CCS354 Ext 122751 Key
CCS354 Ext 122751 Key
Once an X.509 certificate is provided to a user by the certified authority, that certificate
is attached to it like an identity card. The chances of someone stealing it or losing it are
less, unlike other unsecured passwords.
What is meant by asymmetric encryption?
Answer:
Asymmetric encryption, also known as public-key cryptography, is a type of
04. CO2 BTL1
encryption that uses a pair of keys to encrypt and decrypt data. The pair of keys
includes a public key, which can be shared with anyone, and a private key, which is
kept secret by the owner.
Mention the advantages of network access control.
05. CO3 BTL1
Answer:
Page 1 of 19
QP Code: 122751
By using digital signatures, S/MIME provides for authentication, message integrity, and
non-repudiation of origin. In addition, S/MIME includes encryption that strengthens
privacy and data security for electronic messaging.
Recall the purpose of domain keys identified mail.
Answer:
08. A DKIM record benefits receivers by informing them of emails that may contain CO4 BTL1
malicious or spam content. It also validates that the data included in the DKIM
signature was not changed in transit.
List down some of the characteristics of firewall.
Answer:
A firewall's key characteristics include: packet filtering, traffic filtering, intrusion
09. detection, network address translation (NAT), policy-based access control, logically CO5 BTL1
segregating network traffic, visibility and control, various protection levels, ability to
block unauthorized access, and the capability to only allow authorized data packets to
pass through based on defined rules.
Give an outline about the cloud security.
Answer:
Cloud security refers to the practices and technologies used to protect data,
10. CO5 BTL1
applications, and infrastructure hosted on cloud computing platforms from
unauthorized access, breaches, and other cyber threats, ensuring the confidentiality,
integrity, and availability of sensitive information in a cloud environment.
PART B (5 × 13 = 65 Marks)
No Answer All Questions Marks CO BTL
Discuss in detail about the conventional cryptography and public key
cryptography and explain the differences between them with an
example.
11. (a) Answer: (13) CO1 BTL2
Conventional encryption, also called as symmetric encryption or
single-key encryption is a type of cryptographic system which uses a
single key to both encrypt the message and decrypt it. It involves
Page 2 of 19
QP Code: 122751
Key
– The key used in the conventional encryption scheme is typically
referred to as a secret key which is shared by both sender and receiver
and must be kept secret by the systems involved in the encryption and
decryption processes. If this secret key is disclosed, the
communications will be compromised. The two keys used for public-
key encryption are referred to as the public key and the private key.
The public key is used to encrypt the messages and can be shared
freely among the users, but the private key is kept secret and is only
known to the recipient, used to decrypt the messages.
With the conventional encryption model, both the sender and the
receiver must know the secret key ahead of time and they have to
agree on the key before transmission, which raises security concerns
and a problem of trust, especially when it comes to authentication and
integrity checking. It’s hard to keep the key secret when the
encryption and decryption happens in different locations. Public-key
encryption, on the other hand, is more secure because the pair of keys
is based on prime numbers of long length meaning there is infinite
number of possibilities for keys.
(Or)
Page 3 of 19
QP Code: 122751
1. The client who initiates the need for a service request on the
user's behalf
2. The server, which hosts the service that the user needs
access to
3. The AS, which performs client authentication. If
authentication is successful, the client is issued a ticket-granting
ticket (TGT) or user authentication token, which is proof that the
client has been authenticated.
4. The KDC and its three components: the AS, the TGS, and the
Kerberos database
5. The TGS application that issues service tickets.
Elaborate on the IP security architecture with neat diagram and the services
offered by IPSec.
encryption algorithms.
Page 7 of 19
QP Code: 122751
(Or)
Discuss how SSL, TLS and HTTPS standards are used for secure
transmission of data over the network.
Data Encryption
Data Integrity
Page 8 of 19
QP Code: 122751
These security protocols ensure that the data exchanged between the
user and the web server remains intact and unaltered during
transmission. Any tampering with the data would be detected.
Differences
Scope
TLS/SSL is a broader term encompassing various cryptographic
protocols and security measures. HTTPS, conversely, refers to the
secure version of the HTTP protocol.
Usage
TLS/SSL can secure various types of network communication beyond
just web browsing. It’s utilized in email, file transfer, and more. HTTPS,
however, is exclusively designed for securing web traffic.
