All Nis Model Answers
All Nis Model Answers
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 1 / 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 2 / 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 3 / 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
3. Integrity: when the contents of the message are changed after the
sender sends it, but before it reaches the intended recipient, we say
that the integrity of the message is lost. For example, here user C
tampers with a message originally sent by user A, which is actually
destined for user B. user C somehow manages to access it, change its
contents and send the changed message to user B. user B has no way
of knowing that the contents of the message were changed after user
A had sent it. User A also does not know about this change. This type
of attack is called as modification.
Page 4 / 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 5 / 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Fig : Steganography
Page 6 / 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Cover media is the file in which we will hide the hidden data, which
may also be encrypted using stego-key. The resultant file is stego-
medium. Cover-media can be image or audio file. Stenography takes
cryptography a step further by hiding an encrypted message so that
no one suspects it exists. Ideally, anyone scanning your data will fail
to know it contains encrypted data. Stenography has a number of
drawbacks when compared to encryption. It requires a lot of overhead
to hide a relatively few bits of information. I.e. One can hide text,
data, image, sound, and video, behind image.
Applications :
1. Confidential communication and secret data storing
2. Protection of data alteration
3. Access control system for digital content distribution
4. Media Database systems
Page 7 / 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
PLAIN TEXT:
MAHARASTRA STATE BOARD OF TECHNICAL EDUCATION
LET ORDER BE:4,5,3,2,1
CIPHER
TEXT:ARTRECUORAEDCACNHTAATIDIASTOFNETMASBOH
LA
Page 8 / 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Any four
differences
1M each
Page 9 / 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
2M for
Caesor’s
cipher
technique
Page 10 / 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 11 / 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
4) Enter a specific port number. In this case, it’s 443. Click Next.
Page 12 / 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 13 / 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Diagram
2M
e) Find the output of initial permutation box when the input is given 4M
in hexadecimal as
0 x 0003 0000 0000 0001
Page 15 / 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Ans.
0 0 0 3 Hexadecimal
0000 0000 0000 0011 Binary
Correct
0 0 0 0 Hexadecimal output 4M
0000 0000 0000 0000 Binary
0 0 0 0 Hexadecimal
0000 0000 0000 0000 Binary
0 0 0 1 Hexadecimal
0000 0000 0000 0001 Binary
Input
1 2 3 4 5 6
1 0 0 0 0 0 0
2 0 0 0 0 0 0
3 0 0 0 0 0 0
4 0 0 0 0 0 0
5 0 0 0 0 0 0
6 0 0 0 0 0 0
7 0 0 0 0 0 0
8 0 0 0 0 0 0
Permutation table
1 2 3 4 5 6
1 58 50 42 34 26 18
2 60 52 44 36 28 20
3 62 54 46 38 30 22
4 64 56 48 40 32 24
5 57 49 41 33 25 17
6 59 51 43 35 27 19
7 61 53 45 37 29 21
8 63 55 47 39 31 23
Page 16 / 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Output
1 2 3 4 5 6
1 0 0 0 0 0 0
2 0 0 0 0 0 0
3 0 0 0 0 0 0
4 1 0 0 0 0 0
5 0 0 0 0 0 0
6 0 0 0 0 0 0
7 0 0 0 0 0 0
8 0 0 0 0 0 0
Hexadecimal
0000 0082 0000 0002
Note: Any other relevant logic shall be considered.
5. Attempt any TWO of the following 12M
a) Describe the following terms 6M
i) Asset
ii) Vulnerability
iii) Risks
Ans. i) Asset: Asset is any data, device, or other component of the
environment that supports information-related activities. Assets
Descriptio
generally include hardware, software and confidential information. n of each
term 2M
ii) Vulnerability: It is a weakness in computer system & network.
The term "vulnerability" refers to the security flaws in a system that
allows an attack to be successful. Vulnerability testing should be
performed on an on-going basis by the parties responsible for
resolving such vulnerabilities, and helps to provide data used to
identify unexpected dangers to security that need to be addressed.
