user to not being able to write or delete files with a
higher IL.
8. It first compared IL levels, then moved on to checking the ACLs to make
sure the correct permissions are in place.
9. This system took advantage of the Windows DAC system ACLs and
combined it with integrity levels to create a MAC environment. /
I
:Q~ e 3,.4;~~,: Briefly explain the uses of access control system.
!.«.Answert ~l
- , ,,....,J
1. Access control system is used to control access into certain areas located
within the interior ofbupdings.
3-4 W (CC-Sem-3 & 4) Secure Architecture Principles Isolation & Leas
I
,Q~e~.;~, · What are the components of access control system?
~ s,lVer :J
Basics components of access control system are :
1. Access cards :
i The access card may be thought of as an electronic key.
ii The access card is used by persons to gain access through the doors
secured by the access control system.
llL Each access card is uniquely encoded. Most access cards are
approximately the same size as a standard credit card, and can
easily be carried in a wallet or purse.
2. Card readers :
i Card readers are the devices used to electronically read the access
card.
11. Card readers may be/of the insertion type (which requires insertion
of the card into the reader).
llL Card readers are usually mounted on the exterior (non-secured)
side of the door that they control.
3. Access control keypads :
i Access control keypads are devices which may be used in addition
to or in place of card readers.
ii The access control keypad has numeric keys which look similar to
the keys on a touch-tone telephone.
iii The access control keypad requires that a person desiring to gain
access must enter a correct numeric code.
1v. When access control keypads are used in addition to card readers,
both a valid card and the correct code must presented before entry
is allowed.
,,'
,,r
L
Computer System Security 3-6 W (CC-Sem-3 &4)
!Ans:wer
Access control principles :
I. Principle of least privilege : It states that if nothing has been
specifically configured for an individual or the groups, he/she belongs to,
the user should not be able to access that resource i.e. , default no access.
3--6 W (CC-Sem-3 & 4) Secure Architecture Principles Isolation & Leas
4. Organized file system: Unix has organized file and directory system
that allows users to organize and maintain files .
5. Device independence: Unix treats input output devices as ordinary
files. The destination of file input and output is easily controlled through
Unix design feature called redirection.
6. Utilities : Unix provides a rich library of utilities that can increase
user's productivity.
Que 3.8. IDifferentiate between Unix and Windows.
Answer ]
,s.,No. Unix '',, Windows
1. It is an open source. It is not open source.
2. It has very high security It has low security system.
system.
3. It is a command based It is a GUI based operating system.
operating system.
4. The file system is arranged The file system is arranged in a
in hierarchical manner. parallel manner.
5. Unix is not user friendly. It is user friendly.
'1·F'~RT-2 1
lri:troduction to"B;owser 1so{ation.
~s~ r .· I
1. Browser isolation is a cyber security model for web browsing that can be
used to physically separate an internet user's browsing activity from
their local machine, network and infrastructure.
2. With this model, individual browser sessions are abstracted away from
hardware and direct internet access, trapping harmful activity inside
the disposable environment.
3. Browser isolation may also be referred to as remote browser isolation,
web isolation or remote browsing.
4. A major weakness in popular security tools is protection from web or
browser-based attacks, malware and ransomware.
5. By separating browsing activity from endpoint hardware, the device's
attack surface is reduced, sensitive data is protected and malware or
other known and unknown security threats are minimized.
6. This is an evolution of the cyber security concepts of security through
physical isolation and air-gapping.
:Que 3.;1,1. IExplain working of browser isolation.
I
.,I
f \
''
ll
'I
'1
\ I~
Computer System Security 3-9 W (CC-Sem-3 & 4)
Answer
1. Browser isolation works by providing users with a disposable, non-
persistent environment for browsing.
2. This can be executed through a variety of methods but involves
virtualization, containerization or cloud browsing.
3. When a user closes the browsing session or the session is timed out, the
isolated environment is reset or discarded.
4. Any malicious code or harmful traffic is discarded as well, preventing it
from ever reaching the endpoint device or network.
5. The browser isolation method treats all websites, files and content equally
by labeling them as untrusted or blacklisted unless otherwise specified.
6. Within the isolated environment, files can be rendered remotely or
sanitized without the need to download them.
7. This is different from other security methods that do not treat information
equally and filter content based on potential threatening signs.
I
Que 3.12. Define browser isolation technology. What are browser
isolation vendors ?
Answer
Browser isolation technology : Browser isolation technology is a
technology delivered to customers through a cloud browser, a container, a
virtual machine or browser isolation technology hosted on a server.
Following are the browser isolation vendors :
L Apozy
ll. Authentic
Ill. Ericom
iv. Menlo security
V. Symantec
VI. WEBGAP
I
Que 3.13. What are the advantages and disadvantages of browser
isolation?
Answer )
Advantages of browser isolation :
1. The primary benefit to browser isolation is reducing the spread of
malware through web browsers.
3-10 W (CC-Sem -3 & 4) Secure Architecture Principles Isolation & Leas
PART -3
Web $ec'lltrity f!efi.niti ons Goals and Threat Models, HTTP
Content Rendering, Browser Isolation.
l
Que 3.14. Define web securit y with its goals.
Answe r
1. Web security is :he process of securing confiden tial data stored online
from unautho rized access and modifica tion.
2. This is accompl ished by enforcin g strict policy measure s.
3. Website s are scanned for any possible vulnerab ilities and malware
through website security software . This software ca,n scan for backdoo r
hacks, redirect hacks, Trojans, and many other threats.
4. A website security software notifies the user if the website has any
issue and provides solution s to address them.
5. It is the cumulat ive phrase for all of the methods and measure that we
can use and enforce to keep the files behind our website and any data of
our custome rs safe.
6. Security should be built into our website from beginnin g, but certain
systf)ms, the likes of WordPr ess, allow us to easily install security
measure s at any time at little or no cost.
7. The goal of web security is to identify the following:
L Critical assets of the organiza tion
n. Genuine users who m&y access the data
111. Level of access provided to each user
iv. Various vulnerab ilities that may exist in the applicat ion
v. Data criticali ty and risk analysis on data exposur e.
vi. Appropr iate remedia tion measure s.
i
l
I
,.,'
Com put er Sys tem Sec urit y 3-1 1 W (CC-Sem-3 & 4)
An swe r, \
1. Thr eat mod ellin g is a pro ced ure for opti miz
ing netw ork sec urit y by
iden tify ing objectives and vuln erab iliti es,
and the n defi ning cou nter
mea sure s to prev ent, or mit igat e the effe cts
of thre ats to the sys tem .
2. In this con text , a thre at is a pote ntia l or
actu al adv erse eve nt tha t may
be malicious (suc h as a denial-of-service atta
ck) or inci den tal (suc h as
the fail ure of a stor age device) , and tha t can
com prom ise the asse ts of
an ente rpri se.
3. The key to thre at modelling is to
dete rmi ne whe re the mos t effo rt
sho uld be app lied to kee p a syst em secu re.
4. Thr eat mod ellin g is an iter ativ e
pro cess tha t con sist s of def inin g
ente rpri se asse ts, identifying wha t eac h app
lica tion doe s wit h resp ect to
thes e asse ts, crea ting a secu rity profile for eac
h app lica tion , iden tify ing
pote ntia l thre ats, prioritizing potential thre ats,
and doc ume ntin g adv erse
eve nts and the acti ons tak en in eac h case.
5. Thr eat mod ellin g is a stru ctur ed app
roac h to iden tify ing, qua ntif yin g,
and add ress ing thre ats.
6. It allows syst em secu rity staf f to com mun
icat e the pot enti al dam age of
secu rity flaws and prio ritiz e rem edia tion effo
rts.
Pur pos e of thr eat mo del ling :
1. The pur pos e of thre at mod ellin g is
to iden tify , com mun icat e, and
und erst and thre ats and miti gati on to the orga
nisa tion 's stak eho lder 's as
earl y as possible.
2. Doc ume ntat ion from this process prov
ides syst em ana lyst and defe nde rs
with a complete ana lysi s of prob able atta cke
r prof ile.
Qu e 3.16 . \ Dis cus s thr eat mo del ling me
tho dol ogi es.
~An swe r ·\
Following are the thre at modelling methodolog
ies :
1. STR IDE : STRIDE is a methodology tha
t pro vide s a mn
secur1·ty threats m· six
• cate gori
es :
· fi
emo mc or
a. Spo ofin g :
An adv ers ~ pos i?g ~ ano ther use r, com
oth er sys tem tha t has an iden tity m the sys pon ent, or
tem bein g mod elle d.
b. Tam per ing : The modifica
. · US al tion of dat a with in the syst em to hi
amallClO go . ac eve
c. Rep udi atio n : The abil ity
. . of an adv ersa ry to den y perfi •
som e m al1c1o us act·1vi·t Ym
. b
a senc e of suff icie nt proof. orm mg
3-12 W (CC-Sem-3 & 4) Secure Archit.ecture Principles Isolation & Leas
r d. Information disclosure : The exposure of protected data to a
user that is not otherwise allowed access to that data.
e. Denial of service : It is an attack where the attackers attempt to
prevent legitimate users from accessing the service.
2. DREAD : DREAD was proposed for threat modelling but due to
inconsistent ratings it was dropped by Microsoft in 2008. It is currently
used by open stack and many other corporations. It provides a mnemonic
for risk rating security threats using five categories :
a. Damage potential : Ranks the extent of damage that would occur
if vulnerability is exploited.
b. Reproducib ility : Ranks how easy it is to reproduce attack.
c. Exploitabil ity : Assigns a number to the effort required to launch
the attack.
r
I
d. Affected users : A value characterizin g how many people will be
impacted if an exploit become widely available.
e. Discoverab ility : Measures the likelihood how easy it is to discover
the threat.
