Nis Imp Q&a
Nis Imp Q&a
Nis Imp Q&a
Q. Define Information.
Ans: Information: Information is organized or classified data, which has some meaningful
values for the receiver. Information is the processed data on which knowledge, decisions and
actions are based.
Confidentiality:
● The principle of confidentiality specifies that only sender and intended recipients
should be able to access the contents of a message.
● Confidentiality gets compromised if an unauthorized person is able to access the
contents of a message.
● Example of compromising the Confidentiality of a message is shown in fig
● Here, the user of User A sends a message to User B. Another User C gets access to
this message, which is not desired and therefore, defeats the purpose of
confidentiality.
SAHIL K
Integrity:
● When the contents of the message are changed after the sender sends it, but before it
reaches the intended recipient, we say that the integrity of the message is lost.
● For example, here User C tampers with a message originally sent by User A, which is
actually destined for User B. User C somehow manages to access it, change its
contents and send the changed message to User B. User B has no way of knowing
that the contents of the message were changed after User A had sent it. User A also
does not know about this change.
● This type of attack is called Modification.
Authentication:
● Authentication helps to establish proof of identities.
● The Authentication process ensures that the origin of a message is correctly identified.
● For example, suppose that User C sends a message over the internet to User B.
However, the trouble is that User C had posed as User A when he sent a message to
User B. How would User B know that the message has come from User C, who is
posing as User A?
● This concept is shown in fig. below. This type of attack is called Fabrication.
SAHIL K
ii) Integrity:
● When the contents of the message are changed after the sender sends it, but before it
reaches the intended recipient, we say that the integrity of the message is lost.
● For example, here User C tampers with a message originally sent by User A, which is
actually destined for User B. User C somehow manages to access it, change its
contents and send the changed message to User B. User B has no way of knowing
that the contents of the message were changed after User A had sent it. User A also
does not know about this change.
● This type of attack is called modification.
SAHIL K
iii) Authentication:
● Authentication helps to establish proof of identities.
● The Authentication process ensures that the origin of a message is correctly identified.
● For example, suppose that User C sends a message over the internet to User B.
However, the trouble is that User C had posed as User A when he sent a message to
User B. How would User B know that the message has come from User C, who is
posing as User A?
● This type of attack is called fabrication.
iv) Availability:
● The goal of availability is to ensure that the data, or the system itself, is available for
use when the authorized user wants it.
● The information created and stored by an organization needs to be available to
authorized entities. Information is useless if it is not available.
● Information needs to be constantly changed which means it must be accessible to
authorized entities.
● The unavailability of information is just as harmful for an organization as the lack of
confidentiality or integrity.
SAHIL K
2) Interception
● Interception refers to the situation that an unauthorized party has gained access to a
service or data.
● A typical example of interception is where communication between two parties has
been overheard by someone else.
● Interception also happens when data are illegally copied, for example, after breaking
into a person’s private directory in a file system.
3) Fabrication
● Fabrication refers to the situation in which additional data or activities are generated
that would normally not exist.
● For example, an intruder may attempt to add an entry into a password file or database.
● Likewise, it is sometimes possible to break into a system by replaying previously sent
messages.
4) Modification
● Modifications involve unauthorized changing of data or tampering with a service so
that it no longer adheres to its original specifications.
● Examples of modifications include intercepting and subsequently changing
transmitted data, tampering with database entries, and changing a program so that it
secretly logs the activities of its user.
SAHIL K
ii) Vulnerability:
● It is a weakness in computer systems & networks.
● The term "vulnerability" refers to the security flaws in a system that allows an attack
to be successful.
● Vulnerability testing should be performed on an on-going basis by the parties
responsible for resolving such vulnerabilities, and helps to provide data used to
identify unexpected dangers to security that need to be addressed.
● Such vulnerabilities are not particular to technology - they can also apply to social
factors such as individual authentication and authorization policies.
● Testing for vulnerabilities is useful for maintaining on-going security, allowing the
people responsible for the security of one's resources to respond effectively to new
dangers as they arise.
● It is also invaluable for policy and technology development, and as part of a
technology selection process.
iii) Threats: It is a set of things which has potential to lose or harm to computer systems &
networks.
iv) Risk:
● Risk is the probability of threats that may occur because of the presence of
vulnerability in a system.
● A measure of the extent to which an entity is threatened by a potential circumstance
or event, and typically a function of:
1. The adverse impacts that would arise if the circumstance or event occurs
2. The likelihood of occurrence.
● Power loss will affect the ability for servers and network equipment to operate
depending upon the type of back-up power available and how robust it is.
Malfunction:
● Both equipment and software malfunction threats can impact upon the operations of a
website or web application.
● Malfunction of software is usually due to poor development practices where security
has not been built into the software development life cycle.
1) Malware: Malware, or malicious software, comes in many guises. Web
servers are popular targets to aid distribution of such code and sites which
have vulnerabilities that allow this are popular targets.
● Some breaches to computer security are accidental, but some are planned. Any an
illegal act involving a computer is generally referred to as a computer crime.
● Some of the more common computer security risks include Computer viruses,
Unauthorized access and use of computer systems, Hardware theft and software theft,
Information theft and information privacy, System failure.
● When performing risk analysis it is important to weigh how much to spend protecting
each asset against the cost of losing the asset.
SAHIL K
● It is also important to take into account the chance of each loss occurring.
● If a hacker makes a copy of all a company's credit card numbers it does not cost them
anything directly but the loss in fine and reputation can be enormous.
● An asset is any data, device, or other component of the environment that supports
information-related activities.
Types of Assets:
● Assets generally include
○ Hardware (e.g. Servers and Switches),
○ Software (e.g. Mission Critical Applications and Support Systems)
○ Confidential information.
The various components of risk management and their relationship to each other are shown in
figure:
SAHIL K
1. Avoidance: Defend the defend control strategy attempts to prevent the exploitation of the
vulnerability. This is the preferred approach and is accomplished by means of countering
threats, removing vulnerabilities from assets, limiting access to assets, and adding protective
safeguards.
2. Transference: The transfer control strategy attempts to shift risk to other assets, other
processes, or other organizations.
3. Mitigation: The terminate control strategy directs the organization to avoid those business
activities that introduce uncontrollable risks the mitigate control strategy attempts to reduce
the impact caused by the exploitation of vulnerability through planning and preparation.
Risk can be calculated by using Risk Analysis (RA) which is of two types:
ii) It utilizes relative measures and ii) It is used to determine potential direct
approximate costs rather than precise and indirect costs to the company based on
valuation and cost determination. values assigned to company assets and their
exposure to risk.
iii) Assets can be rated based on criticality - iii) Assets can be rated as the cost of
very important, important, not-important replacing an asset, the cost of lost
etc. Vulnerabilities can be rated based on productivity, or the cost of diminished brand
how it is fixed - fixed soon, should be fixed, reputation.
fix if suitable etc. Threats can be rated based
on scale of likely, unlikely, very likely etc.
iv) In this 100% qualitative risk analysis is iv) In this 100% quantitative risk analysis is
feasible. not possible.
SAHIL K
2. The transfer control strategy attempts to shift risk to other assets, other processes, or
other organizations.
3. The terminate control strategy directs the organization to avoid those business
activities that introduce uncontrollable risks the mitigate control strategy attempts to
reduce the impact caused by the exploitation of vulnerability through planning and
preparation.
4. The accept control strategy is the choice to do nothing to protect a vulnerability and to
accept the outcome of its exploitation.
Types of viruses:
● Parasitic Virus
● Memory Resident Virus
● Non-resident Virus
● Boot Sector Virus
● Overwriting Virus
● Stealth Virus
● Macro Virus
● Polymorphic Virus
● Companion Virus
● Email Virus
● Metamorphic Virus
● Dormant phase:
○ The virus is idle.
○ The virus will eventually be activated by some event, such as a date, the
presence of another program or file, or the capacity of the disk exceeding
some limit.
○ Not all viruses have this stage.
● Propagation phase:
○ The virus places a copy of itself into other programs or into certain system
areas on the disk.
○ The copy may not be identical to the propagating version; viruses often morph
to evade detection.
○ Each infected program will now contain a clone of the virus, which will itself
enter a propagation phase.
● Triggering phase:
○ The virus is activated to perform the function for which it was intended.
○ As with the dormant phase, the triggering phase can be caused by a variety of
system events, including a count of the number of times that this copy of the
virus has made copies of itself.
● Execution phase:
○ The function is performed.
○ The function may be harmless, such as a message on the screen, or damaging,
such as the destruction of programs and data files.
SAHIL K
● Memory resident viruses: It lives in memory after its execution it becomes a part of
the operating system or application and can manipulate any file that is executed,
copied or moved.
● Non- resident viruses: It executes itself and terminates or destroys after specific time.
● Boot sector viruses: It infects the boot sector and spreads through a system when it is
booted from disk containing virus.
● Stealth virus: This virus hides the modification it has made in the file or boot record.
● Macro viruses: These are not executable. It affects Microsoft Word like documents,
they can spread through email.
● Email viruses: It gets executed when email attachment is open by the recipient. It
sends itself to everyone on the mailing list of sender.
● Metamorphic viruses: It keeps rewriting itself every time, it may change their
behavior as well as appearance code.
● Because a virus is spread by human action people will unknowingly continue the
spread of a computer virus by sharing infecting files or sending emails with viruses as
attachments in the email.
Worm:
● A worm is similar to a virus by design and is considered to be a sub-class of a virus.
● Worms spread from computer to computer, but unlike a virus, it has the capability to
travel without any human action.
● A worm takes advantage of file or information transport features on your system,
which is what allows it to travel unaided.
● The biggest danger with a worm is its capability to replicate itself on your system, so
rather than your computer sending out a single worm, it could send out hundreds or
thousands of copies of itself, creating a huge devastating effect. One example would
be for a worm to send a copy of itself to everyone listed in your e-mail address book.
● Then, the worm replicates and sends itself out to everyone listed in each of the
receiver's address book, and the manifest continues on down the line.
● Due to the copying nature of a worm and its capability to travel across networks the
end result in most cases is that the worm consumes too much system memory (or
network bandwidth), causing Web servers, network servers and individual computers
to stop responding.