Such vulnerabilities are not particular to technology — they can also
apply to social factors such as individual authentication and
authorization policies.
Page 17 / 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
OR
Risk is any event or action that could cause a loss or damage to
computer hardware, software, data, or information.
b) Describe network base IDS with suitable diagram 6M
Ans.
Diagram
2M
Page 18 / 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
COBIT stands for ―Control Objectives for Information and related Explanatio
Technology‖, it is a framework that was developed by ISACA n 4M
(Information System Audit and Control Association). It is a set of
guidance material for IT governance to manage their requirements,
technical issues, and business risks.
Page 19 / 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 20 / 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 21 / 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
3. The client decrypts the ticket, tells the TGS it has done so, and
then sends its own encrypted key to the service.
Page 22 / 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
4. The service decrypts the key, and makes sure the timestamp is still
valid. If it is, the service contacts the key distribution center to
receive a session that is returned to the client.
5. The client decrypts the ticket. If the keys are still valid,
communication is initiated between client and server.
c) Write a brief note on firewall configuration 6M
i) Packet filter as a firewall
ii) Application level gateway firewall
iii) Circuit level gateway firewall Explanatio
n with
Ans. 1. Packet filter as a firewall : As per the diagram given below diagram
Firewall will act according to the table given for example source IP 2M
150.150.0.0 is the IP address of a network , all the packets which are each
coming from this network will be blocked by the firewall in this way
it is acting as a firewall. Table also having port 80, IP Address
200.75.10.8 & port 23 firewall will act in the similar fashion. Port 23
is for Telnet remote login in this case firewall won’t allow to login
onto this server. IP Address 200.75.10.8 is the IP address of
individual Host, all the packet having this IP address as a destination
Address will be denied. Port 80 no HTTP request allowed by firewall
Page 23 / 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 24 / 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 25 / 25
lOMoARcPSD|37379541
Page 1 / 28
Page 2 / 28
Page 3 / 28
Page 4 / 28
Page 5 / 28
Page 6 / 28
it only checks who is speaking and what is speaking (Who you are and
what you speak)
c) Differentiate between symmetric and asymmetric key 4M
cryptography. 1M for
Ans. each valid
point, any
four points
can be
considered
2M for
explanation
Initial Permutation (IP): It happens only once. It replaces the first bit
of the original plain text block with the 58th bit of the original plain
text block, the second bit with the 50th bit of original plain text block
and so on. The resulting 64-bits permuted text block is divided into
two half blocks. Each half block consists of 32 bits. The left block
called as LPT and right block called as RPT.16 rounds are performed
on these two blocks. Details of one round in DES
Page 7 / 28
Page 8 / 28
new RPT. The old RPT becomes new LPT, in a process of swapping.
Page 9 / 28
Page 10 / 28
Page 11 / 28
resources. Access control is to specify, control and limit the access to 2M for
the host system or application, which prevents unauthorized use to authenticati
access or modify data or resources. on
Authentication -
Authentication helps to establish proof of identities. The
Authentication process ensures that the origin of a message is correctly
identified. For example, suppose that user C sends a message over the
internet to user B. however, the trouble is that user C had posed as user
A when he sent a message to user B. how would user B know that the
message has come from user C, who posing as user A? This concept is
shown in fig. below. This type of attack is called as fabrication
Authentication is the process of determining identity of a user or other
entity. It is performed during log on process where user has to submit
Page 12 / 28
Caesar cipher:
It is proposed by Julius Caesar. In cryptography Caesar cipher also
known as Caesar cipher/code, shift cipher/code. It is one of the
simplest and most widely known encryption techniques. It is a type of
substitution technique in which each letter in the plain text is replaced
by a letter some fixed number of position
down the alphabet. For example, with a shift of 3, A would be replaced
by D, B would became E, and so on as shown in the table below.