3. PASTA:
i The Process for Attack Simulation and Threat Analysis (PASTA) is
risk-centric methodology.
11. The purpose is to provide a dynamic threat identificatio n,
enumeration , and scoring process.
UL Upon completion of threat model security, subject matter experts
develop a detailed analysis of the identified threats.
1v. Finally, appropriate security controls can be enumerated. This helps
developer to develop a asset-centric mitigation strategy by analyzing
attacker-cen tric view of application.
4. Trike:
L The focus is in using threat models as risk managemen t tool.
n. Threat models are based on requirement model.
m. The requiremen ts model establishes the stakeholder- defined
acceptable level of risk assigned to each asset class.
iv. Analysis of the requirement s model yields a threat model from
which threats are identified and assigned risk values.
v. The completed threat model is used to build a risk model on the
b~is of asset, roles, actions, and calculated risk exposure.
5. VAST:
L VAST is an acronym for Visual, Agile, and Simple Threat modelling.
n. This methodology provides actionable outputs for the unique needs
of various stakeholders like application architects and developers,
cyber security personnel etc.
Computer System Security ~13 W (CC-Sem-3 & 4)
Answer
Tools used for threat modelling :
1. Microsoft's threat modelling tool : This tool identifies threats based
on STRIDE threat classification scheme and it is based on Data Flow
Diagram (DFD).
2. My App security :
a. It offers the first commercially available threat modeling tool i.e.,
Threat Modeler.
b. It uses VAST threat classification scheme and it is based on Process
Flow Diagram (PFD).
3. IriuRisk :
a. It offers both a community and a commercial version of the tool.
b. This tool is primarily userl to create and maintain live threat model
through the entire SDLC.
~14 W (CC-Sem-3 & 4) Secure Archit.ecture Principles Isolation & Leas
Answe r
All threat modelling process start with creating visual representati on of
application or system being analyzed. There are two ways to create visual
representat ion :
a. Visual representa tion using data flow diagram :
1. The Microsoft methodology , PASTA and Trike each develop a visual
representat ion of the application- infrastructu re utilizing data flow
diagrams (DFD).
2. DFDs are used to provide a high-level visualizatio n of how an
application works within a system to move, store, and manipulate
data.
3. ·The concept of trust boundaries was added by security professionals
in an attempt to make them applicable for threat modelling.
4. DFDs are used to identify broad categories usually using STRIDE
threat classificatio n scheme.
5. The list of threats identifies through such methods is limited and
thus a poor starting point for the modelling.
6. DFD based approach uses three main steps :
L View system as an adversary
Computer System Security 3-15 W (CC-Sem-3 & 4)
14. The browser renders the page on the screen according to the DOM
tree and the style information for each node.
15. We see the page on the screen.
List of rendering engines produced by major web browser vendors:
1. Blink : It is used in Google Chrome, and Opera browsers.
2. WebKit : It is used in Safari browsers.
3. Gecko : It is used in Mozilla Firefox browsers.
4. Trident : It is used in Internet Explorer browsers.
5. EdgeHTML : It is used in Edge browsers.
6. Presto : Legacy rendering engine for Opera.
Que 3.20. f Explain browser isolation in detail.
Answer
Refer Q. 3.10, Page 3--8W, Unit-3.
I PART-4 1
Security Interface, Cookies_Frames and Frame Busting, Major
Web -S erver Threats: , . -
, Questions- Answ:ers
I
Que 3.21. Explain security interface framework .
~swer ]
1. The security interface framework is a set of Objective-C classes that
provide user interface elements for programs that implement security
features such as authorizatio n, access to digital certificates, and access
to items in keychains.
2. User Interface (UI) defines the way humans interact with the information
systems.
3. User Interface (UI) is a series of pages, screens, buttons, forms and
other visual elements that are used to interact with the device. Every
app and every website has a user interface.
4. User Interface (UI) design is the creation of gra phi~, illustrations , and
use of photographi c artwork and typography to enhance the display and
layout of a digital product within its various device views.
3-18 W (CC-Sem-3 & 4) Secure Archit.ecture Principles Isolation & Leas
I
Que 8.22. Describe cookies and frame busting.
Answer
Cookies:
1. These are small text files that the web browser stores on the computer.
2. The first time we visit a page on the internet, a new cookie is created,
which collects the information that can be accessed by the website
operator.
3. However, some browsers store all cookies in a single file.
4. The information in this text file is in turn subdivided into attribut.es that
are included individually .
Frame busting :
1. Frame busting refers to code or annotation provided by a web page
intended to prevent the web page from being loaded in a sub-frame.
2. Frame busting is the recommend ed defense against click-jacking and is
also required to secure image-based authenticati on such as the sign-in
seal used by Yahoo.
3. Sign-in seal displays a user-selecte d image that authenticate s the Yahoo
login page to the user.
4. Without frame busting, the correct image is displayed to the user, even
though the top page is not the real Yahoo login page.
5. New advancemen ts in click jacking techniques using drag and drop to
extract and inject data into frames makes frame busting even more
critical.
l
l
,I
•
d
Computer System Security 3-19 W (CC-Sem-3 & 4)
c. Meanw hile, accoun t creden tials, credit card numbe rs and other
person al inform ation can easily be harves ' '
ted by the attacke r.
9. Phish ing attack :
a. Phishin g can be set up to steal user data, such as credit card and
login inform ation.
b. The perpet rator, posing as a trustwo rthy entity, fools their prey
into openin g an email, text memo, or instant messag e.
c. Then attract to click a link that hides a payload .
d Such an action can cause malwa re to be covert installe d.
e. It is also possibl e for ransom ware to freeze the user's PC, or for
sensiti ve data to be passed.
10. Remo te File inclus ion (RFI) :
a Remot e File Inclusi on (RFI) exploit s weakne sses in those web
applica tions that dynami cally call externa l scripts.
b. Taking advant age of that functio n, an RFI attack uploads malwa re
and takes over the system .
11. Using compo nents with known vulner abiliti es: It occurs when
attacke rs are able to take control of and exploit vulnera ble librarie s,
framew orks, and other module s runnin g with full privileg es.
12. Insuff icient loggin g and monit oring :
a Insuffi cient logging and monito ring, allows attacke rs to attack
system s, mainta in persist ence, pivot to more system s, and tamper,
extract , or destroy data.
13. Backd oor attack :
a Being a form of malwa re, a backdo or circum vents login
authen ticatio n to enter a system.
b. Many organiz ations offer employ ees and partner s remote access to
applica tion resourc es, includi ng file servers and databas es.
c. This enable s bad actors to trigger system comma nds in the
compro mised system and keep their malwa re update d.
d The attacke r's files are usually heavily cloaked , making detecti on
problem atic.
PAR T-5 I
Cross Site Reque st Forgery, Cross Site-Sc ripting, Defenses
and Protection Again st XSS, Findin g Vulnerabilities,
- · Secure Development.
~<
I
~
t
l
I
Com puter Syste m Secu rity 3-21 W (CC- Sem- 3 & 4)
I
Que 3.24. Desc ribe cros s-sit e requ est forg ery in deta
ils.
Ans wer
end user to
1. Cross -site reque st forge ry (CSRF) is an attac k that forces an
h they are
exec ute unwa nted actio ns on a web appli catio n in whic
curre ntly authe ntica ted.
not theft of
2. CSRF attac ks specifically targe t state -chan ging reque sts,
the forge d
data, since the attac ker has no wJy to see the respo nse to
reque st.
emai l or
3. With the help of socia l engin eerin g (such as send ing a link via
execu ting
chat) , an attac ker may trick the users of a web appli catio n into
actio ns of the attac ker's choosing.
I
Websi te
visito r ®A visitor clic~
Perpe trator embed s on the link,
the reque st into a inadv ertent ly
hyper link and sends sendin g the
it to visito rs who may reque st to the
be logged into the site Websi te valida tes reque st websi te
and transf ers funds from
the visito rs accou nt to the
perpe trator
Perpe trator I Webs ik I
CD
Perpe trator forges a reque st for
a fund transf er to a websi te
Fig. 8.24. 1.
Answer
We can prevent CSRF attack in two ways :
1. On user side : User side prevention is very inefficient in terms of
j browsing experience, prevention can be done by browsing only a singfe
tab at a time and not using the remember-me functionality.
2. On server side :
J
I
a. There are many proposed ways to implement CSRF protection on
server side, among which the use ofCSRF tokens is most popular.
b. A CSRF token is a string that is tied to a user's session but is not
submitted automatically.
c. A website proceeds only when it receives a valid CSRF token along
with the cookies, since there is no way for an attacker to know a
user specific token, the attacker cannot perform actions on user's
behalf.
I
r
Answer
For a CSRF attack to be possible, three key conditions must be followed :
1. A relevant action :
a. There is an action within the application that the attacker has a
reason to induce.
b. This might be a privileged action (such as modifying permissions
for other u~ers) or any action on user-specific data (such as changing
the user's own password).
2. Cookie-based session handling :
a Performing the action involves issuing one or more HTTP requests,
and the application relies solely on session cookies to identify the
user who has made the requests.
b. There is no other mechanism in place for tracking sessions or
validating user requests.
(
'
J
I
Que ~~1-.,·
::;,~ r. ,{' }"-,· .;:;,.
Write short note on cross-site scripting (XSS).