● In recent worm attacks such as the much-talked-about Blaster Worm, the worm has
been designed to tunnel into your system and allow malicious users to control your
computer remotely.
i) The virus is the program code that i) The worm is code that replicates itself in
attaches itself to the application program order to consume resources to bring it
and when the application program runs it down.
runs along with it.
ii) It inserts itself into a file or executable ii) It exploits a weakness in an application
program. or operating system by replicating itself.
iii) Virus may need a trigger for execution. iii) Worms do not need any trigger.
iv) Virus is slower than worm. iv) Worm is faster than virus
vi) It deletes or modifies files. Sometimes a vi) It usually only monopolizes the CPU and
virus also changes the location of files. memory.
vii) It has to rely on users transferring vii) It can use a network to replicate itself to
SAHIL K
viii) Ex: Macro virus, Directory virus, viii) Ex: Code red
Stealth Virus
Insiders:
● More dangerous than outsiders, as they have the access and knowledge to cause
immediate damage to organization.
● They can be more in numbers who directly or indirectly access the organization.
● They may give remote access to the organization.
● Insiders are authorized users who try to access a system or network for which he is
unauthorized.
● Insiders are not hackers.
● Insiders are legal users.
● The insiders have the access and necessary knowledge to cause immediate damage to
an organization.
● There is no security mechanism to protect the system from Insiders.
● So they can have all the access to carry out criminal activity like fraud.
● They have knowledge of the security systems and will be better able to avoid
detection.
Ans:
Intruders Insiders
ii) Intruders are illegal users. ii) Insiders are legal users
iii) Less dangerous than insiders. iii) More dangerous than intruders.
iv) They do not have access to the system. iv) They may give remote access to the
organization.
vi) Keep trying attacks till success as they vi) Insiders are authorized users who try to
have the access and knowledge to cause access system or network for which he is
immediate damage to organization. unauthorized.
● The time limits on time bomb software are not usually as heavily enforced as they are
on trial software, since time bomb software does not usually implement secure clock
functions.
● Modification: Its under Integrity, Here the attacker may modify the values in the
database.
○ Replay
SAHIL K
○ Modification of messages
■ Modification of messages simply means that some portion of a
legitimate message is altered, or that messages are delayed or
reordered, to produce an unauthorized effect.
■ For example, a message meaning "Allow Ajay to read confidential
accounts" is modified to mean "Allow Vijay to read confidential
accounts.
○ Denial of Service(DoS)
■ Denial of service (DOS) attack scan exploits a known vulnerability in a
specific application or operating system, or they may attack features
(or weaknesses) in specific protocols or services.
■ In this form of attack, the attacker is attempting to deny authorized
users access either to specific information or to the computer system or
network itself.
Passive Attack:
● A passive attack monitors unencrypted traffic and looks for clear-text passwords and
sensitive information that can be used in other types of attacks.
● Passive attacks include
○ Traffic Analysis
○ Release of Message Contents
○ Monitoring of Unprotected Communications
○ Decrypting Weakly Encrypted Traffic
○ Capturing Authentication Information such as Passwords.
● Passive attacks are in the nature of eavesdropping on, or monitoring of, transmissions.
● The goal of the opponent is to obtain information that is being transmitted.
● The release of message contents is easily understood.
● A telephone conversation, an electronic mail message, and a transferred file may
contain sensitive or confidential information.
● We would like to prevent an opponent from learning the contents of these
transmissions.
● A second type of passive attack, traffic analysis.
● Suppose that we had a way of masking the contents of messages or other information
traffic so that opponents, even if they captured the message,could not extract the
information from the message.
● The common technique for masking contents is encryption.
SAHIL K
iii) Packet Injection Attack: The attacker injects malicious packets into a data stream to
disrupt communication, inject malware, or manipulate data.
iv) DNS Spoofing: Attackers manipulate DNS (Domain Name System) responses to redirect
users to malicious websites by providing false IP addresses for legitimate domain names.
Passive Attack:
i) Packet Sniffing: An attacker intercepts and monitors network traffic to capture sensitive
information, such as usernames and passwords, without altering the transmitted data.
iii) Traffic Analysis: Attackers analyze patterns and characteristics of network traffic, such
as frequency and size of data packets, to infer sensitive information without accessing the
actual content.
SAHIL K
iv) Brute Force Password Cracking (Offline): Attackers obtain encrypted password hashes
and attempt to decrypt them using various techniques, such as dictionary attacks or
exhaustive search.
● The target system will drop these connections after a specific time-out period, but if
the attacker sends requests faster than the time-out period eliminates them, the system
will quickly be filled with requests.
● The number of connections a system can support is finite,so when more requests
come in than can be processed, the system will soon be reserving all its connections
for fake requests.
● At this point, any further requests are simply dropped (ignored), and legitimate users
who want to connect to the target system will not be able to.
SAHIL K
● Bandwidth attacks: This DDoS attack overloads the target with massive amounts of
junk data. This results in a loss of network bandwidth and equipment resources and
can lead to a complete denial of service.
● Stacheldraht is a piece of software written by Random for Linux and Solaris Systems
which acts as a Distributed Denial of Service (DDoS) agent.
● This tool detects and automatically enables source address forgery.
● Stacheldraht uses a number of different DoS attacks, including UDP flood, ICMP
flood, TCP SYN flood and Smurf attack.
SAHIL K
DDOS ATTACK
● There are several backdoor programs and tools used by hackers in terms of automated
tools.
Trapdoor attacks:
● A trap door is an entrance in a system which circumvents the normal safety measures.
● It is a secret entry point into a program that allows someone who is aware of gaining
access using procedures other than security procedures.
● It might be a hidden program which makes the protection system ineffective.
● This entry can be deliberately introduced by the developer to maintain the system in
case of disaster management.
● Trapdoor programs can be installed through malware using the internet.
Spoofing:
● Spoofing is nothing more than making data look like it has come from a different
source.
● This is possible in TCP/ IP because of the friendly assumption behind the protocol.
● When the protocols were developed, it was assumed that individuals who had access
to the network layer would be privileged users who could be trusted.
● When a packet is sent from one system to another, it includes not only the destination
IP address and port but the source IP address as well which is one of the forms of
Spoofing.
Example of spoofing:
● E-mail Spoofing
● Caller ID Spoofing
● URL Spoofing
● IP Address Spoofing
● ARP Spoofing
● DNS Spoofing
ii) Spoofing
iii) Phishing
Ans:
i) Sniffing:
Example:
● Consider an unsecured public Wi-Fi network at a coffee shop.
● An attacker, using specialized software, sets up a sniffer to capture data packets
transmitted over the Wi-Fi.
● As unsuspecting users connect to the network and log in to their email or social media
accounts, the sniffer captures these packets, allowing the attacker to obtain login
credentials and potentially sensitive information.
ii) Spoofing:
● Spoofing is nothing more than making data look like it has come from a different
source.
● This is possible in TCP/ IP because of the friendly assumption behind the protocol.
● When the protocols were developed, it was assumed that individuals who had access
to the network layer would be privileged users who could be trusted.
● When a packet is sent from one system to another, it includes not only the destination
IP address and port but the source IP address as well which is one of the forms of
Spoofing.
Example:
● In a typical IP spoofing scenario, an attacker may send a network packet to a target
system with a forged source IP address.
● The goal is to make the target system believe that the packet is from a trusted source,
possibly allowing unauthorized access.
● For instance, the attacker might spoof the IP address to match that of a legitimate user
to gain access to restricted resources.
iii) Phishing:
SAHIL K
● Phishing is a cyber attack that involves tricking individuals into revealing sensitive
information, such as usernames, passwords, or financial details.
● Attackers often use deceptive emails, messages, or websites that appear legitimate to
lure victims into providing confidential data.
Example:
● An employee receives an email seemingly from their company's IT department,
stating that they need to update their login credentials to enhance security.
● The email includes a link that directs the user to a fake login page, designed to look
identical to the company's actual login portal.
● If the user enters their credentials on this fraudulent page, the attacker captures the
information, gaining unauthorized access to the user's account.
● Email Spoofing:
○ Email spoofing occurs when an attacker uses an email message to trick a
recipient into thinking it came from a known and/or trusted source.
○ These emails may include links to malicious websites or attachments infected
with malware, or they may use social engineering to convince the recipient to
freely disclose sensitive information.
● Caller ID Spoofing:
○ With caller ID spoofing, attackers can make it appear as if their phone calls are
coming from a specific number either one that is known and/or trusted to the
recipient, or one that indicates a specific geographic location.
○ Attackers can then use social engineering often posing as someone from a
bank or customer support to convince their targets to, over the phone, provide
SAHIL K
● Website Spoofing:
○ Website spoofing refers to when a website is designed to mimic an existing
site known and/or trusted by the user.
○ Attackers use these sites to gain login and other personal information from
users.
● IP Spoofing:
○ Attackers may use IP (Internet Protocol) spoofing to disguise a computer IP
address, thereby hiding the identity of the sender or impersonating another
computer system.
○ One purpose of IP address spoofing is to gain access to networks that
authenticate users based on IP addresses.
● ARP Spoofing:
○ Address Resolution Protocol (ARP) is a protocol that resolves IP addresses to
Media Access Control (MAC) addresses for transmitting data.
○ ARP spoofing is used to link an attacker's MAC to a legitimate network IP
address so the attacker can receive data meant for the owner associated with
that IP address.
○ ARP spoofing is commonly used to steal or modify data but can also be used
in denial-of-service and man-in-the-middle attacks or in session hijacking.
Q. Explain:
i) Main in the Middle attack
ii) Replay attack.
Ans:
i) Man in the Middle attack:
● A man in the middle attack occurs when attackers are able to place themselves in the
middle of two other hosts that are communicating in order to view or modify the
traffic.
● This is done by making sure that all communication going to or from the target host is
routed through the attacker's host.
● Then the attacker is able to observe all traffic before transmitting it and can actually
modify or block traffic.
SAHIL K
● To the target host, communication is occurring normally, since all expected replies are
received.
● Since the address has been changed intentionally it will be difficult to trace back to
the attacker.
● Using this concept the following types of attacks are normally carried out.
● In the case of a continual stream the target will be immediately under attack once it
reboots and will thus hang or reboot continually until something is done to stop it
receiving the attacker's packets.
SYN attacks:
● A SYN attack occurs when an attacker exploits the use of the buffer space during the
Transmission Control Protocol (TCP) session initialization - Three-way Handshake.
● The receiving machine (usually a server) can maintain multiple concurrent
conversations all established using the same small "inprocess" buffer pool.