Using this scheme, the plain text “SECRET” encrypts as Cipher text
“VHFUHW”. To allow someone to read the cipher text, you tell them
that the key is 3
For S:= (p+k)mod26
= (18 + 3) mod 26
= 21
=V
To allow someone to read the cipher text, you tell them that the key is3
Algorithm to break Caesar cipher:
1. Read each alphabet in the cipher text message, and search for it in
the second row of the table above.
2. When a match in found, replace that alphabet in the cipher text
message with the corresponding alphabet in the same column but the
first row of the table. (For example, if the alphabet cipher text is J,
replace it with G).
3. Repeat the process for all alphabets in the cipher text message.
b) Explain DMZ 4M
Ans. DMZ (Demilitarized Zone):- 1M for
It is a computer host or small network inserted as a “neutral diagram
zone” in a company‟s private network and the outside public network. 2M for
It avoids outside users from getting direct access to a company‟s data explanation
server. A DMZ is an optional but more secure approach to a firewall. It 1M for
Page 13 / 28
Page 14 / 28
Page 15 / 28
Page 16 / 28
4. The receiver calculates the message digest from the plain text or
message he received.
5. Receiver decrypts the encrypted message digest using the sender‟s
public key. If both the MDs are not same then the plaintext or message
is modified after signing.
Page 17 / 28
Page 18 / 28
Page 19 / 28
Page 20 / 28
Page 21 / 28
5. The TGS creates an encrypted key with a timestamp, and grants the
client a service ticket.
6. The client decrypts the ticket, tells the TGS it has done so, and then
sends its own encrypted key to the service server.
7. The service server decrypts the key, and makes sure the timestamp is
still valid. If it is, the
service contacts the key distribution center to receive a session that is
returned to the client.
8. The client decrypts the ticket. If the keys are still valid,
communication is initiated between client and server.
Page 22 / 28
The target system will drop these connections after a specific time-out
period, but if the attacker sends requests faster than the time-out period
eliminates them, the system will quickly be filled with requests. The
number of connections a system can support is finite, so when more
requests come in than can be processed, the system will soon be
reserving all its connections for fake requests. At this point, any further
requests are simply dropped (ignored), and legitimate users who want
to connect to the target system will not be able to. Use of the system
has thus been denied to them.
Page 23 / 28
Working on a PKI:
PKI and Encryption: The root of PKI involves the use of
cryptography and encryption techniques. Both symmetric and
asymmetric encryption uses a public key. There is always a risk of
MITM (Man in the middle). This issue is resolved by a PKI using
digital certificates. It gives identities to keys in order to make the
verification of owners easy and accurate.
Public Key Certificate or Digital Certificate: Digital certificates are
issued to people and electronic systems to uniquely identify them in the
digital world.
The Certification Authority (CA) stores the public key of a user
along with other information about the client in the digital
certificate. The information is signed and a digital signature is also
included in the certificate.
The affirmation for the public key then thus be retrieved by
validating the signature using the public key of the Certification
Authority.
Page 24 / 28
Generates the key pairs – This key pair generated by the CA can be
either independent or in collaboration with the client.
Issuing of the digital certificates – When the client successfully
provides the right details about his identity, the CA issues a
certificate to the client. Then CA further signs this certificate
digitally so that no changes can be made to the information.
Publishing of certificates – The CA publishes the certificates so
that the users can find them. They can do this by either publishing
them in an electronic telephone directory or by sending them out to
other people.
Verification of certificate – CA gives a public key that helps in
verifying if the access attempt is authorized or not.
Revocation – In case of suspicious behavior of a client or loss of
trust in them, the CA has the power to revoke the digital
certificate.
In HTTPS, the Web server's PKI certificate is used by the browser for
two purposes:
Page 25 / 28
Validate the identity of the Web server by verify the CA's digital
signature in the certificate.
Encrypt a secret key to be securely delivered to the Web server. The
secret key will be used to encrypt actual data to be exchanged between
the browser and the Web server.