:~sw~r'
t ( ~- ·1 -/<" _;,.., ]
®
Perpetra tor injects the ~ ® For each visit to the
website with a malicious ~ ~ ~ , 1>,;te, th, maHdou s
script that steal each
\ \cr;pt ;, act;vat, d
visitor's session
cookies
2. Stored XSS :·
a When the respons e contain ing the payload is stored on the server
in such a way that the script gets execute d on every visit withou t
submis sion of payload, then it is identifi ed as stored XSS.
b. An exampl e of stored XSS is :XSS in the comme nt thread.
i
Que~ .29" Write short notes on followi ng :
i. Cross site scripti ng,
ii. Why is HTfPs not used for all web traffic ?
I
Que 3.30. Explain protectio n methods used for CSRF.
Answer
The protection methods used for CSRF are :
. 1. Anti CSRF Token:
a. This is a cryptogra phically strong string that is submitted to the
website separatel y from cookies.
b. This can be sent as a request paramete r or as an HTTP header.
c. The server checks for the presence and correctne ss of this token
when a request is made and proceeds only if the token is correct
and the cookies are valid.
2. HM'P PUT method:
a. The PUT method is used to create instances of a resource on the
server.
b. It is similar to POST except that sending the same PUT requests
multiple times does not do anything extra.
c. If the server is using PUT method for sensitive actions then there
is no need for any additiona l CSRF protection (unless Cross-Ori gin
Resource Sharing is' enabled) at that endpoint.
d It is because the PUT request cannot be duplicate d through a web
page like POST request (HTTP forms dp not allow PUT requests).
3. HTTP bearer authenti cation :
a. This is a type of HTTP authentic ation where the user is identified
through a token that is submitted in authoriza tion header of each
request.
b. This mechanis m solves CSRF because unlike cookies it is not
submitted by the browser automatic ally.
c. There are problems and potential bypasses to each of these methods.
d. Anti CSRF tokens do not have a fixed standard so their generatio n
✓
mechanis m and use depends solely on how developer s intended it
to be.
3-26 W (CC-Sem-3 & 4) Sec~ Architecture Principles Isolation & Leas
~swer, 1
Different ways used to prevent XSS are :
1. Escaping :
a. The first method used to prevent XSS vulnerabilities from appearing
in our applications is by escaping user input.
b. Escaping data means taking the data an application has received
and ensuring it is secure before rendering it for the end user.
c. By escaping user input, key characters in the data received by a
web page will be prevented from being interpreted in any malicious
way.
d In essence, we are censoring the data our web page receives in a
way that will disallow the characters especially <and> characters
from being rendered, which otherwise could cause harm to the
application and/or users.
2. Validating input :
a. Validating input is the process of ensuring an application is rendering
the correct data and preventing malicious data from doing harm to
the site, database, and users.
b. While whitelisting and input validation are more commonly
associated with SQL injection, they can also be used as an additional
method of prevention for XSS.
c. Whereas blacklisting, or disallowing certain, predetermined
characters in user input, disallows only known bad characters,
whitelisting only allows known good characters and is a better
method for preventing XSS attacks as well as others.
d Input validation is especially helpful and good at preventing XSS in
forms, as it prevents a user from adding special characters into the
fields, instead refusing the request.
3. Sanitizing:
a . A third way to prevent cross-site scripting attacks is to sanitize user
input.
b. Sanitizing data is a strong defense, but should not be used alone to
battle XSS attacks.
c. Sanitizing user input is especially helpful on sites that allow HTML
markup, to ensure data received can do no harm to users as well as
our database by scrubbing the data clean of potentially harmful
markup, changing unacceptable user input to an acceptable format.
\
I
Que 3.32. Describe XSS vulnerabilities.
Answer 1
Following are :XSS vulnerabilities :
1. Stored :XSS vulnerabilities :
a. Stored attacks are those where the injected script is permanently
stored on the target servers, such as in a database, in a message
forum, visitor log, comment field, etc.
b. The victim then retrieves the malicious script from the server when
it requests the stored information. Stored XSS is also referred to as
Persistent or Type-I XSS.
2. Reflected XSS vulnerabilities :
a. Reflected attacks are those where the injected script is reflected off
the web server, such as in an error message, search result, or any
other response that includes some or all of the input sent to the
server as part of the request.
b. Reflected attacks are delivered to victims via another route, such
as in an e-mail message, or on some other website.
c. When a user is tricked into clicking on a malicious link, submitting
a specially crafted form the injected code travels to the vulnerable
web site, which reflects the attack back to the user's browser.
d The browser then executes the code because it came from a trusted
server.
e. Reflected XSS is also referred to as Non-Persistent or Type-II XSS.
3. Server-side versus DOM-based vulnerabilities :
a XSS vulnerabilities were first found in applications that performed
all data processing on the server side.
b. User input (including an XSS vector) would be sent to the server,
and then sent back to the user as a web page.
c. The need for an improved user experience resulted in popularity of
applications that had a majority of the presentation logic working
on the client-side that pulled data, on-demand, from 'the server
using AJAX.
d. As the JavaScript code was also processing user input and rendering
it in the web page content, a new sub-class of reflected XSS attacks
started to appear that was called DOM-based cross-site scripting.
e. In a DOM-based XSS attack, the malicious data does not touch the
web server. Rather, it is being reflected by the JavaScript code,
fully on the client side.
I
UNIT
Basic C'r yptogra phy
CONTENTS
Part-1 : Public Key Cryptography, . ~ .......i.:o .. .-........,4-2W to 4-SW.
RSA Public Key_yrypto ' :· ' . -: - - ' ·
. . !
·, Pa:tt-5
l
DNS Security .......... :;;.....:.._..... '.\ .............. 4-28W
< }
/.
,,,.,, •'\,,
to 4-3SWi
4-1 W(CC-Sem-3&4)
4-2 W (CC-Sem-3 & 4) Basic Cryptography
PART-1
Public Key Cryptography, RSA Public Key Crypto.
Questions-Answers
Aaditya
f
I
I
nf
To the public
t_!-:.•=======·-= f Jyoti's public key
Jyoti's private key
Jyoti
D
t Ciphertext _ _.;___rjP'l .
Encryption1-- - ~.i Decryption amtext
~~~--J
Principle of public key cryptography :
1. The concept of public key cryptography evolved from an attempt to
solve the most difficult problems associated with symmetric encryption :
L Two communicants already share a key, which has been distributed
to them.
Computer System Security 4-3 W (CC-Sem-3 & 4)
hswe~
,, '.
S. No. Symmetric ;k~y, ,,• . :
lto;: Asy:gimetriC:key ,
,·.·,,,_~\\' :(; ~•_:;.. ~ ·.,.... ' _;:!
•'
, k- --~ ,.
" cryptogra phy · · · · ' ' cryptograp hy '
Answer
RSA algorithm :
1. RSA is a public key encryption algorithm, named for its inventors (Rivest,
Shamir and Adleman).
2. The RSA algorithm is based on the mathematic al part that it is easy to
find and multiply large prime numbers together, but it is extremely
difficult to factor their product.
3. The RSA algorithm is shown as :
a. Choose two large prime numbers p and q .
b. Calculate n =p x q.
c. Select the public key (i.e., the encryption key) e such that it is not a
factor of (p - 1) and (q - 1).
d Select the private key (i.e., the decryption key) d such that the
following equation is true :
(d x e) mod (p - 1) x (q - 1) = 1
e. For encryption, calculate the cipher text C from the plain text Mas
follows:
C=Memod n
f.
Send C as the cipher text to the receiver.
g.
For decryption, calculate the plain text C from the cipher text C as
follows:
M=V1mod n
Numerical :
1. Translate the numbers into letters : M = 12 and E =4
2. Encrypt each block Musing, C = M1 (mod 3)
3. ForM= 12
C = 127 (mod 3)
= 124 x 123 (mod 3)
= (122) 2 x 122 x 12 (mod 3) =0
ForE=4
C = E 1 (mod 3)
= 4 7 (mod 3)
= 4 (mod 3) = 1
The encrypted ciphertext is : 0 and 1.
~
0
'Answer j
RSA algorithm : Refer Q. 4.4, Page 4--3W, Unit-4.
Numerical:
Step 1 :p = 11, q = 13 .
Step 2 : n = p x q = 11 x 13 = 143
Step 3 : Calculate
q>(n) = (p - 1) (q - 1)
= (11- 1) (13 -1) = 10 X 12 = 120
Step 4 : Determine d such that de = 1 (mod 160)
d = e -- 1 mod 160
Using extended Euclidean algorithm we calculated.
q rl r2 r t1 lz t
17 120 7 1 0 1 -17
7 7 1 0 1 -17 120
1 0 -17 120
= - 17mod 120
d = 103
Public key= {7, 143}
Private key= {103, 143}
Encryption (C) = Me (mod n)
M=9
C = 97 mod 143
= [(9" mod 143) x (g2 mod 143)
(91 mod 143)] mod 143
= (126 x 81 x 9) mod 143
= 91854 mod 143 = 48
Decryption (M) = 13103 mod 143
Que 4.6.- IDiscuss public key cryptography. Explain RSA algorithm
= = = =
with suitable steps. Let p 17, q 11, e 7 and d 23. Calculate the
public key and private key and show encryption and decryption for
plain text M = 88 by using RSA algorithm.
~;wei:_ , )
Public key cryptography: Refer Q. 4.1, Page 4-2W, Unit-4.
RSA algorithm: Refer Q. 4.4, Page 4--3W, Unit-4.