Smurf attacks:
● Here a combination of IP address Spoofing and ICMP flooding are used to saturate a
target network with traffic so that the normal traffic is disrupted thereby causing a
Denial of Service (DoS) attack.
● Smurf attacks consist of the source site, the bounce site and the target site.
● First the attacker selects a bounce site (usually a very large network).
● The attacker then modifies a PING packet so that it contains the address of the target
site as the PING packet's source address.
ii) Hotfixes:
● Normally this term is given to small software updates designed to address a particular
problem like buffer overflow in an application that exposes the system to attacks.
iii) Upgrades:
● The term upgrade has a positive implication-you are moving up to a better, more
functional and more secure application.
SAHIL K
● Most vendors will release upgrades for fixes rather than any new or enhanced
functionality.
ii) Hot Fix: Normally this term is given to small software update designed to address a
particular problem like buffer overflow in an application that exposes the system to attacks.
iii) Patch: This term is generally applied to more formal, larger s/w updates that may address
several or many s/w problems. Patches often contain improvement or additional capabilities
& fixes for known bugs.
iv) Service Pack: A service pack is a collection of updates and fixes, called patches, for an
operating system or a software program. Many of these patches are often released before a
larger service pack, but the service pack allows for an easy, single installation.
OR
A service pack (SP) is an update, often combining previously released updates, that helps
make Windows more reliable. Service packs can include security and performance
improvements and support for new types of hardware.
2. Sensitive but Unclassified (SBU): Information that has been designated as a minor secret
but may not create serious damage if disclosed.
4. Secret: The unauthorized disclosure of this information could cause serious damage to the
countries national security.
5. Top Secret: This is the highest level of information classification. Any unauthorized
disclosure of top secret information will cause grave damage to the country’s national
security.
i) Useful life
● A data is labeled “more useful” when the information is available ready for making
changes as and when required.
● Data might need to be changed from time to time, and when the “change” access is
available, it is valuable data.
ii) Value
● This is probably the most essential and standard criteria for information classification.
● There is some confidential and valuable information of every organization, the loss of
which could lead to great losses for the organization while creating organizational
issues. Therefore, this data needs to be duly classified and protected.
iv) Age
● The value of information often declines with time.
● Therefore, if the given data or information comes under such a category, the data
classification gets lowered.
3. Companies implement tools and procedures to protect against these threats and to
comply with law and regulations.
● An approach of following closely behind a person who has just used their own access
card or PIN to gain physical access. In this way an attacker can gain access to the
facility without knowing the access code.
● An attacker positions themselves in such a way that he is able to observe the
authorized user entering the correct access code.
● Because of possible risks, many organizations do not allow their users to load
software or install new hardware without the information and help of administrators.
Organizations also restrict what an individual does by receiving emails.
● An attacker can get physical access to a facility then there are many chances of
obtaining enough information to enter into computer systems and networks. Many
organizations restrict their employees to wear identification symbols at work.
i) Confidentiality:
● The principle of confidentiality specifies that only sender and intended recipients
should be able to access the contents of a message.
● Confidentiality gets compromised if an unauthorized person is able to access the
contents of a message.
SAHIL K
ii) Integrity:
● When the contents of the message are changed after the sender sends it, but before it
reaches the intended recipient, we say that the integrity of the message is lost.
● For example, here user C tampers with a message originally sent by user A, which is
actually destined for user B. user C somehow manages to access it, change its
contents and send the changed message to user B. user B has no way of knowing that
the contents of the message were changed after user A had sent it. User A also does
not know about this change. This type of attack is called modification.
iii) Availability:
● The goal of availability is to ensure that the data, or the system itself, is available for
use when the authorized user wants it.
● The information created and stored by an organization needs to be available to
authorized entities. Information is useless if it is not available.
● Information needs to be constantly changed which means it must be accessible to
authorized entities.
● The unavailability of information is just as harmful for an organization as the lack of
confidentiality or integrity.
SAHIL K
2. Computer-generated passwords:
● Passwords are quite random in nature.
● Computer generated passwords also have problems.
● If the passwords are quite random in nature, users will not be able to remember them.
● Even if the password is pronounceable, the user may have difficulty remembering it
and so be tempted to write it down.
SAHIL K
Shoulder Surfing:
● Shoulder surfing is a similar procedure in which attackers position themselves in such
a way as-to be-able to observe the authorized user entering the correct access code or
data.
● Both of these attack techniques can be easily countered by using simple procedures to
ensure nobody follows you too closely or is in a position to observe your actions.
● Shoulder surfing is using direct observation techniques, such as looking over
someone's shoulder, to get information.
● Shoulder surfing is an effective way to get information in crowded places because it's
relatively easy to stand next to someone and watch as they fill out a form, enter a PIN
number at an ATM machine.
● Shoulder surfing can also be done long-distance with the idea of binoculars or other
vision-enhancing devices.
Dumpster diving:
● It is the process of going through a target's trash in order to find little bits of
information System attackers need a certain amount of information before launching
their attack.
● One common place to find this information, if the attacker is in the vicinity of the
target, is to go through the target's thrash in order to find little bits of information that
could be useful.
SAHIL K
● The process of going through the target's thrash is known as "dumpster diving".
● The search is carried out in waste paper, electronic waste such as old HDD, floppy
and CD media recycle and trash bins on the systems etc.
● If the attacker is lucky, the target has a poor security process; they may succeed in
finding user ID’s and passwords.
● If the password is changed and the old password is discarded, the lucky dumpster
driver may get a valuable clue.
To prevent piggybacking:
● Piggybacking can be prevented by ensuring that encryption is enabled in the router by
using Wireless Encryption Protocol (WEP) or Wireless Protected Access (WPA) or
WPA2.
● Using a strong password for the encryption key, consisting of at least 14 characters
and mixing letters and numbers.
● Biometric refers to the study of methods for uniquely recognizing humans based upon
one or more intrinsic physical or behavioral characteristics.
● Biometric identification is used on the basis of some unique physical attribute of the
user that positively identifies the user.
● Ex: fingerprint recognition, retina and face scan technic, voice synthesis and
recognition and so on.
● Physiology is related to the shape of the body.
● Ex: fingerprint, face recognition, DNA, palm print, iris recognition and so on.
● Behavior is related to the behavior of a person.
● Ex: typing rhythm, gait, signature and voice
1. Sensor
2. Preprocessing
3. Feature extractor
4. Template generator
5. Stored templates
6. Matcher
7. Application device
8. Enrollment
Step 1: During registration, the first time an individual uses a biometric system is called an
enrollment.
Step 3: In the verification process, biometric information is detected and compared with the
information stored at the time of enrolment.
Step 4: The first block (sensor) is the interface between the real world and the system; it has
to acquire all the necessary data.
Step 6: The third block extracts necessary features. This step is an important step as the
correct features need to be extracted in the optimal way.
Step 7: If enrollment is being performed the template is simply stored somewhere (on a card
or within a database or both).
Step 8: If a matching phase is being performed the obtained template is passed to a matcher
that compares it with other existing templates, estimating the distance between them using
any algorithm.
Step 9: The matching program will analyze the template with the input. This will then be
output for any specified use or purpose.
● The block diagram illustrates the two basic modes of a biometric system.
● First, in verification (or authentication) mode the system performs a one-to-one
comparison of a captured biometric with a specific template stored in a biometric
database in order to verify the individual is the person they claim to be.
● Three steps are involved in the verification of a person.
SAHIL K
● In the first step, reference models for all the users are generated and stored in the
model database.
● In the second step, some samples are matched with reference models to generate the
genuine and impostor scores and calculate the threshold.
● In third step is the testing step. This process may use a smart card, username or ID
number (e.g. PIN) to indicate which template should be used for comparison.
● The first time an individual uses a biometric system is called enrollment. During the
enrollment, biometric information from an individual is captured and stored.
● In subsequent uses, biometric information is detected and compared with the
information stored at the time of enrollment.
● Note that it is crucial that storage and retrieval of such systems themselves be secure
if the biometric system is to be robust.
● The first block (sensor) is the interface between the real world and the system; it has
to acquire all the necessary data. Most of the times it is an image acquisition system,
but it can change according to the characteristics desired.
● The second block performs all the necessary pre-processing: it has to remove artifacts
from the sensor, to enhance the input (e.g. removing background noise), to use some
kind of normalization, etc.
● In the third block necessary features are extracted. This step is an important step as
the correct features need to be extracted in the optimal way.
● During the enrollment phase, the template is simply stored somewhere (on a card or
within a database or both).
● During the matching phase, the obtained template is passed to a matcher that
compares it with other existing templates, estimating the distance between them using
any algorithm (e.g. Hamming distance).
● The matching program will analyze the template with the input.
● Selection of biometrics in any practical application depending upon the characteristic
measurements and user requirements.
SAHIL K
● Profitable:
○ The return on investment (ROI) on a biometric security system is very high.
○ For one, it's much more effective at avoiding fraud than most security systems,
protecting your business from potentially catastrophic breaches.
● Identification accuracy:
○ Since every individual on the planet possesses unique physiological features
that can't be easily swapped, shared, or stolen, biometric identification has the
potential to accurately identify someone without a shadow of a doubt nearly
100% of the time.
○ Occasionally, the ability to accurately identify someone can be affected by
environmental, age, or skin integrity issues, but with a multimodal biometric
identification system you can eliminate those factors.
○ Multiple biometric attributes can identify someone with 100% certainty every
time you scan them.
● Difficult to forge:
○ Biometric attributes are almost impossible to forge or duplicate.
SAHIL K
● Establishes accountability:
○ Implementation of a biometric identification solution creates a concrete
activity audit trail to help establish accountability.
○ Each and every action or transaction will be recorded and clearly documented
by the individual associated with it which reduces the possibility of system
misuse and fraud.
● Adds convenience:
○ Biometric technology makes individual identification convenient without the
need to carry around ID cards or remember complicated passwords.
○ Due to the fact that passwords can be forgotten or easily guessed and the fact
that ID cards can be damaged, swapped, or shared, biometrics are more
convenient because individual physiological attributes are always with you.
Fingerprint patterns:
● The three basic patterns of fingerprint ridges are the arch, loop and whorl.
● An arch is a pattern where the ridges enter from one side of the finger, rise in the
center forming an arc, and then exit the other side of the finger.
● The loop is a pattern where the ridges enter from one side of a finger, form a curve,
and tend to exit from the same side they enter.