Page 26 / 28
Page 27 / 28
Page 28 / 28
Page 1 / 27
about:blank 1/27
Downloaded by Darshan Awale ([email protected])
lOMoARcPSD|37379541
Page 2 / 27
about:blank 2/27
Downloaded by Darshan Awale ([email protected])
lOMoARcPSD|37379541
Diagram
1M
Page 3 / 27
about:blank 3/27
Downloaded by Darshan Awale ([email protected])
lOMoARcPSD|37379541
Page 4 / 27
about:blank 4/27
Downloaded by Darshan Awale ([email protected])
lOMoARcPSD|37379541
Page 5 / 27
about:blank 5/27
Downloaded by Darshan Awale ([email protected])
lOMoARcPSD|37379541
Limitations:-
1) Using the fingerprint scanner does not take into consideration
when a person physically changes
2) The cost of computer hardware and software programs can be
expensive
3) Using the fingerprint scanner can lead to false rejections and false
acceptance.
4) It can make mistakes with the dryness or dirty of the finger„s skin,
as well as with the age (is not appropriate with children, because the
size of their fingerprint changes quickly.
c) Explain Caesar’s cipher substitute technique with suitable 4M
example.
Ans. Caesar cipher technique is proposed by Julius Caesar. It is one of the Explanation
simplest and most widely known encryption techniques. It is a type of 2M
substitution technique in which each letter in the plain text is replaced Example
by a letter some fixed number of position down the alphabet. The 2M
Caesar cipher involves replacing each letter of the alphabet with the
letter three places further down the alphabet. For example, with a
shift of 3, A would be replaced by D, B would became E, and so on
as shown in the table below
Example
PLAIN TEXT - COMPUTER ENGINEERING
Convert each alphabet in the plain text, using the table, the cipher text
can be written as
CIPHER TEXT – FRPSXWHU HQJLQHHULQJ
Algorithm to break Caesar cipher:
Page 6 / 27
about:blank 6/27
Downloaded by Darshan Awale ([email protected])
lOMoARcPSD|37379541
DES Encryption:-
Step 1: In the first step the 64-bit plain text undergoes initial
permutation which rearranges the bits to produce two 32-bit permuted
block which is called left plain text (LPT 32-bit) and right plain text
(RPT 32-bit).
Step 2: Now, 16 rounds of DES encryption will be performed on this
LPT and RPT with a 56-bit key.
Step 3: After the 16th round the 32-bit LPT and 32-bit RPT are
integrated which forms a 64-bit block again and then the final
permutation is applied to this 64-bit block, to obtain the 64-bit cipher
text.
Rounds in Data Encryption Standard
Each round of DES performs the same function. So, below are the
steps of the function performed in each round of DES algorithm:
Page 7 / 27
about:blank 7/27
Downloaded by Darshan Awale ([email protected])
lOMoARcPSD|37379541
5. XOR and Swap:-In this step, the 32-bit LPT of the initial 64-bit
plain text is XOR with the output of P-box permutation. The result of
the XOR is the new RPT for next round and the old RPT is swapped
with LPT.
DES Decryption:-
The same Data Encryption Standard algorithm used for encrypting
the plain text is also used to decrypting the cipher text. But the
algorithm is reversed, such as the initial and final permutation events
are reversed. Even the sequence of the sub keys applied in 16 rounds
of DES is also reversed.
3. Attempt any THREE of the following: 12
a) Explain the term Authorization and Authentication with respect 4M
to security. Explanation
Ans. Authorization: It is a process of verifying that the known person has of each term
2M
the authority to perform certain operation. It cannot occur without
authentication. It is nothing but granting permissions and rights to
individual so that he can use these rights to access computer resources
or information.
Page 8 / 27
about:blank 8/27
Downloaded by Darshan Awale ([email protected])
lOMoARcPSD|37379541
In the above example, the plaintext has been padded so that it neatly
fits in a rectangle. This is known as a regular columnar transposition.