Numerical:
Step 1 : p =17, q = 11
~ W (CC-Sem-3 & 4) Basic Cryptography
St~p 2: n =p x q = 17 x 11 = 187
Step 3 : Calculate <j>(n) = (p - 1) (q - 1) = 16 x 10 = 160
Step 4 : d = 23 and e = 7
Public key is {7, 187}
Private key is {23, 187}
Encryption : Ciphertext is
C = M e mod n = 887 mod 187 = (882 mod 187) (885 mod 187)
= [77 x (77 x 77) x 88] mod 187 = 11
C= 11
Decryption : Plaintext is
M = CC' mod n = 1123 mod 187 =(115 mod 187) (11 18 mod 187)
= [44 x (44 x 44 x 44) (113 mod 187)] mod 187
= [444 x 22] mod 187 =88
Que 4.7-. IWhat are the advantages and disadvantages of RSA?
Answer
Advantages of RSA:
1. Convenience : It solves the problem of distributing the key for
encryption.
2. Provides message authentication : Public key encryption allows
the use of digital signatures which enables the recipient of a message to
verify that the message is from a particular sender.
3. Detection of tampering : The use of digital signatures in public key
encryption allows the receiver to detect if the message was altered in
transit. A digitally signed message cannot be modified without invalidating
the signature.
4. Provides non-repudiati on : Digitally signing a message is related to
physically signing a document. It is an acknowledgeme nt of the message
and thus, the sender cannot deny it.
Disadvantage s of RSA :
1. Public keys should/must be authenticated : No one can be
absolutely sure that a public key belongs to the person it specifies and so
everyone must verify that their public keys belong to them.
2. Slow: Public key encryption is slow compared to symmetric encryption.
Not feasible for use in decrypting bulk messages.
3. Uses more computer resources : It requires a lot more computer
supplies compared to single-key encryption.
4. Widespread security compromise is possible : If an attacker
determines a person's private key, his or her entire messages can be
read.
5. Loss of private key may be irreparable : The loss of a private key
means that all received messages cannot be decrypted.
:i.
Computer System Security 4-7 W (CC-Sem..S & 4)
An~wei;- ·
Three possible approaches and securities of the RSA algorithm are:
1. Brute force :
a. This involves trying all possible private keys.
b. The defense against the brute force approach is to use a large key space.
2. Mathematical attacks :
a. There are several approaches used for factoring the product of two
primes.
b. The defense against mathematical attacks is to use factoring
performance as a benchmark against which to evaluate the security
of RSA.
3. Timing attacks : These depend on the running time of the decryption
algorithm. Counter-measures that can be used, includes the following :
a. Constant exponentiation time : Ensure that all exponentiation
take the same amount of time before returning a result. This is a
simple fix but does degrade performance.
b. Random delay : Better performance could be achieved by adding
a random delay to the exponentiation algorithm to confuse the
timing attack.
c. Blinding: Multiply the ciphertext by a random number before
performing exponentiation. This process prevents the attacker from
knowing what ciphertext bits are being processed inside the
computer and therefore prevents the bit-by-bit analysis essential
to the timing attack.
Numerical: Refer Q. 4.6, Page 4-5W, Unit-4.
Que 4.9. IWri~e a short note on hybrid cryptosystem.
I ' . ~
Arl$wer""4'':,
4" .I- ;d.,
v. The recipient decrypts the secret key first, using his/her own private
key, and then uses that key to decrypt the message.
vi. The steps of hybrid encryption are :
1. Generate a symmetric key. The symmetric key needs to be kept a
secret.
2. Encrypt the data using the secret symmetric key.
3. The person to whom we wish to send a message will share her
public key and keep the private key a secret. -
4. Encrypt the symmetric key using the public key of the receiver.
5. Send the encrypted symmetric key to the receiver.
6. Send the encrypted message text.
7. The receiver decrypts the encrypted symmetric key using her
private key and gets the symmetric key needed for decryption.
8. The receiver uses the decrypted symmetric key to decrypt the
message, getting the original message.
~, ," ' ' 1 p ART- 2 I~- '- ,:: ' ~.- ' ,. . '
. '}' ,
., ' ·' ' ' . .'
-
:~';.~ '
.
--- ,.
) '.:-«,:Z ,- :
:Que 4.(0~t-
-~ ;~-::i 0
Describe briefly the term digital envelope.
/.<, • ~i"
~A~"'~W~
~ ~ ,;M#~
, ·
m,~ J 4t:1Tnigital ~igi\;tµ}~.~
, ~~ ,.;_~"' r,,o;s,1/t~ ,;,rr . ). (,-~• ,, '<. ilrl"' ,.<,,.,
I
~u~ 4.~2. Explain key generation algorithm, signing algorithm,
signature verification algorithm in digital signature.
' ·' (
,_ Ans:wer
~i .,,t -
2. Signing algorithms :
a. To create a digital signature, signing algorithms like email programs
create a one-way hash of the electronic data which is to be signed.
b. The signing algorithm then encrypts the hash value using the private
key (signature key).
c. This encrypted hash along with other information like the hashing
algorithm is the digital signature.
d This digital signature is appended with the data and sent to the
verifier.
e. The reason for encrypting the hash instead of the entire message
or document is that a hash function converts any arbitrary input
into a much shorter fixed length value.
f. This saves time as instead of signing a long message a shorter hash
value has to be signed and moreover hashing is much faster than
signing.
3. Signature verification algorithms :
a Verifier receives digital signature along with the data.
b. It then uses verification algorithm to process on the digital signature
and the public key (verification key) and generates some value.
c. It also applies the same hash function on the received data and
generates a hash value. Then the hash value and the output of the
verification algorithm are compared. If they both are equal, then
the digital signature is valid else it is invalid.
I
Que 4.13. Describe the steps used in creating digital signature.
Answer
The steps followed in creating digital_signature are :
1. Message digest is computed by applying hash function on the message
and then message digest is encrypted using private key of sender to
form the digital signature.
2. Digital signature is then transmitted with the message.
3. Receiver decrypts the digital signature using the public key of sender.
4. The receiver now has the message digest.
5. The receiver can compute the message digest from the message.
6. The message digest computed by receiver and the message digest got by
decryption needs to be same for ensuring integrity.
9ue 4.1,-t: IWrite a short note on Message Digest (MD) hash function.
Comput er System Security 4-11 W(CC-S em-3&4 )
;An~ei -;: ]
~ ~.r 1
1. The MD hashing algorith m is a one-way cryptogr aphic function that
accepts a message of any length as input and r eturns as output a fixed
length digest value to be used for authenti cating the original message .
2. The MD hash function can be use as a secure cryptog raphic hash
algorith m for authenti cating digital signatur es.
3. MD has been depreca ted for uses other than as a non-cryp tographi c
checksu m to verify data integrit y and detect uninten tional data
corrupti on.
4. The goal of any message digest function is to produce digests that &ppear
to be random.
5. To be consider ed cryptogr aphicall y secure, the hash function should
meet two requirem ents :
L It is impossib le for an attacker to generate a message matchin g a
specific hash value.
u. It is impossib le for an attacker to create two message s that produce
the same hash value.
where,
p = A prime number of length L bits
q = A 160-bits prime factor of (p - 1)
g = h(.p- l)lq modp
x = A number less than q.
y =gX modp.
H = Message Digest algorithm.
If same secret (kl, k2) is used for signing two different messages, it will
generate two different signatures (rl, s1) and (rl, s2):
1. s1 = kl - 1(hlk2 + d(rl + r2))
2. s2 = kl - 1(h2k2 + d(rl + r2))
where hl = SHA512(ml) and h2 = SHA512(m2)
3. kls 1 - k1s2 = hlk2 + dr - h2k2- dr
4. kl(s 1- s2) = k2(hl - h2)
5. We cannot obtain kl, k2 from this equation and so this scheme is more
secure than original ECDSA (Elliptical Curve Digital Signature
Algorithm) scheme.
Que 4.16. j What are the properties and requirements for a digital
signature?
Answer
Properties of digital signature :
1. It must be able to verify the author, the date and time of the signature.
2. It must be able to authenticate the contents of the message at the time
of the signature.
3. There must be third (trusted) party who can verify the digital signature
to resolve disputes between the sender and receiver.
Requirements for a digital signature :
I
..1. The signature must be in the form of a bit pattern and relative to the
message being signed.
2. The signature must contain information that is unique to the sender, so
that forgery and denial can be avoided.
3. The process of creating, recognizing and verifying the digital signature
must also be comparatively easy.
4. A high computational effort must be required to forge a digital signature.
6. The copy of a digital signature must be retained in storage mechanism.
Answer
Varian ts of digital signatu re are :
1. Timest amped signatu re :
a. Timesta mped digital signatur es include a timestam p value in order
to prevent replay attack.
b. In a replay attack, the docume nts can be replayed by a third party.
2. Blind signatu re :
a. Blind signatur e is used when the sender does not want to reveal
the contents of the message to the signer and just wishes to get the
message signed by the signer.
b. Blind signatur es are used in situation s where the signer message
authors are complet ely differen t parties.
c. Blind signatur es scheme can be impleme nted by using a number of
public-k ey digital signatur e schemes such as RSA and DSS.
3. Undeni able digital signatu re :
a This scheme is a non self-auth enticatin g signatur e scheme in which
no signatur es can be verified without the signer's coopera tion and
notifica9 on.
b. This scheme has three compon ents :
i. Signing algorith m: This allows the signer to sign a message .
ii. Verific ation (or confirm ation) protoco l: This allows the
signer to limit the users who can verify his or her signatur e.
iii. Disavo wal (or denial) protoco l : Since the verifica tion
process requires the involvem ent of the signer, it is quite
possible that the signer can freely decline the request of the
verifier. This protocol prevent s the signer from proving that a
signatur e is invalid when it is valid and vice-ver sa.
