0% found this document useful (0 votes)
3 views

OS SEE UNIT-5(saq's)

The document covers various concepts related to computer security, including access rights, protection domains, program threats, and security problems. It explains the differences between viruses and worms, outlines types of attacks, and discusses cryptography and encryption techniques. Additionally, it touches on topics such as firewalls, one-time passwords, sniffing, and digital signatures.

Uploaded by

oltofer9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

OS SEE UNIT-5(saq's)

The document covers various concepts related to computer security, including access rights, protection domains, program threats, and security problems. It explains the differences between viruses and worms, outlines types of attacks, and discusses cryptography and encryption techniques. Additionally, it touches on topics such as firewalls, one-time passwords, sniffing, and digital signatures.

Uploaded by

oltofer9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

UNIT-5:

SAQ’s:

Q1) What is an Access Right? Give an example.


ANS)An Access Right is a permission or privilege that grants a user, process, or entity the
authority to perform specific actions or operations on a particular resource or object within a
computer system or network. Access rights are a fundamental aspect of access control, which
regulates who can access what resources and what actions they can perform on those
resources.
EG:

Q2) Briefly explain about Protection Domain? Give example.


ANS)A Protection Domain is a security mechanism used in operating systems and computer
architectures to group processes or users into separate, isolated entities with their own set of
access rights and privileges. Each protection domain represents a distinct level of trust and
control over system resources, ensuring that processes or users within one domain cannot
interfere with or access the resources of another domain without explicit permission.
EG:

Q3) Define Program Threat. List any 4 Program Threats.


ANS)A program threat refers to any potential risk or vulnerability that can compromise the
security, integrity, or proper functioning of a computer program or software system. These
threats can arise from various sources, including malicious actors, programming errors, or
environmental factors.
Here are four common program threats:
1)Trojan Horse
2)Trap Door
3)Logic Bomb
4)Stack and Buffer Overflow

Q4) What is a Capability List?


ANS)A Capability List is a data structure used in computer systems to enforce access control
and manage permissions for different resources or objects. It is a list or table that associates
each resource or object with a set of capabilities, which represent the specific operations or
actions that a process or user is allowed to perform on that resource.Capability list are
associated with each domain, but not directly accessible by domain or any user
Process. Capabilities lists are themselves protected resources, distinguished from other data in
one or two ways.

Q5) Describe any 2 Security Problems.


ANS) masquerading, in which the attacker pretends to be a trusted third
party. A variation of this is the man-in-the-middle, in which the attacker masquerades as
both ends of the conversation to two targets.
A replay attack involves repeating a valid transmission. Sometimes this can be the entire
attack, (such as repeating a request for a money transfer ), or other times the content of
the original message is replaced with malicious content.

Q6) Write short notes on Firewall?


ANS)Firewalls are devices ( or sometimes software ) that sit on the border between two
security domains and monitor/log activity between them, sometimes restricting the traffic
that can pass between them based on certain criteria.
For example a firewall router may allow HTTP: requests to pass through to a web server
inside a company domain while not allowing telnet, ssh, or other traffic to pass through.

Q7) Differentiate Virus and Worm.


ANS)VIRUS: A virus is a fragment of code embedded in an otherwise legitimate program,
designed to replicate itself (by infecting other programs), and (eventually) wreaking havoc.
WORM:
A worm is a process that uses the fork / spawn process to make copies of itself in order to
wreak havoc on a system. Worms consume system resources, often blocking out other,
legitimate processes. Worms that propagate over networks can be especially problematic,
as they can tie up vast amounts of network resources and bring down large-scale systems.

Q8) What is an Attack? Give different types of attacks.


ANS)In the context of computer security, an attack refers to a deliberate and malicious action
taken by an individual or group to compromise the confidentiality, integrity, or availability of a
computer system or its data. Attackers exploit vulnerabilities in software, networks, or human
behavior to gain unauthorized access, disrupt operations, steal information, or cause harm.
Here are some different types of attacks:
1)Active Attack: 2)Passive Attack
i)Masquerading
ii)Replay
iii)Man in the middle
iv)Session hijacking

Q9) What is DOS Attack? Give one technique to avoid it?


ANS)Denial of Service, DOS - Preventing legitimate users from using the system, often
by overloading and overwhelming the system with an excess of requests for service.
One technique to avoid or mitigate a DoS attack is the implementation of rate limiting or traffic
shaping. This technique involves controlling the rate of incoming traffic to a system or network,
ensuring that it stays within manageable limits.

Q10) What is Cryptography? How it is helpful in providing Security?


ANS)Cryptography is the practice and study of techniques used to secure communication and
protect information from unauthorized access or modification. It involves the use of
mathematical algorithms and principles to convert plain text (also known as plaintext) into
ciphertext, which is unintelligible and secure. Cryptography provides a means to ensure
confidentiality, integrity,authentication, and non-repudiation of data.

Q11) Differentiate Symmetric and Asymmetric Encryption Techniques.


ANS)
Symmetric Asymmetric Encryption
Encryption

Key Type Single secret key Key pair (public & private keys)

Efficiency Computationally efficient and Computationally intensive and slower


fast

Key More challenging with Simpler as users freely distribute public


Management multiple users/devices keys

Security Relies on secrecy of the key Better security, private key is kept secret

Examples AES, DES, 3DES RSA, ECC

Use Cases Suitable for speed and Secure key exchange, digital signatures,
efficiency, large data and secure communication over public
encryption networks

Q12) Write short notes on OTP?


ANS)OTP stands for One-Time Password, which is a temporary and unique password used for
authentication purposes in computer systems and online services. Unlike traditional static
passwords, OTPs provide an additional layer of security as they are valid for a single use or a
short period, making them difficult to reuse or guess. OTPs are commonly used in two-factor
authentication (2FA) and multi-factor authentication (MFA) to enhance the security of user
accounts and prevent unauthorized access.

Q13) Describe Sniffing.


ANS)Sniffing is a form of passive network eavesdropping, where an unauthorized person or
program captures and monitors data packets transmitted over a network. Sniffing allows
attackers to intercept sensitive information, such as login credentials, financial data, personal
information, or any unencrypted data, as it travels across the network.

(OR)

Sniffing is like eavesdropping on a network. It's when someone secretly listens to the
conversations happening between computers or devices on a network. By doing this, they can
capture sensitive information like passwords or personal data that is not properly protected.
How Sniffing Works:

When information is sent over a network, it is divided into small pieces called packets. A
network sniffer is a sneaky tool that captures and looks at these packets as they travel through
the network. It reads the information inside the packets, like reading messages sent between
computers.

Q14) What are Digital Signatures?


ANS)Digital signatures are cryptographic techniques used to verify the authenticity and
integrity of digital messages, documents, or data. They provide a way for the recipient of a
digital communication to ensure that the content has not been altered and that it originated from
the expected sender. Digital signatures are commonly used in electronic transactions, secure
communications, and authentication processes.
Digital signatures are like electronic fingerprints. They are used to verify the authenticity and
integrity of digital messages, documents, or data. Digital signatures ensure that the information
hasn't been tampered with and that it came from the expected sender.

You might also like