● In the whorl pattern, ridges form circularly around a central point on the finger.
● A retinal scan is a biometric technique that uses the unique patterns on a person's
retina to identify them.
● The human retina is a thin tissue composed of neural cells that is located in the
posterior portion of the eye.
● Because of the complex structure of the capillaries that supply the retina with blood,
each person's retina is unique.
● A biometric identifier known as a retinal scan is used to map the unique patterns of a
person's retina.
● The blood vessels within the retina absorb light more readily than the surrounding
tissue and are easily identified with appropriate lighting.
● A retinal scan is performed by casting an unperceived beam of low-energy infrared
light into a person's eye as they look through the scanner's eyepiece.
● This beam of light traces a standardized path on the retina.
● Because retinal blood vessels are more absorbent of this light than the rest of the eye,
the amount of reflection varies during the scan.
● The pattern of variations is converted to computer code and stored in a database.
● It is the ability to specify, control and limit the access to the host system or
application, which prevents unauthorized use to access or modify data or resources.
● It can be represented using Access Control Matrix or List:
Availability: The goal of availability s to ensure that the data, or the system itself, is available
for use when the authorized user wants it.
Authentication:
● Authentication helps to establish proof of identities.
● The Authentication process ensures that the origin of a message is correctly identified.
● For example, suppose that user C sends a message over the internet to user B.
However, the trouble is that user C had posed as user A when he sent a message to
user B. How would user B know that the message has come from user C, who is
posing as user A? This concept is shown in fig. below.
Authorization:
● Authorization is a security mechanism used to determine user/client privileges or
access levels related to system resources, including computer programs, files,
services, data and application features.
● Authorization is normally preceded by authentication for user identity verification.
● System administrators (SA) are typically assigned permission levels covering all
system and user resources.
● During authorization, a system verifies an authenticated user's access rules and either
grants or refuses resource access.
Ans:
Authorization:
● In computing systems, authorization is the process of determining which permissions
a person or system is supposed to have.
● In multi-user computing systems, a system administrator defines which users are
allowed access to the system, as well as the privileges of use for which they are
eligible (e.g., access to file directories, hours of access, amount of allocated storage
space).
● Authorization can be seen as both the preliminary setting of permissions by a system
administrator, and the actual checking of the permission values when a user obtains
access.
● Authorization is usually preceded by authentication.
Authentication:
● Authentication is the process of determining whether someone or something is, in
fact, who or what it is declared to be.
● To access most technology services of Indiana University, you must provide such
proof of identity.
● In private and public computer networks (including the Internet), authentication is
commonly done through the use of login passwords or passphrases; knowledge of
such is assumed to guarantee that the user is authentic.
● Thus, when you are asked to "authenticate" to a system, it usually means that you
enter your username and/or password for that system.
Authentication:
● Authentication is the process of determining the identity of a user or other entity.
● It is performed during logon process where the user has to submit his/her username
and password.
● There are three methods used in it.
○ Something you know User knows user id and password.
○ Something you have a Valid user has lock and key.
○ Something about your User’s unique identity like fingerprints, DNA etc.
Access control is to specify, control and limit the access to the host system or application,
which prevents unauthorized use to access or modify data or resources.
1. Owner-based Control: DAC allows owners of resources (files, folders, etc.) to have
discretion over access permissions. The owner can decide who has access to the resource and
what actions they can perform.
2. Access Control Lists (ACLs): DAC is often implemented using Access Control Lists
(ACLs), which are lists associated with resources specifying the permissions granted to
individual users or groups.
4. User Identity Basis: Access decisions are made based on the identity of the user making
the access request. Each user may have a different set of permissions for a particular resource.
6. Commonly Used in File Systems: DAC is commonly applied to file systems in operating
systems, where owners of files or directories can control who can access, modify, or delete
their resources.
7. Inherent Limitations: DAC relies on the integrity of user accounts. If a user's credentials
are compromised, the associated permissions can be exploited, making it susceptible to
abuse.
11. Granularity: DAC allows for granular control over access, enabling owners to specify
different permissions for different users or groups on the same resource.
ii) MAC:
SAHIL K
1. Policy-based Control:
● MAC relies on security policies defined by a central authority to control access.
● Access decisions in MAC are based on predefined policies rather than the discretion
of individual resource owners.
2. Security Labels:
● MAC uses security labels to categorize and control access to resources.
● Each resource (object) and user (subject) is assigned a security label, and access is
granted or denied based on the comparison of these labels according to the security
policy.
5. Centralized Administration:
● MAC is centrally administered by a designated authority.
● Unlike DAC, access control decisions are not decentralized; they are managed by a
central administrator or security policy manager.
6. Compartmentalization:
● MAC often includes compartmentalization to separate sensitive information.
● Different compartments or security domains are established, and access between them
is tightly controlled to prevent unauthorized data flow.
8. Limited Flexibility:
● MAC may have less flexibility compared to DAC.
● While providing robust security, MAC systems may be less adaptable to changes or
dynamic environments due to the rigid enforcement of security policies.
● Instead, access decisions are based on the security labels associated with the subjects
and objects, reducing the reliance on user identities.
Scalability Less scalable for Scalable for smaller Scalable for various
large systems systems system sizes
UNIT 3 - Cryptography
(ii) Cipher text: It is an encrypted text. When plain text is converted using encryption, this
encrypted text is called ciphertext.
(iii) Cryptography: Cryptography is the art & science of achieving security by encoding
messages to make them non-readable.
(v) Cryptology: It is the art and science of transforming the intelligent data into unintelligent
data and unintelligent data back to intelligent data.
Cryptography + Cryptanalysis = Cryptology
i) Data Hiding: The original use of cryptography is to hide something that has been written.
ii) Digitally Code: Cryptography can also can be applied to software, graphics or voice that
is, it can be applied to anything that can be digitally coded.
iii) Electronic payment: When electronic payments are sent through a network, the biggest
risk is that the payment message will alter or bogus messages introduced and the risk that
someone reads the messages may be minor significance.
iv) Message Authentication: One cannot entirely prevent someone from tampering with the
network and changing the message, but if this happens it can certainly be detected. This
process of checking the integrity of the transmitted message is often called message
authentication. The most recent and useful development in the uses of cryptography is the
digital signature.
Decryption: The reverse process of transforming ciphertext messages back to plain text
messages is called decryption.
SAHIL K
● The plaintext letter is then encrypted to the ciphertext letter on the sliding ruler
underneath. The result of this process is depicted in the following illustration for an
agreed shift of three positions. In this case, the plaintext 'tutorial' is encrypted to the
ciphertext 'WXWRULDO'. Here is the ciphertext alphabet for a Shift of 3 -
Plain text a b c d e f g h i j k l m n o p q r s t u v w x y z
Alphabet
Cipher d e f g h i j k l m n o p q r s t u v wx y z a b c
text
alphabet
● On receiving the cipher text, the receiver who also knows the secret shift, positions
his sliding ruler underneath the ciphertext alphabet and slides it to RIGHT by the
agreed shift number, 3 in this case.
● He then replaces the cipher text letter by the plaintext letter on the sliding ruler
underneath. Hence the ciphertext 'WXWRULDO' is decrypted to 'tutorial'. To decrypt
a message encoded with a Shift of 3, generate the plaintext alphabet using a shift of
‘-3’ as shown below-
Cipher x y z a b c d e f g h i j k l m n o p q r s t u v w
text
alphabet
Security Value: Caesar Cipher is not a secure cryptosystem because there are only 26
possible keys to try out. An attacker can carry out an exhaustive key search with available
limited computing resources
For example, here's the Caesar Cipher encryption of a full message, using a left shift of 3.
Plaintext: THE QUICK BROWN FOX JUMPS OVER THE LAZY DOG
Cipher text: QEB NRFZH YOLTK CLU GRJMP LSBO QEB IXWV ALD
Q. Consider plain text “CERTIFICATE” and convert it into cipher text using Caesar
Cipher with a shift of position of 4. Write steps for encryption.
Ans:
Plaintext C E R T I F I C A T E
Alphabet
Cipherte G I V X M R M W M R K
SAHIL K
xt
Alphabet
Ciphertext: GIVXRMWMRK
● In order to encrypt a plaintext letter, the sender positions the sliding ruler underneath
the first set of plaintext letters and slides it to LEFT by the number of positions of the
secret shift.
● The plaintext letter is then encrypted to the ciphertext letter on the sliding ruler
underneath. The result of this process is depicted in the above illustration for an
agreed shift of four positions.
Q. Consider plain text “INFORMATION” and convert given plaintext into ciphertext
using ‘Caesar Cipher’ with shift of position three-write down steps in encryption.
Ans:
Plaintext: INFORMATION
Key: 3 Shift
A translation chart for the given plain text is as follows:
Plain text a b c d e f g h i j k l m n o p q r s t u v w x y z
Alphabet
Cipher d e f g h i j k l m n o p q r s t u v wx y z a b c
text
alphabet
Cipherte L Q I R U P D W L R Q
xt
Alphabet
Q. Consider plaintext “gov polytechnic” and convert given plaintext into ciphertext
using algorithm and key “play fair example”.
Ans:
SAHIL K
P L A Y F
I R E X M
B C D G H
K N O Q S
T U V W Z
Q. Explain transposition technique. Convert plain text to Cipher text using Rail Fence
technique "COMPUTER ENGINEERING".
Ans: Transposition Technique:
● Transposition systems are fundamentally different from substitution systems.
● In substitution systems, plaintext values are replaced with other values.
● In transposition systems, plaintext values are rearranged without otherwise changing
them.
● All the plaintext characters that were present before encipherment are still present
after encipherment.
● Only the order of the text changes.
● Most transposition systems rearrange text by single letters.
● It is possible to rearrange complete words or groups of letters rather than single
letters, but these approaches are not very secure and have little practical value.
● Larger groups than single letters preserve too much recognizable plaintext.
● Some transposition systems go through a single transposition process.
○ These are called single transpositions.
○ Others go through two distinctly separate transposition processes. These are
called double transpositions.
● When a plain text message is codified using any suitable scheme, the resulting
message is called Ciphertext or Cipher.
Steps are:
C M U E E G N E I G
O P T R N I E R N
Q. Consider plain text "Network Security", encrypt it with help of Rail Fence
technique, also write the algorithm.