Que 4t18.1 What is hash functio n ? Discus s SHA-51 2 with all
require d steps, round functio n and block diagram .
Answer
Hash functio n :
1. A cryptog raphic hash function is a transfor mation that takes an input
and returns a fixed-size string, which is called the hash value.
2. A hash value h is generat ed by a function H of the form :
h = H(M)
where M is the variable length message and H(M) is the fixed length
hash value.
3. The hash value is appende d to the message at the source at a time
when message is assumed or known to be correct.
4-14 W (CC-Sem-3 & 4) Basic Cryptography
j Message Registers I
Leng th
-fili Coun ter t t - f/l
...,'"'
Q)
,---
f/l
...,'"'
Q)
-...,
::::,
(IS
f/l ...,~
....
f/l
f/l
Q)
...,s
- - SHA l Round ..... 'So
~
Q)
~
·Gt
~
Q) - - 0
::::,
I
Que 4.19 . Wha t are the char acte risti cs of SHA func tion
?
Answer·'
;
func tion :
Cha ract eris tics (req uire men ts) of secu re hash
k of data of any size.
1. The hash func tion shou ld be appl icab le on a bloc
ld always be of fixed
2. The outp ut prod uced by the hash func tion shou
leng th.
be easie r to gene rate
3. For any give n mess age or bloc k of data , it shou ld
the hash code.
e to dete rmin e the
4. Give n a hash code , it shou ld be near ly impo ssibl
corr espo ndin g mess age or bloc k of data.
be com put ation ally
5. Give n a mess age or bloc k of data , it shou ld not
gene ratin g the
feasi ble to dete rmin e anot her mess age or block of data
of data.
sam e hash code as that of the give n mess age or block
st simi lar, should
6. No two mess ages or bloc ks of dat a, even bein g almo
be likel y to have the same hash code.
the vari ous
Que 4.20 . f Disc uss pub lic key dist ribu tion . Desc ribe
sche mes µsed for pub lic key dist ribu tion .
Answ-er J
X.509 certificates :
1. In cryptography, X.509 is an ITU-T standard for a Public Key
Infrastructure (PKI) for single sign-on and Privilege Management
Infrastructure (PMI).
2. X.509 specifies, standard formats for public key certificates, certificate
revocation lists, attribute certificates and a certification path validation
algorithm.
3. X.509 defines a framework for the provision of authentication services
by the X.500 directory to its user.
Compute r System Security 4-17 W (CC-Sem-3 & 4)
4. X.509 certificat e is based on the use of public key cryptogra phy and
digital signature s.
5. The standard does not dictate the use of a specific algorithm but
recomme nds RSA.
6. X.509 certificat es format is used in S/MIME, IP security and SET.
Role of X.509 certifica tes in cryptogr aphy :
1. To verify that a public key belong to the user, computer or service
identify contained within the certificate .
2. To validate the identity of encrypted data.
I
Que 4.22. Discuss X.509 digital certifica te format.
Answer , )
Format of X.509 certifica te:
The general format of a X.509 digital certificate is shown in Fig. 4.22.1.
Version
Certificate serial
number
Signature {
algorithm
identifier
------ -
Algorithm
------
Parameters
Issuer name
Period of {
Validity ------ ------ -
Subject name
_ _ Al~rithms ___ _
Signature {
------ ------ -
Par ameters
Encrypted
4-18 W (CC-Sem-3 & 4) Basic Cryptography
I
Que 4.2'3. What do you mean by PGP ? Discuss its application.
'Answer
PGP:
1. PGP (Pretty Good Privacy) is an encryption algorithm that provides
cryptographic privacy and authentication for data communication.
2. PGP uses a combination of public-key and conventional encryption to
provide security services for electronic mail message and data files.
3. PGP provides five services related to the format of messages and data
files: authentication, confidentiality, compression, e-mail compatibility
and segmentation.
Computer System Security 4-19 W (CC-Sem -3 & 4)
Applicatio n of PGP :
1. PGP provides secure encryption of document s and data files t hat even
advanced super comput ers are not able t o crack.
2. For authenticati on, PGP employs the RSA public-key encryption scheme
and th e MD5, a one -way hash function to form a digital signature that
assures th e receiver that an incoming messages is authentic (th at it
comes from the alleged send and that it has not been alter ed).
I
Que ,4 .~~- Dfocuss the steps that are followed for the t ranBmfoai oID\
and reci."'ption of PGP m essage s.
Th e PGP rn<"ssa g.es are transmitted from the sender to r eceiver nsing
foilowing st eps :
1. If signature is required, the hash code of the uncompr essed plainte.Kt
message is created and encrypted using the sen der 's private key.
2. The plaintext message and the signature are compressed using the ZIP
compression algorithm.
3. The compressed plaintext message and compr essed signatur e ar e
encrypted with a randomly gen e rat ed se ssion k ey t o provide
confidential ity. The session key is t hen encrypted with the r ecipient's
public k ey and is added to the beginning of the message.
4. The entire block is converted to radix-64 format .
On receiving t he PGP message, the receiver follows the following st eps :
1. The entire block is first converted back to binary for mat .
2. The recipient recovers the session key using his or her privat e key, and
then decrypts the message with the session key.
3. The decrypted message is then decompress ed.
4. If the message is signed, the receiver needs to ver ify the signature. For
this, he or she computes a new hash code and compar es it with th e
received hash code. Ifthey match, the message is accepted; otherwise, it
is rejected.
PART· 3
>
I
) Real Wo~ld Protocols, Basic Terrninolog i~s.
Qu~stions•Ans'Yers
I
5.
text using a cipher and a key. ·
6. Decodi ng/Dec ryption : The process of converti ng cipher text back
into plaintex t using a cipher and a key.
7. Crypta nalysis (code breakin g): The study of principle s and methods
of transfor ming an unintelli gible message back into an intelligi ble
message without knowled ge of the key.
8. Crypto logy : The combina tion of cryptogr aphy and cryptana lysis.
9. Code : An algorith m for transfor ming an intelligi ble message into an
unintelli gible one using a code-book.
) 10. Substit ution: Replacin g one entity with other.
I
Answer . w1
The basic function alities of SIMIME are :
1. En veloped d ata : S/MIME supports enveloped data, which consists of
the message cont aining any type of contents in encrypted form and the
encryption key encrypted with receiver's public key.
2- Signed data: This consists of the message digest encrypted using the
sender's pr ivate key. This signed message can only be viewed by t he
receiver s who have S/MIME capability .
3. Clear-sig ned data: This functional ity is similar to the signed data that
allows the receivers to view the content s of the message even if they do
not have S/MIME capability. However, they cannot verify the signature .
4. Signed and envelope d data: In this, S/MIME allows nesting of signed-
only and encrypted -only entities, so that t he encrypted data can be
signed, and signed or clear-sign ed data can be encrypt ed.
,. #"
1 PART· 4 I ~. ·,. : ~ • • ?
·:,,t , Qyes~on.,.·
:s..An.swe,r(j
. ,.:
1
Q ue 4.28. What is email security ?
Answ~r l
1. Email securit y refers to the collective measures used to secure the
access and content of an email account or service.
2. It allows an individua l or organizat ion to prot ect the overall access to
one or more email addresses /account s.
3. Email securit y is a term that encompas ses multiple technique s used to
secure an email service.
4. 1t also implemen ts firewall and software-based spam filtering applications
to restrict unsolicite d, untrustw orthy and malicious email messages
from delivery to a user's inbox.
5. SSL, TLS refers to the standard protocol used to secure email
transmiss ion.
Computer System Security 4-23 W (CC-Sem-8 & 4)
Ans~e~ 1
;- J
1. Transport Layer Security (TLS) is a protocol that provides communication
security between client/server applications that communicate with each
other over the Internet.
I
2. It enables privacy, integrity and protection for the data that is transmitted
) between different nodes on the Internet.
3. TLS is a successor to the Secure Socket Layer (SSL) protocol.
I 4. Transport Layer Security (TLS) is a protocol that provides authentication,
I
privacy, and data integrity between two communicating computer
I applications.
~ 5. It is the most widely-deployed security protocol used for web browsers
and other applications that require data to be securely exchanged over
a network, such as web browsing sessions, file transfers , VPN
connections, remote desktop sessions , and Voice over IP (VoIP).
6. TLS is a cryptographic protocol that pr ovides end-to-end communications
security over networks and is widely used for internet communications
and online transactions.
7. TLS primarily enables secure Web browsing, applications access, data
transfer and mo3t Internet -based communication.
4-24 W (CC-Sem-3 & 4) Basic Cryptography
I
Que 4.31. What are the components of TLS ? Explain the working
ofTLS.
Answer
1. TLS is used on top of a transport layer security protocol like TCP.
2. There are three main components to TLS :
a. Encryption : It hides the data being transferred from third parties.
b. Authentication : It ensures that the parties exchanging
information are who they claim to be.
c. Integrity: It verifies that the data has not been forged or tampered
with.
Working of TLS :
1. A TLS connection is initiated using a sequence known as the TLS
handshake.
2. The TLS handshake establishes a cipher suite for each communication
session. I
3. The cipher suite is a set of algorithms that specifies details such as which
shared encryption keys, or session keys, will be used for that particular
session.
4. TLS is able to set the matching session keys over an unencrypted channel
known as public key cryptography.
5. The handshake also handles authentication, which usually consists of
the server proving its identity to the client. This is done using public
keys.
6. Public keys are encryption keys that use one-way encryption, meaning
that anyone can unscramble data encrypted with the private key to
ensure its authenticity, but only the original sender can encrypt data
with the private key.