An irregular columnar transposition leaves these characters blank,
though this makes decryption slightly more difficult. The columns are
now reordered such that the letters in the key word are ordered
alphabetically.
Page 9 / 27
about:blank 9/27
Downloaded by Darshan Awale ([email protected])
lOMoARcPSD|37379541
Page 10 / 27
about:blank 10/27
Downloaded by Darshan Awale ([email protected])
lOMoARcPSD|37379541
Examples:
1) Web servers
It‟s possible for web servers communicating with internal database
servers to be deployed in a DMZ. This makes internal databases more
secure, as these are the repositories responsible for storing sensitive
information. Web servers can connect with the internal database
server directly or through application firewalls, even though the DMZ
continues to provide protection.
2) DNS servers
A DNS server stores a database of public IP addresses and their
associated hostnames. It usually resolves or converts those names to
IP addresses when applicable. DNS servers use specialized software
and communicate with one another using dedicated protocols. Placing
a DNS server within the DMZ prevents external DNS requests from
gaining access to the internal network. Installing a second DNS
server on the internal network can also serve as additional security.
3)Proxy servers
A proxy server is often paired with a firewall. Other computers use it
to view Web pages. When another computer requests a Web page, the
proxy server retrieves it and delivers it to the appropriate requesting
Page 11 / 27
about:blank 11/27
Downloaded by Darshan Awale ([email protected])
lOMoARcPSD|37379541
This hidden information can be plain text, cipher text or even images. OR
In modern steganography, data is first encrypted by the usual means Advantage
and then inserted, using a special algorithm, into redundant data that 1M
Disadvantag
is part of a particular file format such as a JPEG image. e 1M
Page 12 / 27
about:blank 12/27
Downloaded by Darshan Awale ([email protected])
lOMoARcPSD|37379541
Steganography process:
Cover-media + Hidden data + Stego-key = Stego-medium
Cover media is the file in which we will hide the hidden data, which
may also be encrypted using stego-key. The resultant file is stego-
medium. Cover-media can be image or audio file.
Advantages:
1. With the help of steganography we can hide secret message within
graphics image.
2. In modern Steganography, data is encrypted first and then inserted
using special algorithm so that no one suspects its existence.
Drawbacks:
1. It requires lot of overhead to hide a relatively few bits of
information.
2. Once the system is discovered, it becomes virtually worthless.
b) Explain honey pots. 4M
Ans. Honeypots are designed to purposely engage and deceive hackers and
identify malicious activities performed over the Internet. The Explanation
2M
honeypots are designed to do the following:
Any
1. Divert the attention of potential attacker. relevant
diagram 2M
2. Collect information about the intruder‟s action.
3. Provide encouragement to the attacker so as to stay for some time,
allowing the administrations to detect this and swiftly act on this.
Page 13 / 27
about:blank 13/27
Downloaded by Darshan Awale ([email protected])
lOMoARcPSD|37379541
Page 14 / 27
about:blank 14/27
Downloaded by Darshan Awale ([email protected])
lOMoARcPSD|37379541
Analysis Engine:
This component examines the collected network traffic & compares it
to known patterns of suspicious or malicious activity stored in the
signature database. The analysis engine acts like a brain of the IDS.
Signature database:
It is a collection of patterns & definitions of known suspicious or
malicious activity.
User Interface & Reporting:
This is the component that interfaces with the human element,
providing alerts & giving the user a means to interact with & operate
the IDS.
d) Describe working principle of SMTP. 4M
Ans. 1. Composition of Mail: A user sends an e-mail by composing an Working
principle
electronic mail message using a Mail User Agent (MUA). Mail User explanation
Agent is a program which is used to send and receive mail. The 2M
message contains two parts: body and header. The body is the main
part of the message while the header includes information such as the Suitable
sender and recipient address. The header also includes descriptive diagram 2M
information such as the subject of the message. In this case, the
message body is like a letter and header is like an envelope that
contains the recipient's address.