Ans: Rail Fence Technique: It is one of the easiest transposition techniques to create cipher
text. When a plain text message is codified using any suitable scheme, the resulting message
is called Ciphertext or Cipher.
Steps are:
N T O K E U I Y
E W R S C R T
4. It involves writing plain text in a diagonal sequence and then reading it row by row to
produce ciphertext.
Algorithm:
1. The message is written out in rows of a fixed length.
2. Read out again column by column according to given order or in random order.
3. According to the order, write cipher text.
Example:
The key for the columnar transposition cipher is a keyword e.g. ORANGE. The row length
that is used is the same as the length of the keyword.
To encrypt a below plaintext COMPUTER PROGRAMMING
O R A N G E
C O M P U T
E R P R O G
R A M M I N
G L E X X M
In the above example, the plaintext has been padded so that it neatly fits in a rectangle. This
is known as a regular columnar transposition. An irregular columnar transposition leaves
these characters blank, though this makes decryption slightly more difficult. The columns are
now reordered such that the letters in the key word are ordered alphabetically.
5 6 1 4 3 2
O R A N G E
C O M P U T
E R P R O G
R A M M I N
SAHIL K
G L E X X M
The Encrypted text or Cipher text is: MPMET GNMUO IXPRM XCERG ORAL (Written in
blocks of Five)
Q. Convert plain text into cipher text by using simple columnar technique of the
following sentence: 'ALL IS WELL FOR YOUR EXAM'.
Ans:
● The columnar transposition cipher is a transposition cipher that follows a simple rule
for Mixing up the characters in the plaintext to form the cipher-text.
● It can be combined with other ciphers, such as a substitution cipher, the combination
of which can be more difficult to break than either cipher on its own.
● The cipher uses a columnar transposition to greatly improve its security.
Algorithm:
1. The message is written out in rows of a fixed length.
2. Read out again column by column according to given order or in random order.
3. According to the order , write cipher text.
Example:
The key for the columnar transposition cipher is a keyword e.g. MANGO
The row length that is used is the same as the length of the keyword.
To encrypt a below plaintext: ALL IS WELL FOR YOUR EXAM
3 1 4 2 5
M A N G O
A L L I S
W E L L F
O R Y O U
R E X A M
Q. Convert the given plain text into cipher text using simple columnar technique using
the following data:
● Plain text: NETWORK SECURITY
● Number of columns: 6
● Encryption Key: 632514
SAHIL K
Ans:
6 3 2 5 1 4
N E T W O R
K S E C U R
I T Y
ii) Guessing the key is easy. ii) Bit difficult to find a key.
iv) Ex: Caesar Cipher. iv) Ex: Rail Fence Technique / Columnar
Technique
● Cover media is the file in which we will hide the hidden data, which may also be
encrypted using stego-key.
● The resultant file is stego-medium.
SAHIL K
● Cover media is the file in which we will hide the hidden data, which may also be
encrypted using stego-key.
● The resultant file is stego- medium. Cover-media can be image or audio file.
Advantages:
1. With the help of steganography we can hide secret messages within graphics images.
SAHIL K
2. In modern Steganography, data is encrypted first and then inserted using a special
algorithm so that no one suspects its existence.
Drawbacks:
1. It requires a lot of overhead to hide a relatively few bits of information.
2. Once the system is discovered, it becomes virtually worthless.
Asymmetric-Key cryptography:
● It is also called public key cryptography.
● In public key cryptography two keys: a private key and a public key is used.
● Encryption is done through the public key and decryption through private key.
● Receiver creates both the keys and is responsible for distributing its public key to the
communication community.
● Example: The sender (say John) uses the public key to encrypt the plain text into
cipher text and the receiver (say Bob) uses his private key to decrypt the cipher text.
Key used for Same key is used for encryption Different keys for encryption &
encryption & decryption. decryption.
/decryption
Size of resulting Usually same as or less than the More than the original clear text
encrypted text original clear text size. size.
Usage Mainly used for encryption and Can be used for both encryption /
decryption, can't be used for decryption and digital signature.
digital signature.
Efficiency in usage It is often used for long messages. It is more efficient for short
messages.
Q. Explain DES algorithm. Explain each step in detail with the help of a diagram.
Ans:
● The Data Encryption Standard is generally used in the ECB, CBC, or the CFB mode.
DES is a block cipher.
● It encrypts data in blocks of size 64 bits each.
● That is, 64 bits of plain text goes as the input to DES, which produces 64 bits of
ciphertext.
● DES is based on the two fundamental attributes of cryptography: substitution and
transposition.
● The process diagram as follows:
● It happens only once. It replaces the first bit of the original plain text block with the
58th bit of the original plain text block, the second bit with the 50th bit of original plain
text block and so on.
● The resulting 64-bits permuted text block is divided into two half blocks.
● Each half block consists of 32 bits.
● The left block is called LPT and the right block is called RPT.
● 16 rounds are performed on these two blocks.
● Details of one round in DES.
Expansion Permutation
Key Transformation
S-box substitution
XOR and swap
P-box Permutation
Q. Find the output of the initial permutation box when the input is given in hexadecimal
as: 0x0002 0000 0000 0001
Ans:
0x0002 0000 0000 0001
=> 0000000000000010 0000000000000000 0000000000000000 0000000000000001
The input has only two 1s (bit 15 and bit 64); the output must also have only two 1s (the
nature of straight permutation). Bit 15 in the input becomes bit 63 in the output. Bit 64 in the
input becomes bit 25 in the output. So the output has only two 1s, bit 25 and bit 63.
Digital Signature:
1. A digital signature performs the same function as its physical counterpart, the sender
"marks" the message so that the recipients can verify that the message really came
from the sender.
2. The process of digitally signing a message starts with the creation of a unique identity
for the message. The unique identifier can be created using a mathematical technique
called Hashing.
3. A hash function uses a mathematical algorithm to convert the message into a short
fixed-length of bits, often referred to as a "hash value" or "message digest" that
uniquely represents the message used to create it.
4. The hash value is specific to the contents of the message. Thus any change to the
message contents will change the hash value that would be generated by the hash
function.
5. Next, the hash value is encrypted using the sender's private key. Finally, the message
is sent along with the encrypted hash value.
6. On receiving the message and the encrypted hash value, the recipient can only decrypt
the hash value using the sender's public key.
7. This confirms that the message came from the sender and no one else, as long as the
sender's private key remains secure. The message can be rehashed and compared with
the decrypted hash value-if the values do not match, then the message has been
altered since it was the same.
Q. Explain the need for a firewall and explain one of the types of firewall with a
diagram.
Ans:
SAHIL K
Capabilities:
● To achieve this all access to the local network must first be physically blocked and
access only via the firewall should be permitted.
● As per local security policy traffic should be permitted.
● The firewall itself must be strong enough so as to render attacks on it useless.
Types of Firewalls:
i) Packet Filter Firewall
ii) Circuit Level Gateway Firewall
iii) Application Gateway Firewall
iv) Stateful Multilayer Inspection Firewall
v) Software Firewall
vi) Hardware Firewall
vii) Hybrid Firewall
OR
OR
OR
OR
SAHIL K
Working:
1. A packet filtering router firewall applies a set of rules to each packet and based on
outcome, decides to either forward or discard the packet. Such a firewall
implementation involves a router, which is configured to filter packets going in either
direction i.e. from the local network to the outside world and vice versa.
2. A packet filter performs the following functions.
a. Receive each packet as it arrives.
b. Pass the packet through a set of rules, based on the contents of the IP and
transport header fields of the packet. If there is a match with one of the set
rules, decide whether to accept or discard the packet based on that rule.
c. If there is no match with any rule, take the default action. It can be discard all
packets or accept all packets.
OR
Purpose of Proxy Servers, following are the reasons to use proxy servers:
● Monitoring and Filtering
● Improving performance
● Translation
● Accessing services anonymously
● Security
3. Translation
● It helps to customize the source site for local users by excluding source content or
substituting
● Source content with original local content.
● In this the traffic from the global users is routed to the Source website through
Translation proxy.
5. Security
● Since the proxy server hides the identity of the user hence it protects from spam and
the hacker attacks.
● A firewall that filters information at the application level blocks all IP traffic between
the private network and the Internet.
● No IP packets from the clients or servers of the private network are allowed to enter
or leave the Internet.
● Instead, this type of firewall operates according to what is referred to as the proxy
principle.
● This means that internal clients set up connections to the firewall and communicate
with a proxy server.
SAHIL K
● If the firewall decides that the internal client should be allowed to communicate, it
sets up a connection with the external server and performs the operation on behalf of
the client. This method solves many of the security problems associated with IP.
● In addition to providing the best security, the proxy firewall can be used to fetch and
store information from the Internet in a cache memory.
● The proxy firewall can achieve short response and download times because it
"understands" the application programs and can see which URLs are most in demand.
● Like a circuit level gateway, an application level gateway intercepts incoming and
outgoing packets, acts as a proxy for applications, providing information exchange
across the gateway.
● It also functions as a proxy server, preventing any direct connection between a trusted
server or client and an untrusted host.
● The proxies that an application level gateway runs often differ in two important ways
from the circuit level gateway:
○ The proxies are application specific
○ The proxies examine the entire packet and can filter packets at the application
layer of the OSI model.
OR
SAHIL K
● Unlike the circuit gateway, the application level gateway accepts only packets
generated by services. They are designed to copy, forward and filter.
● For example, only an HTTP proxy can copy, forward and filter HTTP traffic.
● If a network relies only on an application level gateway, incoming and outgoing
packets cannot access services for which there is no proxy.
● For example, if an application level gateway ran ITP and HTTP proxies, only packets
generated by these services could pass through the firewall.
● All other services would be blocked.
● The application level gateway runs proxies that examine and filter individual packets,
rather than simply copying them and recklessly forwarding them across the gateway.
● Application specific proxies check each packet that passes through the gateway,
verifying the contents of the packet up through the application layer (layer 7) of the
OSI model.
● These proxies can filter on particular information or specific individual commands in
the application protocols the proxies are designed to copy, forward and As an
example, an application level proxy is able to block FTP put commands while
permitting FTP get commands.
● An application level gateway fitters information at a higher OSI layer than the
common static or dynamic packet filter, and most automatically create any necessary
packet filtering rules, usually making them easier to configure then traditional packet
filters.