Computer System Security 4-25 W (CC-Sem-3 & 4)
Answer
i. IP Security (IPSec) is a collection of protocols designed by the Internet
Engineering Task Force (IETF) to provide security for a packet at the
network layer.
11. IPSec is a capability that can be added to either version of the Internet
Protocol (IPv4 or IPv6), by means of additional headers.
Ill. IPSec encompasses three functional areas : authentication,
confidentiality, and key management.
a. The authentication mechanism assures that a received packet
was transmitted by the party identified as the source in the packet
header.
b. The confidentiality facility enables communicating nodes to
encrypt messages to prevent eavesdropping by third party.
c. The key management facility is concerned with the secure
exchange of keys.
1v. IPSec has two modes of operation :
a. Transport mode : It is the default mode ofIPSec which provide
end-to-end security. It can secure communication between a client
and a server.
b. Tunnel mode : Tunnel mode is used between two routers, between
a host and a router, or between a router and a host. It is used when
either the sender or the receiver is not a host.
v. IPSec uses two protocols for message security :
a. Authentication Header (AH) : It covers the packet format and
general issues related to the use of AH for packet authentication.
b. Encapsulating Security Payload (ESP) : It covers the packet
format and general issues related to the use oftqe ESP for packet
encryption and, optionally, authentication.
I
;Qu~ 4.38., Write a short note on the applications of IP security.
;~!1~!,e,r.. ~, ]
Applications of IP security :
1. Secure remote Internet access: Using IPSec, we can make a local
call to our Internet Service Provider (ISP) so as to connect to our
organiza~ion's network in a secure manner from our home or hotel.
4-ZS W (CC-Sem-3 & 4) Basic Cryptog raphy
I
'Q u~ 4.3~. What are the uses of IP securit y ?
·Anawer t ·- I
iPsec can be used :
1. To encrypt applicat ion layer data.
2. To provide security for routers sending routing data across the public
internet .
3. To provide authenti cation without encrypti on, like to authenti cate that
the data originat es from a known sender.
4. To protect network data by setting up circuits using IPsec tunnelin g in
which all data is being sent between the two endpoin ts is encrypte d, as
with a Virtual Private Network (VPN) connection.
Answer
Compone nts of IP security :
1. Encapsu lating Security Payload (ESP): It provides data integrity,
encryption, authentica tion and anti replay. It also provides authentication
for payload.
2. Authenti cation Header AH :
a. It also provides data integrity, authentica tion and anti-replay and it
does not provide encryption.
b. The anti-repl ay protectio n protects against unauthor ized
transmiss ion of packets. It does not protect data's confidentiality.
3. Internet Key Exchang e (IKE) :
a. It is a network security protocol designed to dynamically exchange
encryption keys and find a way over Security Association (SA)
between two devices.
b. The Security Association (SA) establishes shared security attributes
between two network entities to support secure communication.
c. Internet Security Associatio n and Key Managem ent Protocol
(ISAKMP) provide a framewor k for authentic ation and key
exchange.
d It tells how the set up of the Security Associations (SAs) and how
direct connection s between two hosts that are using IPsec.
e. Internet Key Exchange (IKE) provides message content protection
and also an open frame for implemen ting standard algorithms such
as SHA and MD5.
Answ.e r
Working of IP security:
1. The host checks if the packet should be transmitte d using IPsec or not.
These packet traffic triggers the security policy for themselve s. This is
done when the system sending the packet apply an appropria te
encryption. The incoming packets are also checked by the host that they
are encrypted properly or not.
2. Then the IKE Phase I starts in which the two hosts (using IPsec)
authentica tes themselve s to each other to start a secure channel. It has
two modes. The main mode which provides the greater security and the
aggressive mode which enables the host to establish an IPsec circuit
more quickly.
4-28 W (CC-Sem-3 & 4) Basic Cryptography
3. The channel created in the last step is then used to securely negotiate
the way the IP circuit will encrypt data across the IP circuit.
4. Now, the IKE Phase 2 is conducted over the secure channel in which
the two hosts negotiate the type of cryptographic algorithms to use on
the session and agreeing on secret keying material to be used with
those algorithms.
5. Then the data is exchanged across the newly created IPsec encrypted
tunnel. These packets are encrypted and decrypted by the hosts using
IPsec SAs.
6. When the communication between the hosts is completed or the session
times out then the IPsec tunnel is terminated by discarding the keys by
both the hosts.
PART-5 I
.DNS Se"<;urity."
'· ,)i ·'"'"'
Questi~ns-Ao~~~r~·-- .
. • • < M
Answer
1. The DNS turns domain names, or website names, into internet protocol
(IP) addresses.
Computer System Security 4-29 W (CC-Sem-3 & 4)
2. These are unique identifiers that help computers around the world
access the information quickly.
3. DNS security adds a set of extensions for increased protection.
4. These security extensions include :
a. Origin authentica tion of DNS data : This ensures that the
recipient of the data can verify the source.
b. Authentica ted denial of existence : This tells a resolver.
c. Data integrity: This assures the data recipient that the data has
not been changed in transit.
I
Que 4.4~: Explain the DNS security threats.
~ ~er' 'I
Common DNS security threats are :
1. Distribute d Denial of service (DDoS) :
a The attacker controls an overwhelmi ng amount of computers
(hundreds or thousands) in order to spread malware and flood the
victim's computer with unnecessary and overloading traffic.
b. Eventually, unable to harness the power necessary to handle the
intensive processing, the systems will overload and crash.
2. DNS spoofing (also known as DNS cache poisoning) :
a Attacker will drive the traffic away from real DNS servers and
redirect them to a pirate server, unrecognize d to the users.
b. This may cause in the corruption/t heft of a user's personal data.
3. Fast flux :
a. Fast flux is a technique to constantly change location-..,ased data in
order to hide where exactly the attack is coming from.
b. This will mask the attacker's real location, giving him the time
needed to exploit the attack.
c. Flux can be single or double or of any other variant. A single flux
changes address of the web server while double flux changes both
the address of web server and names of DNS serves.
4. Reflected attacks :
a. Attackers will send thousands of queries while spoofing their own
IP address and using the victim's source address.
b. When these queries are answered, they will all be redirected to the
victim himself.
5. Reflective amplificati on DoS :
a. When the size of the answer is considerably larger than the query
itself a flux is triggered, causing an amplificatio n effect.
b. This generally uses the same method as a reflected attack, but this
attack will overwhelm the user's system's infrastructu re further.
Answe r . j
Measu res agains t DNS attack s :
1. Use digital signatu res and certific ates to authen ticate session s in order
to protect private data.
2. Update regular ly and use the latest softwa re version s, such as BIND.
BIND is open source softwa re that resolve s DNS queries for users.
3. Install approp riate patche s and fix faulty bugs regular ly.
4. Replica te data in a few other servers , so that if data is corrup ted/ lost in
one server, it can be recove red from the others. This could also preven t
single point failure .
5. Block redund ant queries in order to preven t spoofing.
6. Limit the numbe r of possibl e queries .
I
Que 4.42. Expla in SSL encryp tion. What are the steps involv ed in
2. This increases the security of DES. Two versions of triple DES are :
a. Triple DES with two keys :
1. In triple DES with two keys, there are only two keys K 1 and
1½- The first and the third stages use the key K 1 and the
second stage uses 1½-
2. The middle stage of triple DES uses decryption (reverse cipher)
in the encryption site and encryption cipher in the decryption
site.
P I 64-bit pla in text I PI 64-bit pla in text I
,--------+ ------, ,-------+------,
:I
§I
DES cipher
♦
I +-
:
K1
I
I
I
DES reverse cipher
I
1
I
s:::
I -~
:;; I I
I
,----------, I
I >,
o.
~: M 64-bit middle t ext : 64-bit middle t ext
0tl
t Mt
~I .....__ _~ ~ - - - ' I I .....__ _ _ _ _~ I
~I I I I
I ,----------, I I ,----------, I
: I DES cipher , ~ K2 I
1 DES reverse cipher
I .....__ _ _ _ _~
I
1
I
--------+------ J
._ _ _ _ _ _ _ ______ J
lI DES cipher I +-
I
K1
,-
1
DES reverse cipher
-1
: s:::
]: ♦ : I ,---------, : :3
P.I
~: M DES reverse cipher ~ u z ~ :t
--, , u l DES cipher IM: t ~
~
~I I I f I i=l
I ,---------, I I ,---------, I
: I DES cipher I ~ K3 : DES reverse cipher :
_ _ _ _ _ _ _ _, _ _ _ _ _ _ J ._ _ _ _ _ _ _ ------~
Que 4.45. IWrite short note on secret key cryptogra'phy. Also list
its advantages, disadvantages and examples.
IAKTU 2019-20, Marks 10 I
Answer
1. Secret key cryptography refers to cryptographic system that uses the
same key to encrypt and decrypt data.
2. This means that all parties involved have to know the key to be able to
communicate securely i.e. , decrypt encrypted messages to read them
and encrypt messages they want to send.
3. Therefore the key, being shared among parties, but having to stay
secret to third parties in order to keep communications private is
considered as a shared secret.
Advantages of secret key cryptography :
1. It is efficient.
2. In secret key cryptography, encrypted data can be transferred on the
link even if there is a possibility that the data will be intercepted. Since
there is no key transmitted with the data, the chances of data being
decrypted are null.