Page 15 / 27
about:blank 15/27
Downloaded by Darshan Awale ([email protected])
lOMoARcPSD|37379541
Page 16 / 27
about:blank 16/27
Downloaded by Darshan Awale ([email protected])
lOMoARcPSD|37379541
Page 17 / 27
about:blank 17/27
Downloaded by Darshan Awale ([email protected])
lOMoARcPSD|37379541
Page 18 / 27
about:blank 18/27
Downloaded by Darshan Awale ([email protected])
lOMoARcPSD|37379541
through the internet service provider and then sent to the outside
world (Internet). This way, the packets are tagged with only the
Public IP address (Firewall level) and the internal private IP
addresses are not exposed to potential intruders
Page 19 / 27
about:blank 19/27
Downloaded by Darshan Awale ([email protected])
lOMoARcPSD|37379541
Page 20 / 27
about:blank 20/27
Downloaded by Darshan Awale ([email protected])
lOMoARcPSD|37379541
Explanation
4M
It encrypts and seal the transport and application layer data during
transmission. It also offers integrity protection for internet layer. It
sits between transport and internet layer of conventional TCP/IP
protocol 1. Secure remote internet access: Using IPsec make a local
call to our internet services provider (ISP) so as to connect to
organization network in a secure fashion from our house or hotel
from there; to access the corporate network facilities or access remote
desktop/servers. 2. Secure branch office connectivity: Rather than
subscribing to an expensive leased line for connecting its branches
across cities, an organization can setup an IPsec enabled network for
security. 3. Setup communication with other organization: Just as
IPsec allow connectivity between various branches of an
organization, it can also be used to connect the network of different
organization together in a secure & inexpensive fashion. Basic
Concept of IPsec Protocol: IP packet consist two position IP header &
actual data IPsec feature are implemented in the form of additional
headers called as extension header to the standard, default IP header.
IPsec offers two main services authentication & confidentially. Each
of these requires its own extension header. Therefore, to support these
two main services, IPsec defines two IP extension header one for
authentication & another for confidentiality.
Page 21 / 27
about:blank 21/27
Downloaded by Darshan Awale ([email protected])
lOMoARcPSD|37379541
Page 22 / 27
about:blank 22/27
Downloaded by Darshan Awale ([email protected])
lOMoARcPSD|37379541
Page 23 / 27
about:blank 23/27
Downloaded by Darshan Awale ([email protected])
lOMoARcPSD|37379541
5. The TGS creates an encrypted key with a timestamp, and grants the
client a service ticket.
6. The client decrypts the ticket, tells the TGS it has done so, and then
sends its own encrypted key to the service.
Page 24 / 27
about:blank 24/27
Downloaded by Darshan Awale ([email protected])
lOMoARcPSD|37379541
7. The service decrypts the key, and makes sure the timestamp is still
valid. If it is, the service contacts the key distribution center to
receive a session that is returned to the client.
8. The client decrypts the ticket. If the keys are still valid,
communication is initiated between client and server.
c) Write a brief note on firewall configuration 6M
Ans. A firewall is combination of packet filter and application level Diagram
2M
getway , Base on these there are three types of configurations
Explanation
4M
Page 25 / 27
about:blank 25/27
Downloaded by Darshan Awale ([email protected])
lOMoARcPSD|37379541
Page 26 / 27
about:blank 26/27
Downloaded by Darshan Awale ([email protected])
lOMoARcPSD|37379541
Page 27 / 27
about:blank 27/27
Downloaded by Darshan Awale ([email protected])
23124
22620
3 Hours / 70 Marks Seat No.
Marks
1. Attempt any FIVE of the following : 10
(a) List any four virus categories.
(b) List any four biometric mechanisms.
(c) Define the following terms :
(i) Cryptography
(ii) Cryptanalysis
(d) Give examples of Active & Passive Attacks (two each).
(e) State the two types of firewall with its use.
(f) List two protocols in IP Sec. State its function.