Advantages:
● Better logging handling of traffic (because all data between the client and the server is
routed through the application proxy it is able to both control the session and provide
detailed logging; This ability to log and control all incoming and outgoing traffic is
one of the main advantages of application level gateway
● State aware of services (FTP, XII, etc.)
● Packet air gap like architecture, i.e. breaks direct connection to server behind firewall
eliminating the risk of an entire class of covert channel attacks
● Strong application proxy that inspects protocol header lengths can eliminate an entire
class of buffer overrun attacks
● Highest level of security.
Disadvantages:
● A poor implementation that relies on the underlying as Inetd daemon will suffer from
a severe limitation to the number of allowed connections in today's demanding high
simultaneous session environment.
● Complex setup of application firewall needs more and detailed attentions to the
applications that use the gateway.
OR
Limitations of firewall:
1. A firewall can't set itself up correctly.
2. Firewalls don't deal with the real problem.
3. A firewall can't fully protect against viruses.
4. Firewall can't protect you against malicious insiders.
5. A firewall can't protect against completely new threats.
6. Firewalls cannot protect against what has been authorized.
7. It cannot stop attacks if the traffic does not pass through them.
8. They are only as effective as the rules they are configured to enforce.
9. A firewall can't protect you against connections that don't go through it.
10. Firewalls cannot fix poor administrative practices or poorly designed security
policies.
11. It cannot stop social engineering attacks or an unauthorized user intentionally using
their access for unwanted purposes.
OR
● It avoids outside users from getting direct access to a company's data server. A DMZ
is an optional but more secure approach to a firewall. It can effectively act as a proxy
server.
● The typical DMZ configuration has a separate computer or host in the network which
receives requests from users within the private network to access a web site or public
network.
● Then the DMZ host initiates sessions for such requests on the public network but it is
not able to initiate a session back into the private network. It can only forward packets
which have been requested by a host.
● The public network's users who are outside the company can access only the DMZ
host.
● It can store the company's web pages which can be served to the outside users. Hence,
the DMZ can't give access to the other company's data.
● By any way, if an outsider penetrates the DMZ's security the web pages may get
corrupted but other company's information can be safe.
SAHIL K
Example:
1) Web servers:
● It’s possible for web servers communicating with internal database servers to be
deployed in a DMZ.
● This makes internal databases more secure, as these are the repositories responsible
for storing sensitive information.
● Web servers can connect with the internal database server directly or through
application firewalls, even though the DMZ continues to provide protection.
2) DNS servers:
● A DNS server stores a database of public IP addresses and their associated hostnames.
● It usually resolves or converts those names to IP addresses when applicable. DNS
servers use specialized software and communicate with one another using dedicated
protocols. Placing a DNS server within the DMZ prevents external DNS requests
from gaining access to the internal network. Installing a second DNS server on the
internal network can also serve as additional security.
3) Proxy servers:
● A proxy server is often paired with a firewall. Other computers use it to view Web
pages.
● When another computer requests a Web page, the proxy server retrieves it and
delivers it to the appropriate requesting machine.
● Proxy servers establish connections on behalf of clients, shielding them from direct
communication with a server.
● They also isolate internal networks from external networks and save bandwidth by
caching web content.
2) Analysis Engine: examines collected network traffic & compares it to known patterns
of suspicious or malicious activity stored in digital signature. The analysis engine act
like a brain of IDS.
4) User Interface & Reporting: interfaces with human element, providing alerts when
suitable & giving the user a means to interact with & operate the IDS.
IDS are mainly divided into two categories, depending on monitoring activity:
1) Host-based IDS
2) Network based IDS
1) Host based IDS looks for certain activities in the log files are:
● Logins at odd hours
● Login authentication failure.
● Adding new user account
● Modification or access of critical systems files.
● Modification or removal of binary files
● Starting or stopping processes.
● Privilege escalation
● Use of certain program
● Tunneling
● Brute force attacks
Q. Describe the components of NIDS with a neat diagram. State its advantages &
disadvantages.
Ans:
1. Traffic collection:
● Collects activity as events from IDS to examine.
● On Host-based IDS, this can be log files, Audit logs or traffic coming to or
leaving a system.
● On network based IDS, this is typically a mechanism for copying traffic of
network links.
SAHIL K
2. Analysis Engine:
● Examines collected network traffic & compares it to known patterns of
suspicious or malicious activity stored in digital signature.
● The analysis engine act like a brain of IDS.
4. User Interface & Reporting: Interfaces with human element, providing alerts when
suitable & giving the user a means to interact with & operate the IDS.
● Analysis Engine: This component examines the collected network traffic & compares
it to known patterns of suspicious or malicious activity stored in the signature
database. The analysis engine acts like a brain of the IDS.
● User Interface & Reporting: This is the component that interfaces with the human
element, providing alerts & giving the user a means to interact with & operate the
IDS.
Advantages:
1. Operating System specific and detailed signatures.
2. Examine data after it has been decrypted.
3. Application specific.
4. Determine whether or not an alarm may impact that specific.
Disadvantages:
1. Should have a process on every system to watch.
2. High cost of ownership and maintenance.
3. Uses local system resources.
4. If logged locally, could be compromised or disable.
Ans:
Network Intrusion Detection System (NIDS) Features:
1. Traffic Monitoring:
- Description: NIDS monitors network traffic in real-time to identify suspicious or
malicious activities.
- Significance: It helps in detecting anomalies and potential security threats within the
network.
2. Signature-Based Detection:
- Description: NIDS uses predefined signatures or patterns to identify known attack
patterns or malicious activities.
- Significance: This approach is effective in recognizing well-established threats and attack
patterns.
3. Anomaly-Based Detection:
- Description: NIDS identifies deviations from normal network behavior and raises alerts
when abnormal patterns are detected.
- Significance: Enables detection of previously unknown or emerging threats based on
unusual network activities.
4. Packet Inspection:
- Description: NIDS examines individual packets of data, inspecting headers and payloads
to identify potential security issues.
- Significance: Allows for a granular analysis of network traffic to uncover specific details
about potential threats.
5. Real-Time Alerts:
- Description: NIDS generates real-time alerts or notifications when suspicious activity is
detected.
- Significance: Enables prompt response to potential security incidents, minimizing the
impact of threats.
6. Network Segmentation:
- Description: NIDS can operate in segmented network environments, monitoring specific
network segments or zones.
- Significance: Provides focused monitoring and detection capabilities in different parts of
the network.
- Significance: Offers insights into potential threats at the host level, such as unauthorized
access or suspicious system changes.
3. Behavioral Analysis:
- Description: HIDS observes the behavior of applications and processes running on a host
to identify abnormal activities.
- Significance: Enhances the ability to detect sophisticated and targeted attacks that may
evade traditional signature-based detection.
Data Source iii) Host logs and activities iii) Network traffic and packets
HONEYPOT
● Honeypots are designed to purposely engage and deceive hackers and identify
malicious activities performed over the Internet.
● The honeypots are designed to do the following:
1. Divert the attention of a potential attacker.
2. Collect information about the intruder’s action.
3. Provide encouragement to the attacker so as to stay for some time, allowing
the administrations to detect this and swiftly act on this
1. Production Honeypots:
● Objective: Production honeypots are deployed within a live network
environment with the main goal of detecting and mitigating real-world attacks.
● Deployment: They are typically placed alongside legitimate production
systems to divert and identify malicious activities targeting those systems.
● Usage: Production honeypots contribute to the overall security of a network
by providing early detection and response to threats.
SAHIL K
2. Research Honeypots:
● Objective: Research honeypots are designed for studying and analyzing the
tactics, techniques, and procedures of attackers. They are often used by
security researchers and professionals to gather insights into emerging threats.
● Deployment: Research honeypots are typically deployed in controlled
environments and may emulate a variety of systems or services to attract a
wide range of attacks.
● Usage: The primary purpose is to gather threat intelligence, understand attack
patterns, and enhance cybersecurity knowledge.
● Example: A research honeypot might be set up to emulate a vulnerable IoT
device to observe how attackers exploit vulnerabilities in such devices.
Step 1: The Authentication Server (AS) receives the request from the client and then AS
verifies the client. This is done by just looking into a simple database of the User’s ID.
SAHIL K
Step 2:
● After verification, a time stamp is created.
● It will put the current time in the user session with an expiry date.
● Then the encryption key is created.
● The timestamp says that after 8 hours the encryption key is useless.
Step 3:
● The key is sent back to the client in the form of a Ticket-Granting Ticket (TGT).
● It is a simple ticket which is issued by the Authentication Server (AS) and used for
authenticating the client for future reference.
Step 4: Then the client submits this TGT to the Ticket Granting Server (TGS), for
authentication.
Step 5: TGS creates an encrypted key with a time stamp and grants a service ticket to the
client.
SAHIL K
Step 6: Then the client decrypts the ticket, intimate the TGS that is done and sends its own
encrypted key to the service server or application.
Step 7:
● The service server decrypts the key sent by the client and checks the validity of the
timestamp.
● If the timestamp is valid, the service server contacts the key distribution center to
receive a session which is returned to the client.
Step 8: The client then decrypts the ticket. If the key is still valid then the communication is
initiated between client and server.
SAHIL K
● Tunnel mode:
○ In tunnel mode, IPsec protects the entire IP datagram.
○ It takes an IP datagram, adds the IPSec header and trailer and encrypts the
whole thing.
○ It then adds a new IP header to this encrypted datagram.
● Transport mode:
○ Transport mode does not hide the actual source and destination addresses.
○ They are visible in plain text, while in transit.
○ In the transport mode, IPSec takes the transport layer payload, adds IPSec
header and trailer, encrypted datagram.
2. Encapsulating Security Payload (ESP): ESP, on the other hand, offers confidentiality,
integrity, and optional authentication for the packet's payload, securing the actual data being
transferred within the IP packet.
i) Next header: The 8-bit next header field defines the type of payload carried by the IP
datagram (such as TCP, UDP, ICMP, or OSPF).
v) Authentication data: The authentication data field is the result of applying a hash function
to the entire IP datagram except for the fields that are changed during transit (e.g.,
time-to-live).
OR
Transport Mode:
● Transport mode does not hide the actual source and destination addresses.
● They are visible in plain text, while in transit.
● In the transport mode, IPSec takes the transport layer payload, adds IPSec header and
trailer, encrypts the whole thing and then adds the IP header.
● Thus the IP header is not encrypted.
SAHIL K
OR
● The body is the main part of the message while the header includes information such
as the sender and recipient address.