3. It uses password authentication to prove the receiver's identity.
4. A system only which possesses the secret key can decrypt a message.
Disadvantages of secret key cryptography:
1. It has a problem of key transportation.
2. It cannot provide digital signatures that cannot be repudiated.
Examples of secret key cryptography are :
1. Data Encryption Standard (DES)
2. Triple-strength DES (3DES)
3. Rivest Cipher (RC2)
4. Rivest Cipher 4 (RC4)
UNIT
Interne t Infrastr ucture
CONTE NTS
Part-1 : Internet Infrastructure, ........, .................. 5-2W to 5-4W
Basic Security Problems
I PART-1 I
Internet Infrastructure, Basic Security Problems.
Questions-Answers
❖ ~. '· >I: ~ , f.' . > • "\
Answer
1. Internet infrastructu re is the physical hardware, transmissio n media,
and software used to interconnec t computers· ancl. users on the Internet.
2. Internet infrastructu re is responsible for hosting, storing, processing,
and serving the information that makes up websites, applications , and
content.
Different internet infrastruc ture :
1. Dial-up Internet Access :
a. Using a modem connected to our PC, users connect to the Internet
when the computer dials a phone number (which is provided by our
ISP) and connects to the network.
b. Dial-up is an analog connection because data is sent over an analog,
public-switc hed telephone network.
c. The modem converts received analog data to digital and vice versa.
2. Integrated Services Digital Network (ISDN) : Integrated services
digital network (ISDN) is an internationa l communicat ions standard for
sending voice, video, and data over digital telephone lines or normal
telephone wires.
3. Broadband ISDN (B-ISDN) :
a. Broadband ISDN is similar in function to ISDN but it transfers data
over fiber optic telephone lines, not normal telephone wires.
b. SONET (Synchronou s Optical N etwork:ing) is the physical transport
backbone of B-ISDN.
c. Broadband ISDN has not been widely implemente d.
4. Digital Subscriber Line (DSL) : DSL is frequently referred to as an
"always on" connection because it uses existing 2-wire copper telephone
line connected to the premise so service is delivered simultaneou sly
with wired telephone service.
Computer System Security 5-3 W (CC-Sem-3 & 4)
Answer
Advantages of TCP/IP model are :
1. It is an industry-standa rd model that can be effectively deployed in
practical networking problems.
2. It allows cross-platform communication s among heterogeneous
networks.
3. It is an open protocol suite.
4. It is a scalable, client-server architecture. This allows networks to be
added without disrupting the current services.
5. It assigns an IP address to each computer on the network, thus making
each device to be identifiable over the network.
Disadvantage s of the TCP/IP model are :
1. It is not generic in nature. So, it fails to represent any protocol stack
other than the TCP/IP suite. For example, it cannot describe the Bluetooth
connection.
2. It does not clearly separate the concepts of services, interfaces, and
protocols. So, it is not suitable to describe new technologies in new
networks.
3. It does not distinguish between the data link and the physical layers,
which has very different functionalities. The data link layer should
concern with the transmission of frames. On the other hand, the physical
layer should lay down the physical characteristics of transmission.
4. It was originally designed and implemented for wide area networks. It is
not optimized for small networks like LAN (Local Area Network) and
PAN (Personal Area Network).
Que 5.3. IGive a short summary of IP protocol functions.
IAKTU 2019-20, Marks 10 I
Answer
Following are the functions of internet protocols :
1. Addressing :
a. In order to perform the job of delivering datagrams, IP must know
where to deliver them to. For this reason, IP includes a mechanism
for host addressing.
b. Since IP operates over internetworks, its system is designed to
allow unique addressing of devices across arbitrarily large networks.
5-4 W (CC-Sem-3 & 4) Internet Infrastructure
' I PART-2 I
Routing Protocols.
, Questio~s-Ans wers
'
Long Answer Type and Medium Answer Type Questions
Answer "'I
Various types of routing protocols are :
1. Routing Information Protocols (RIP) :
a. RIP is dynamic routing protocol which uses hop count as a routing
metric to find best path between the source and destination
network.
b. RIP (Routing Information Protocol) is a forceful protocol type used
in local area network and wide area network.
c. RIP is categorized as an interior gateway protocol within the use of
distance vector algorithm.
d. It prevents routing loops by implementing a limit on the number of
hops allowed in the path.
2. Interior Gateway Routing Protocol (IGRP) :
a It is distance vector Interior Gateway Routing Protocol (IGRP).
b. It is used by router to'exchange routing data within an independent
system.
c. Interior gateway routing protocol created in part to defeat the
confines of RIP in large networks.
d. It maintains multiple metrics for each route as well as reliability,
delay load, and bandwidth.
e. It measured in classful routing protocol, but it is less popular because
of wasteful of IP address space.
3. Open Shortest Path first (OSPF) :
a. Open Shortest Path First (OSPF) is an active routing protocol used
in internet protocol.
b. It is a link state routing protocol and includes into the group of
interior gateway protocol.
c. It operates inside a distinct autonomous system.
d. It is used in the network of big business companies.
4. Exterior Gateway Protocol (EGP) :
a . The absolute routing protocol for internet is exterior gateway
protocol.
b. EGP (Exterior Gateway Protocol) is a protocol for exchanging
routing table information between two neighbour gateway hosts.
c. The Exterior Gateway Protocol (EGP) is unlike distance vector and
path vector protocol.
5-6 W (CC-Sem-3 & 4) Internet Infrastructu re
Answer
Advantage s of RIP :
1. Easy to configure and use.
2. Supported by all routers.
3. Support load balancing.
Disadvant ages of RIP :
1. Limited to a hop count of 15 i.e., it can transmit packet through 15
routers only.
2. Does not support a Variable-Le ngth Subnet Mask (VLSM), which means
that it sends routing updates based only on a fixed-length subnet mask
(FLSM) or routes that fall on classful boundaries.
3. Converges slowly, especially on large networks.
4. Does not have knowledge of the bandwidth of a link.
5. Does not support multiple paths for the same route.
6. Routing updates can require significant bandwidth, as the entire routing
table is sent when a link's status changes.
7. Prone to routing loops.
Advantage s ofIGRP:
1. Easy to configure and use.
2. Uses the delay, bandwidth, reliability, and load of a link as its metric.
This makes it very accurate in selecting the proper route.
Disadvant ages of IGRP :
1. It is not an Internet standard; all routers must be from Cisco Systems.
2. Converges slowly, slower than RIP.
Computer Syst e m Security 5-7 W (CC-Sem-3 & 4)
_, PART- 3
DNS R evisited, Summar y of Weakness of Internet Security. ,
Question s-Answe rs
Answer
DNS: Refer Q. 4.38, Page 4-28W, Unit-4.
DNS rebindin g attack :
1. DNS rebinding is a form of computer attack.
2. In this attack, a malicious web page causes visitors to run a client-side
script that attacks m achines elsewhere on the network.
5-8 W (CC- Sem- 3 & 4) Inter net Infra struc ture
3. In this attac k, the same -orig in policy preve nts this from
happ ening ,
clien t-side scrip ts are only allow ed to acces s conte nt on the
same host
that serve d the scrip t.
4. Com parin g doma in name s is an essen tial part of enfor cing this
policy, so
DNS rebin ding circu mven ts this prote ction by misu sing
the Dom ain
Nam e Syste m (DNS).
5. This attac k can be used to breac h a priva te netw ork by
causi ng the
victim 's web brow ser to acces s comp uters at priva te IP addre
sses and
retur n the resul ts to the attac ker.
6. It can also be empl oyed to use the victim mach ine for spam
ming,
distr ibute d denia l-of-s ervic e attac ks, or other malic ious activ
ities.
Qu~ 5.8. IHow DNS rebinding work?
Ans wer
DNS rebi ndin g work s as :
1. The attac ker regis ters a doma in (such as attac ker.c
om) and deleg ates it
to a DNS serve r that is unde r the attac ker's contr ol.
2. The serve r is confi gured to respo nd with a very short
Time-To-Live
(TTI, ) recor d, preve nting the DNS respo nse from
being cache d. Whe n
the victim brow ses to the malic ious doma in, the attac ker's
DNS serve r
first respo nds with the IP addre ss of a serve r hosti ng the
malic ious
clien t-side code.
3. For insta nce, they could point the victim 's brow ser to
a webs ite that
conta ins malicious JavaS cript or Flash scrip ts that are inten ded
to execute
on the victim 's comp uter.
4. The malic ious clien t-side code make s addit ional acces ses
to the origi nal
doma in name (such as attac ker.com).
5. Thes e are perm itted by the same -orig in policy. Howe
ver, when the
victim 's brow ser runs the scrip t it make s a new DNS reque
st for the
doma in, and the attac ker repli es with a new IP addre ss.
6. For insta nce, they could reply with an inter nal IP addre
ss or the IP
addre ss of a targe t some wher e else on the Inter net.
3. Several sample attack payloads, ranging from grabbing the home page
of a target application to performing remote code execution. These
payloads can be easily adapted to perform new and custom attacks.
4. Supports concurrent users.
5. Provides several DNS rebinding strategies, including sequential mapping
from the attacker to the target IP address and random mapping, to
minimize the impact of IDS interfering with the attack.
6. A number of technical controls to maximize the reliability and speed of
attacks :
a. Disabling H'ITP keep alive, caching, DNS prefetching.
b. Aggressive DNS response TTLs.
7. Ability to allocate H'ITP servers at startup or dynamically thereafter:
a A convenience feature to avoid restarting singularity to listen on a
different H'ITP port.
b. To lay the ground work to attack vulnerable ports discovered after
a scan.
Answer )
Advantages:
1. In key management protocol, less than N - 1 keys are stored.
2. It is scalable.
Disadvantage s :
1. It lacks authentication process and does not clearly define any process
for revoking or refreshing keys.