Implementation
TLS/SSL operates at the transport layer of the OSI model, ensuring
security for all applications using it. HTTPS, on the other hand,
operates at the application layer and secures only web-related
communication.
Port
TLS/SSL typically uses port 443 for secure communication, while
regular HTTP uses port 80. The port number indicates the type of
protocol being used.
Advantages of TLS/SSL
Data Privacy
TLS/SSL ensures that sensitive information, such as login credentials,
payment details, and personal data, remains confidential and
protected from eavesdropping.
Authentication
Websites with SSL/TLS certificates inspire trust. Users can verify a
site’s authenticity by checking for the padlock icon in the address bar
or examining the certificate details.
Data Integrity
TLS/SSL guarantees that data remains unaltered during transmission,
preventing data corruption or tampering by malicious actors.
Compatibility
TLS/SSL is widely supported across various platforms and browsers,
Page 9 of 19
QP Code: 122751
PGP uses the public key system in which every user has a unique
encryption key known publicly and a private key that only they know.
A message is encrypted when a user sends it to someone using their
public key, then decrypted when the recipient opens it with their
private key. It combines private-key and public-key cryptography and
the use of symmetric and asymmetric key technology to encrypt data
as it travels across networks.
Page 11 of 19
QP Code: 122751
level of access based on user roles, device kinds, and explicit access
rights.
Conduct encryption: Converts data into a code that can be read only by
authorized users with the appropriate key.
Authenticate users and devices: Processes validated identities of
individuals and devices that attempt to connect to the network.
Apply access control rules: Define which users or devices can connect
to the network and what degree or level of access they have.
Secure devices: Includes identifying trusted devices connecting to any
network and sets any policies in other integrated security tools.
Integrate with IDPS and other tools: Catch and block suspicious
activities and security breaches in the network.
Explain in detail about the types of firewalls and discuss how firewalls
help in developing a security framework for an organization.
Answer:
A firewall is a network security device designed to monitor, filter, and
control incoming and outgoing network traffic based on
predetermined security rules. The primary purpose of a firewall is to
establish a barrier between a trusted internal network and untrusted
external networks.
Firewalls come in both hardware and software forms, and they work
by inspecting data packets and determining whether to allow or block
15. (a) (13) CO5 BTL2
them based on a set of rules. Organizations can configure these rules to
permit or deny traffic based on various criteria, such as source and
destination IP addresses, port numbers, and protocol type.
Page 12 of 19
QP Code: 122751
NAT
NAT changes the destination or source addresses of data packets as
they pass through a firewall. This allows multiple devices to connect to
the internet using the same IP address, which helps protect the private
network from direct exposure to external threats.
VPN
A VPN is a type of proxy server. Therefore, it serves as a barrier
between a computer or network and the internet, receiving all web
requests before forwarding them to the network.
VPNs are common and extend the private network across a public
one, such as the internet. This allows users to securely transmit data as
if their devices were directly connected to the private network. The
connection establishes an encrypted tunnel between remote devices
and the corporate network, enabling secure access.
(Or)
Discuss about Intrusion Detection Systems (IDS) in detail with suitable
diagram.
Answer:
An Intrusion Detection System (IDS) is a security tool that monitors a
computer network or systems for malicious activities or policy
violations. It helps detect unauthorized access, potential threats, and
abnormal activities by analyzing traffic and alerting administrators to
take action. An IDS is crucial for maintaining network security and
protecting sensitive data from cyber-attacks.
Page 15 of 19
QP Code: 122751
Page 16 of 19
QP Code: 122751
Security was not considered during the design of IoT devices. The
constant diversity and expansion of IoT devices and communication
channels raises the possibility that cyber attacks may target your
company.
Page 17 of 19
QP Code: 122751
There are many ways to deploy a NAC, but the essentials are:
Pre-admission control—Blocks unauthenticated messages.
Device and user detection—Identifies users and devices with pre-defined
credentials or machine IDs.
Authentication and authorization—Verifies and provides access.
Onboarding—Provisions a device with security, management, or host-
checking software.
Profiling—Scans endpoint devices.
Policy enforcement—Applies role and permission-based access.
Post-admission control—Enforces session termination and cleanup.
802.1X provides L2 access control by validating the user or device that is
attempting to access a physical port.
Page 18 of 19
QP Code: 122751
Page 19 of 19