● The header also includes descriptive information such as the subject of the message.
● In this case, the message body is like a letter and the header is like an envelope that
contains the recipient's address.
2. Submission of Mail:
● After composing an email, the mail client then submits the completed email to the
SMTP server by using SMTP on TCP port 25.
3. Delivery of Mail:
● E-mail addresses contain two parts: username of the recipient and domain name.
● For example, [email protected], where "vivek" is the username of the recipient and
"gmail.com" is the domain name.
● If the domain name of the recipient's email address is different from the sender's
domain name, then MSA will send the mail to the Mail Transfer Agent (MTA).
● To relay the email, the MTA will find the target domain.
● It checks the MX record from the Domain Name System to obtain the target domain.
● The MX record contains the domain name and IP address of the recipient's domain.
● Once the record is located, MTA connects to the exchange server to relay the
message.
Ans: Privacy Enhanced Mail (PEM) supports the 3 main cryptographic functions of
encryption, nonrepudiation and message integrity. The steps involved in PEM operation as
follows.
Step 3: Encryption: The original email and the digital signature are encrypted together with
a symmetric key:
SAHIL K
Step 2: Compression:
● The input message as well as p digital signature are compressed together to reduce the
size of the final message that will be transmitted.
● For this the Lempel -Ziv algorithm is used.
Step 3: Encryption:
● The compressed output of step 2 (i.e. the compressed form of the original email and
the digital signature together) are encrypted with a symmetric key.
Step 1: Y will see which CA signed X's certificate and compare it to the list of CAs he has
configured.
Step 2: If X's certificate is in the list of trusted CAs, then he will pass X's certificate through
hashing algorithm which will result in Message digest A.
Step 3: Every certificate has a different encrypted Message digest value embedded within
it,which is a Digital signature. Y takes CA's public key and decrypts the embedded Digital
signature value which is called decrypted DS value B.
Step 4: If value A & B matches then Y can be assured that this CA has actually created a
certificate.
Step 5: Y needs to be ensured that the issuing CA has not revoked this certificate.
Step 6: Y will compare the email address which is inserted by CA in the certificate with the
address that sent this message. If these values are the same he can be assured that the message
came from the email address that was provided during the registration process of the
certificate.
Step 7: Validity of the certificate is proven according to the start and stop date of the
certificate.
Step 8: Y trusts that this certificate is legal and belongs to X.Y could read the message.
● End User/Entity
● Certification Authority
● Registration Authority
● Repository
● Relying Party
Working on a PKI:
● PKI and Encryption: The root of PKI involves the use of cryptography and
encryption techniques. Both symmetric and asymmetric encryption uses a public key.
There is always a risk of MITM (Man in the middle). This issue is resolved by a PKI
using digital certificates. It gives identities to keys in order to make the verification of
owners easy and accurate.
○ The affirmation for the public key then can be retrieved by validating the
signature using the public key of the Certification Authority.
The most popular usage example of PKI (Public Key Infrastructure) is the HTTPS (Hypertext
Transfer Protocol Secure) protocol. HTTPS is a combination of the HTTP (Hypertext
Transfer Protocol) and SSL/TLS (Secure Sockets Layer/Transport Layer Security) protocols
to provide encrypted communication and secure identification of a Web server.
In HTTPS, the Web server's PKI certificate is used by the browser for two purposes:
● Validate the identity of the Web server by verifying the CA's digital signature in the
certificate.
● Encrypt a secret key to be securely delivered to the Web server. The secret key will be
used to encrypt actual data to be exchanged between the browser and the Web server.
SAHIL K
● Version number:
○ This field defines the version of X.509 of the certificate.
○ The version number started at 0; the current version (third version) is 2.
● Serial number:
○ This field defines a number assigned to each certificate.
○ The value is unique for each certificate issuer.
● Issuer name:
○ This field identifies the certification authority that issued the certificate.
○ The name is normally a hierarchy of strings that defines a country, a state,
organization, department, and so on.
SAHIL K
● Validity Period:
○ This field defines the earliest time (not before) and the latest time (not after)
the certificate is valid.
● Subject name:
○ This field defines the entity to which the public key belongs.
○ It is also a hierarchy of strings.
○ Part of the field defines what is called the common name, which is the actual
name of the beholder of the key.
● Extensions:
○ This optional field allows issuers to add more private information to the
certificate.
● Signature:
○ This field is made of three sections.
○ The first section contains all other fields in the certificate.
○ The second section contains the digest of the first section encrypted with the
CA’s public key.
○ The third section contains the algorithm identifier used to create the second
section.
● Criminals who perform these illegal activities are often referred to as hackers.
● Cybercrime may also be referred to as computer crime.
Types of Cybercrimes:
1. Hacking
2. Cracking
3. Theft
4. Malicious software
5. Child soliciting and abuse
Hacking:
● Hacking is one of the most well-known types of computer crime.
● Hacking refers to unauthorized access of another's computer systems.
● A hacker is someone who finds out and exploits the weaknesses of computer systems
or networks.
● These intrusions are often conducted in order to launch malicious programs known as
viruses, worms, and trojan horses that can shut down hacking an entire computer
network.
● Hacking is also carried out as a way to talk credit card numbers, intent passwords, and
other personal information.
● By accessing commercial databases, hackers are able to steal these types of items
from millions of internet users all at once.
Types of hackers:
1. White hat
2. Black hat
3. Grey hat
4. Elite hacker
5. Script hacker
Cracking:
● In the cyber world, a cracker is someone who breaks into a computer system or
network without authorization and with the intention of doing damage.
● Crackers are used to describe a malicious hacker.
● Crackers get into all kinds of mischief like he may destroy files, steal personal
information like credit card numbers or client data, infect the system with a virus, or
undertake many other things that cause harm.
● Cracking can be done for profit, maliciously, for some harm to organizations or to
individuals.
● Cracking activity is harmful, costly and unethical.
iv) Email harassment: This falls under the category of "Cyber Harassment" or "Crime
against Individual".
4. Elite Hacker:
● Elite hackers avoid deliberately destroying information or otherwise damaging the
computer systems they have exploited.
5. Script Kiddie:
● A script kiddie, or “skiddie,” is someone who lacks programming knowledge and uses
existing software to launch an attack.
● Often a script kiddie will use these programs without even knowing how they work or
what they do.
● For example, imagine a child gets their first computer. The child watches a movie
about hacking and then downloads a copy of Kali Linux. They begin playing with the
various programs while searching for online tutorials. At first, they may be perceived
as nothing more than an internet troll or noob, due to their lack of experience and
quickness to brag and boast. Sometimes they will even resort to cyberstalking or
bullying. However, this may simply be a cover for other more nefarious activity.
Q. What is pornography?
Ans: Pornography:
● The depiction of nudity or erotic behavior, in writing, pictures,video, or otherwise,
with the intent to cause sexual excitement.
● Is the depiction of erotic behavior (as in pictures or writing) intended to cause sexual
excitement material (as books or a photograph) that depicts erotic behavior and is
intended to cause sexual excitement the depiction of acts in a sensational manner so as
to arouse a quick intense emotional reaction?
● Pornography is defined as imagery, in addition to various forms of media, that depicts
actions presumed to be overtly sexual and erotic in nature.
● In a legal spectrum, Pornography can be defined as sexually-explicit material that is
displayed or viewed with the intention of the provision of sexual gratification.
● Cybercrime is a bigger risk now than ever before due to the sheer number of
connected people and devices.
● Cybercrime, as it's a bigger risk now than ever before due to the sheer number of
connected people and devices.
SAHIL K
● It is simply a crime that has some kind of computer or cyber aspect to it.
● To go into more detail is not as straightforward, as it takes shape in a variety of
different formats.
Cybercrime:
● Cybercrime has now surpassed illegal drug trafficking as a criminal money maker
● Somebody's identity is stolen every 3 seconds as a result of cybercrime
● Without a sophisticated security package, your unprotected PC can become infected
within four minutes of connecting to the Internet.
● Cybercrime covers a wide range of different attacks, all of which deserve their own
unique approach when it comes to improving our computer's safety and protecting
ourselves.
● The computer or device may be the agent of the crime, the facilitator of the crime, or
the target of the crime.
● The crime may take place on the computer alone or in addition to other locations.
● The broad range of cybercrime can be better understood by dividing it into two
overall categories.
● Client-server overuse: Installing more copies of the software than you have licenses
for.
● Hard-disk loading: Installing and selling unauthorized copies of software on
refurbished or new computers.
● Counterfeiting: Duplicating and selling copyrighted programs.
● Online piracy: Typically involves downloading illegal software from peer-to-peer
network, Internet auction or blog.
● This Act aims to provide the legal infrastructure for E-commerce in India.
● And the cyber laws have a major impact for E-businesses and the new economy in
India.
● So, it is important to understand what the various perspectives of the IT Act 2000 are
and what it offers.
● The Information Technology Act, 2000 also aims to provide for the legal framework
so that legal sanctity is accorded to all electronic records and other activities carried
out by electronic means.
● The Act states that unless otherwise agreed, an acceptance of contract may be
expressed by electronic means of communication and the same shall have legal
validity and enforceability.
● Some highlights of the Act are listed below:
● The Act specifically stipulates that any subscriber may authenticate an electronic
record by affixing his digital signature.
● It further states that any person can verify an electronic record by use of a public key
of the subscriber.
● The Act details about Electronic Governance and provides inter alia amongst others
that where any law provides that information or any other matter shall be in writing or
in the typewritten or printed form, then, notwithstanding anything contained in such
law, such requirement shall be deemed to have been satisfied if such information or
matter is rendered or made available in an electronic form; and accessible so as to be
usable for a subsequent reference and details the legal recognition of Digital
Signatures.
● The Act gives a scheme for Regulation of Certifying Authorities.
SAHIL K
● The Act envisages a Controller of Certifying Authorities who shall perform the
function of exercising supervision over the activities of the Certifying Authorities as
also laying down standards and conditions governing the Certifying Authorities as
also specifying the various forms and content of Digital Signature Certificates.
● The Act recognizes the need for recognizing foreign Certifying Authorities and it
further details the various provisions for the issue of license to issue Digital signature
Certificates.
● The Act also provides for the constitution of the Cyber Regulations Advisory
Committee, which shall advise the government as regards any rules, or for any other
purpose connected with the said act.