2. The dynamic handshaking process prevents any form of data
aggregation.
3. No support for collaborative operations.
4. No node is guaranteed to have common key with all of its neighbours
there is a chance that some nodes are unreachable.
5. Fail~ to satisfy security requirement authentication and operational
requirement accessibility.
Computer System Security 5-11 W (CC-Sem-3 & 4)
I
Que 5.18. What are the security and operational requirements for
key management protocol ?
Answer J
Security and operational requirements for key management
protocol:
1. Confidentiality : Nodes should not reveal data to any unintended
recipients.
2. Integrity : Data should not be changed between transmissions due to
environment or malicious activity.
3. Data freshness : Old data should not be used as new.
4. Authentication : Data used in decision making process should originate
from correct source.
5. Robustness : When some nodes are compromised, the entire network
should not be compromised.
6. Self-organization : Nodes should be flexible enough to be self-
organizing (autonomous) and self-healing (failure tolerant).
7. Availability: Network should not fail frequently.
8. Time synchronization : Protocols should not be manipulated to produce
incorrect data.
9. / Secure localization : Nodes should be able to accurately and securely
acquire location information. ""-
10. Accessibility : Intermediate nodes should be able to perform data
aggregation by combining data from different nodes.
/ C
I
_Q_u_e_5-.1-4-..... Write a short note on VPN and tunnel mode.
Answer )
Virtual Private Network (VPN) :
1. A Virtual Private Network (VPN) is a technology that creates a safe and
encrypted connection over a less secure network, such as the internet.
2. It is a way to extend a private network using a public network such as
internet.
3. The name only suggests that it is Virtual private network i.e., user can
be the part oflocal network sitting at a remote location.
4. It makes use of tunneling protocols to establish a secure connection.
Tunnel mode :
1. I~ IPSec tunnel mode, the original IP packet (IP header and the Data
payload) is encapsulated within another packet.
5-12 W (CC-Sem-3 & 4) Internet Infrastructure
I
I •
'
Long swer' . .an . . e,di '-Atiswe~ Type Questions
. ~" " ~ ..\ :~• ·,-.,· ~-. -~ ·, 4
I
Que 5.15. Discuss link layer connection in TCP/IP model.
~swe~ "]
~ ,,, «,.,...,,. '<;
Answer
:,,
I
Que 5.17. What is packet filtering firewall? Explain its advantage
and disadvantage.
Answer
Packet filtering firewall :
1. Packet filtering firewall is a technique used to control network access by
monitoring outgoing and incoming packets.
2. Packet filtering firewall allows packet to pass or halt based on the source
and destination Internet Protocol (IP) address, protocols and ports.
Advantages :
1. They are simple, since a single rule is enough to indicate whether to
allow or deny the packet.
2. They are transparent to the users i.e., the users need not know the
existence of packet filters.
3. They operate at a fast speed as compared to other techniques.
4. The client computers need not be conf~gured specially while
implementing packet-filtering firewalls.
5. They protect the IP addresses of internal hosts from the outside network.
Disadvantages :
1. They are unable to inspect the application layer data in the packets and
thus cannot restrict access to FI'P services.
'
2. It is a difficult task to set up the packet-filtering rules correctly.
3. They lack support for authentication and have no alert mechanisms.
~14 W (CC-Sem-3 & 4) Internet Infrastructure
4. Being stateless in nature, they are not well suited to application layer
protocols.
Answer
1. Telnet is a user command and an underlying TCP/IP protocol for
accessing remote computers.
2. Through
I
Telnet, an administrator or another user can access someone
else's computer remotely.
3. With Telnet, we log on as a regular user with whatever privileges we
may have been granted to the specific application and data on that
computer.
4. At the Telnet client, a character that is typed on the keyboard is not
displayed on the monitor, but, instead, is encoded as an ASCII character
and transmitted to a remote Telnet server.
5. At the server, the ASCII character is interpreted as if a user had typed
the character on the keyboard of the remote machine. If the keystroke
results in any output, this output is encoded as (ASCII) text and sent to
the Telnet client, which displays it on its monitor.
6. The output can b,~just the (echo of the) typed character or it can be the
output of a comr..iand that was executed at the remote Telnet server.
Answer j
1. Fragmentation is done by the network layer when the maximum size of
datagram is greater than maximum size of data that can be held a frame
i.e., it's Maximum Transmission Unit(MTU).
2. The network layer divides the datagram received from transport layer
into fragments so that data flow is not disrupted.
3. It is done by network layer at the destination side and is usually done at
routers.
4. Source side does not require fragmentation due to segmentation by
transport layer i.e., the transport layer looks at datagram data limit and
frame data limit and does segmentation in such a way that resulting
data can easily fit in a frame without the need of fragmentation.
5. Receiver identifies the frame with the identification (16 bits) field in IP
header. Each fragment of a frame has same identification number.
6. Receiver identifies sequence of frames using the fragment offset
(13 bits) field in IP header.
7. An overhead at network layer is present due to extra header introduced
due to fragmentation.
Computer System Security 5-15 W (CC-Sem-3 &4)
I
Que 5.20. Write short note on proxy firewall.
Answer , I
1. Proxy firewalls are the most secure types of firewalls, as they can limit
which applications our network can support.
2. The enhanced security of a proxy firewall is because information packets
do not pass through a proxy. Instead the proxy acts as an intermediary;
computers make a connection to the proxy which then initiates a new
network connection based on the request.
3. This prevents direct connections and packet transfer between either
sides of the firewall, which makes it harder for intruders to discover
where the location of the network is from packet information.
4. A firewall proxy provides int.ernet access to computers on a network but
is mostly deployed to provide safety or security by controlling the
information going in and out of the network.
5. Firewall proxy servers filter, cache, log, and control requests coming
from a client to keep the network secure and free of intruders and
viruses.
Answe~ J
1. Intrusion detection refers to the process of identifying attempts to
penetrate a system and gain unauthorized access.
2. An intrusion detection syst.em is a software/hardware designed to detect
unwanted attempts at accessing of target application or syst.em.
3. If an intrusion is detected quickly enough, the intruder can be identified
and ejected from the system before any damage is done or any data are
compromised.
4. Even if the detection is not sufficiently time to preempt the intruder, the
sooner that the intrusion is detected, the less the amount ofdamage and
more quickly recovery can be achieved.
5. An effective intrusion detection system can serve as a barrier to
intrusions.
6. Intrusion detection enables the collection of information about intrusion
techniques that can be used to strengthen the intrusion prevention
facility.
Answer ]
Two appr oach es for intru sion dete ction are :
1. Stat istic al anom aly dete ction : In this categ ory,
the beha viour of
legit imate users is evalu ated over some time interv al. It can
be achie ved
by two ways :
a. Thre shol d dete ction :
L In thres hold detec tion, thres holds are defin ed for all users
as a
group , and the total numb ers of even ts that are attrib uted
to
the user are meas ured again st these thres hold value s.
n. The numb er of even ts is assum ed to roun d upto a numb
er that
is most likel y to occur , and if the even t coun t excee ds this
numb er, then intru sion is said to have occur red.
b. Prof ile-b ased dete ction :
L In profi le-ba sed detec tion, profi les for all users are creat
ed,
and then matc hed with avail able statis tical data to find out
if
any unwa nted actio n has been perfo rmed .
n. A user profi le conta ins sever al param eters . There fore,
chan ge
in a singl e para mete r is not a sign of alert .
2. Rule -bas ed dete ction : In this categ ory, certa in
rules are appli ed on
the actio ns perfo rmed by the users . It is class ified into two.
types :
a. Ano maly -bas ed dete ction :
L In anom aly-b ased detec tion, the usage patte rns of users
are
colle cted, and certa in rules are appli ed to check any devia tion
from the previ ous usag e patte rns.
IL The colle cted patte rns are defin ed by the set of rules that
inclu des past beha viour patte rns of users , progr ams, privileges,
time- slots , term inals , etc.
DL The curre nt beha viour patte rns of the
user are matc hed with
the defin ed set of rules to check whet her there is any devia tion
in the patte rns.
b. Pene trati on iden tific ation :
L In pene tratio n ident ificat ion, an expe rt syste m is main taine
d
that looks for any unwa nted attem pts.
IL This syste m also conta ins rules that are used to ident ify
the
suspi cious beha viour and pene tratio ns that can explo it know
n
weak nesse s.
I
Que 5.23. Wha t is dom ain nam e syste m and expl ain
wha t is DNS
cach e pois onin g? IAKTU 2019-20, Marks 10 I
Computer System Security 5-17 W (CC-Sem-3 & 4)
Answer
Domain name system :
1. The Domain Name System (DNS) is a hierarchic al and decentrali zed
naming system for computers , services, or other resources connected
to the Internet or a private network.
2. It associates various informati on with domain names assigned to each
of the participat ing entities.
3. The domain name system resolves the names of websites with their
underlyin g IP addresses adding efficiency and even security in the
process.
4. Web browsing and most other internet activities depend on DNS to
quickly provide the informati on necessary to connect users to remote
hosts.
5. DNS mapping is distribute d throughou t the internet in a hierarchy of
authority.
6. For example, ifwe type www.google.com into a web browser, a server
behind the scenes will map that name to the correspon ding IP address,
something similar in structure to 172.217.24.228.
DNS cache poisonin g: DNS cache poisoning also known as 'DNS spoofing',
is a form of computer security hacking in which corrupt domain name
system data is introduce d into the DNS resolver's cache causing the name
server to return an incorrect result record. For example, an IP address.