● The said Act also proposes to amend the Indian Penal Code, 1860, The Indian
Evidence Act, 1872, The Bankers Books Evidence Act, 1891, The Reserve Bank of
India Act, 1934 to make them in tune with the provisions of the IT Act.
IT Act 2008:
● IT acts 2008: It is the Information Technology Amendment Act, 2008.
● The act was developed for IT industries, to control e-commerce, to provide
E-governance facilities and to stop cybercrime attacks.
● Following are the characteristics of IT ACT 2008: This act provides legal recognition
or the transaction i.e. Electronic Data Interchange (EDI) and other electronic
communications.
● This Act also gives facilities for electronic filing of information with the Government
agencies.
● It is considered necessary to give effect to the said resolution and to promote efficient
delivery of Government services by means of reliable electronic records.
Q. Explain IT Act, 2000 and IT ACT, 2008 with advantages and disadvantages.
Ans:
i) IT Act 2000: The IT Act 2000 gives a very good solution to cyber crimes. In this Act
several sections and Chapters are there which are defined in the following manner:
SAHIL K
● Chapter 1 the preliminary chapter of IT Act 2000 gives all of the information about
the short title, territory up to which it is extendable, and the basic application of
related laws.
● Chapter 2 to 7 of this Act defines “Access”, “Addressee”, “Adjudicating Officer”,
“Affixing Digital Signature”, “Asymmetric Cryptography”, “Cyber”, “Computer”,
“Digital Signature”, “Digital Signature Certificate‟ and other numerous basic terms,
which are defined in its appendix.
● Other chapters of this Act define those crimes which can be considered as cognizable
offenses, i.e. for which the police can arrest the wrongdoer immediately.
● Section 80 of this Act gives a freedom to the police officer to search, arrest the
offender who is indulged in that crime or going to commit it.
● Section 65 to 70 covers all of the cognizable offenses, namely, “tampering of
documents”, “hacking of the personal computer”, “obscene information transmission
or publication”, “failure of compliance by certifying authority or its employees, of
orders of the Controller of certifying authorities”, “Access or attempt to access by any
unauthorized person, a protected system notified by Govt. in the Official Gazette” in
which non-bailable warrant is issued or no warrant is required.
● Section 71 indicates the offense “Misrepresentation of material fact from the
controller of Certifying Authority for obtaining any license or Digital Signature
Certificate”.
Advantages:
● Email is considered as the valid and legal form of communication.
● Digital signatures have been given legal validity and sanction
● Companies can carry out e-business using legal infrastructure.
● Corporate companies can become certifying authorities for issuing digital signatures
certificates.
● Enables the government to issue notifications or any other type of documents through
the internet bringing e-governance.
● Enables businesses to file forms, applications or any other type of document with any
office, body, institute in an electronic form.
● Enables the corporations and businesses to have statutory remedy in case of any act of
intrusion into their computer system or network, which causes damages or copies
data. The Act provides remedy in the form of monetary damages up to 1 crore.
Disadvantages:
● No mention on IPR (Intellectual Property Rights).
● No provisions for copy-righting, trade marking or patenting of electronic information
and data.
● The law does not consist of the rights and liabilities available to the domain name
holders.
● Not considered the regulation of electronic payments gateway, thus making the
banking and financial sectors indecisive (weak) in their stands.
● No mention of internet security while using the IT laws.
SAHIL K
Advantages:
● Redefinition of terms like communication devices which reflect the current use.
● Validation of electronic signatures and contracts.
● The owner of an IP address is responsible for content that is accessed or distributed
through it.
● Organizations are responsible for implementation of effective data security practices.
Disadvantages:
SAHIL K
● Liability of ISPs has been revisited and responsibility shall lie on the complainant to
prove lack of due diligence or presence of actual knowledge by intermediary, as
proving conspiracy would be difficult.
● Cyber law enforcement teams will face more challenges.
● The power of interception of traffic data and communications over the internet will
need to be exercised, deliberating powers of monitoring, collection , decryption or
interception.
● Power for blocking websites should also be exercised carefully and should not
transgress into areas that amount to unreasonable censorship.
● Many of the offenses added to the Act are cognizable but bailable which increases the
likelihood of tampering of evidence by cybercriminal once he is released on bail.
ii) Patent: Patent is an exclusive right granted by law to an inventor or assignee to prevent
others from commercially benefiting from his/her patented invention without permission, for
a limited period of time in exchange for detailed public disclosure of the patented invention.
iii) Trademark:
● A trademark is a sign that individualizes the goods or services of a given enterprise
and distinguishes them from those of competitors.
● To fall under law protection, a trademark must be distinctive, and not deceptive,
illegal or immoral.
2) Copyright:
● This law is to keep control on use of the creations in a number of ways.
● These uses include making copies, issuing copies to the public, public performance of
the creation, broadcasting and online use.
● It also gives moral rights to be identified as the creator of those materials and
protection against the distortion or modification.
● The purpose of this law is to gain economic rewards for the efforts.
● This encourages future creativity, development of new material.
● However, copyright law does not protect ideas, names, titles.
● Copyright can be considered as a kind of property, which like a person’s physical
assets, can be bought, sold or inherited, transferred.
● It can either Authorize or prohibit Translation into other languages.
● Examples: Literary, musical, dramatic, artistic, films etc
● This law in India has 15 chapters, with terms, definitions, ownership, terms of
copyrights etc.
3) Patent:
● This is a Legal right granted for limited time, as a monopoly, to the owner by a
country.
● Patents can be overruled by health and safety regulation.
● Patents can be given away, sold, inherited, licensed away and can be abandoned.
● A patent gives an inventor the right, for a limited period, to stop others from making,
using and selling or importing an invention without seeking the permission of the
inventor. And hence called “Negative right”.
● Mostly concerned with technical and functional aspects.
● Patents last up to 20 years in India and most countries outside.
● An Indian patent is not effective outside India (territorial).
SAHIL K
● Apply to The Indian Patent Office for patenting in India. Patent Agents are also
available.
4) Trademarks:
● A trademark is a sign that distinguishes the goods and services of one trader from
another. Signs include Slogans, Words, Logos, Colors, 3-D shapes, Sounds, Gestures.
This is considered as a “Badge” of Trade origin. It can be used as Marketing tool.
● Features:
○ Service Marks: Marks used by the service industry.
○ Well Known Marks: Which are defined and cannot be registered or used.
○ Collective Marks: Used by Group of companies
○ Scope of registration: Unauthorized use of certain marks used for certain
classes used by others are prohibited.
○ Punishment if copied
○ Renewed every 10 years
○ License agreements need not be compulsorily registered.
○ Trademarks can include colors and shape of the product also.
● Plan: This phase serves to plan the basic organization of information security, set
objectives for information security and choose the appropriate security controls.
● Do: This phase includes carrying out everything that was planned during the previous
phase.
● Check: The purpose of this phase is to monitor the functioning of the ISMS through
various channels, and check whether the results meet the set objectives.
● Act: The purpose of this phase is to improve everything that was identified as
non-compliant in the previous phase.
● ISO 27001 allows selection of objectives and controls of security which shows the
unique security risks and requirements. This information is used to prepare SoA and
then SoA is used to prepare a Risk Treatment Plan.
ISO 20000:
● ISO 20000 is an industry standard like ISO 9000/9001, and like ISO 9000/9001, ISO
20000 offers organizational certification.
● ISO 20000 standards show IT how to manage and improve IT while establishing audit
criteria. It also provides auditors with a documented standard to use for measuring IT
compliance.
● The ITIL offers certifications for individuals but ISO 20000 is an organizational
certification with international recognition.
● ISO 20000 Was basically developed to use best practice guidance provided in the
ITIL framework. This standard was developed / published in December 2005.
● ISO 20000 has two specifications.
i) ISO 20000-1: is the specification for Service Management. It defines the processes and
provides assessment criteria and recommendations for those who are responsible for IT
Service Management. Organizational certification uses this section. It includes following
sections:
● Scope
● Terms and Definitions
● Requirements for a Management System
SAHIL K
ii) ISO 20000-2: It documents a code of practice that explains how to manage IT with regard
to ISO 20000-1 audits. It includes all the sections from part 1 except requirements for a
management system. Both ISO 20000-1 and ISO 20000-2 derive directly from the ITIL best
practice.
● Already, several governments have stated that ISO 20000 is a requirement for
outsourced IT services. As the industry recognizes the value of ISO 20000, more and
more companies will require their partners and vendors to reach ISO 20000
certification.
● ISO 20000 also includes more than Service Delivery and Service Support. It includes
sections on managing suppliers and the business; as Well as Security Management.
● ISO 20000 can assist the organization in benchmarking its IT service management,
improving its services, demonstrating an ability to meet customer requirements and
create a framework for an independent assessment.
● Some of the most common benefits of ISO 20000 certification for service providers
are as follows:
1) It offers competitive differentiation by demonstrating reliability and high
quality of service.
2) It gives access to key markets, as many organizations in the public sector
mandate that their IT service providers demonstrate compliance with ISO/IEC
20000.
The ITIL framework is a source of good practice in service management. The ITIL library
has the following components:
● ITIL Core: Best-practice publications that may be used by any organization that
provides services to a business.
● ITIL Complementary Guidance: A complementary set of publications with guidance
specific to industry sectors, organization types, operating models and technology
architectures.
SAHIL K
● The objective of the ITIL Service Management framework is to provide services that
are fit for purpose, stable and so reliable that the business views them as a trusted
provider.
● ITIL has been deployed successfully around the world for over 20 years. Over this
time, the framework has evolved from a specialized set of Service Management topics
with a focus on function, to a process-based framework which now provides a broader
holistic Service Lifecycle.
● ITIL can be adapted and used in conjunction with other good practices such as
○ COBIT (a framework for IT Governance and Controls)
○ Six Sigma ( a quality methodology)
○ TOGAF (a framework for IT architecture)
○ ISO 27000 (a standard for IT security)
○ ISO/IEC 20000 (a standard for IT service management)
● The Control Objectives for Information and Related Technology (COBIT) is a control
framework that links IT initiatives to business requirements, organizes IT activities
into a generally accepted process model, identifies the major IT resources to be
leveraged and defines the management control objectives to be considered.
● The IT GOVERNANCE INSTITUTE (ITGI) first released it in 1995, and the latest
update is version 4.1, published in 2007.
4. Manage continuity
5. Manage security services
6. Manage business process control
THE END