(g) Classify the following cyber crime :
(i) Cyber terrorism against a government organization
(ii) Cyber – Stalking
(iii) Copyright infringement
(iv) Email harassment
[1 of 4] P.T.O.
22620 [2 of 4]
2. Attempt any THREE of the following : 12
(a) Explain basic principles of information security.
(b) Explain any two password attacks.
(c) Describe digital signature technique using message digest.
(d) Explain steganography technique with an example.
P.T.O.
21222
22620
3 Hours / 70 Marks Seat No.
15 minutes extra for each hour
Marks
(i) Confidentiality
(ii) Accountability
(ii) Piggybacking
[1 of 4] P.T.O.
22620 [2 of 4]
(e) Differentiate between viruses & worms (Any two).
(iii) Patch
(b) Consider plain text “COMPUTER ENGINEERING” & convert given plain
text into cipher text using ‘Caesar Cipher’ with shift of position three - write
down steps in encryption.
(d) Define access control & explain authentication mechanism for access control.
22620 [3 of 4]
4. Attempt any THREE of the following : 12
_______________
P.T.O.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_________
Winter-2024 EXAMINATION
Model Answer – Only for the Use of RAC Assessors
Subject Name: Network an Information Security Subject Code: 22620
Q. Sub Marking
Answer
No. Q. N. Scheme
Page 1 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_________
Winter-2024 EXAMINATION
Model Answer – Only for the Use of RAC Assessors
Subject Name: Network an Information Security Subject Code: 22620
Q. Sub Marking
Answer
No. Q. N. Scheme
Virus modifies the code. Worm does not modify the code.
Page 2 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_________
Winter-2024 EXAMINATION
Model Answer – Only for the Use of RAC Assessors
Subject Name: Network an Information Security Subject Code: 22620
Q. Sub Marking
Answer
No. Q. N. Scheme
Ans. Active attacks Any Two
1. Interruption Active &
2. Message Modification Attack Passive
3. Fabrication Attacks 2M
4. Man-in-the-Middle (MITM) Attack (½ M each)
5. Denial of Service (DoS) Attack
6. Distributed Denial of Service (DDoS) Attack
7. Trojans
8. Session Hijacking
9. Phishing
10. SQL Injection
11. Malware Attack
12. Masquerade Attack
13. Password Cracking
14. Spoofing Attacks
Passive attacks
1. Release of message contents
2. Traffic analysis
3. Eavesdropping
4. Password Sniffing,
5. Social Media Profiling
6. Shoulder Surfing
7. Covert Channel Attacks
8. Key logging
9. Network Mapping
10. Sniffing
2. Attempt any THREE of the following: 12M
(a) Explain criterias for information classification. 4M
Ans. The information classification defines what kind of information is stored on a 1M each
system. Based on that classification, the Information may need additional protections Criteria
in place. Explanation
Page 3 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_________
Winter-2024 EXAMINATION
Model Answer – Only for the Use of RAC Assessors
Subject Name: Network an Information Security Subject Code: 22620
Q. Sub Marking
Answer
No. Q. N. Scheme
4. Personal Association: The information which is personally associated with
particular individuals or it is addressed by a privacy law then such information
should be classified.
(b) Describe the dumster diving with its prevention mechanism. 4M
Ans. Dumpster Diving: Definition
2M
Dumpster diving is the process of going through a target's trash in order to find little &
bits of information. In the world of information technology, dumpster diving is a Prevention
technique used to retrieve information that could be used to carry out an attack on a Mechanism
computer network. 2M
Prevention Mechanism:
• Dumpster diving isn't limited to searching through the trash for obvious
treasures like access codes or passwords written down on sticky notes.
Innocent information like a phone list, calendar, or organizational chart can be
used to assist an attacker to gain access to the network.
• To prevent dumpster divers from learning anything valuable from the trash,
experts recommend that the company establish a disposal policy where all
paper, including print-outs, is shredded in a cross-cut shredder before being
recycled, all storage media is erased, and all staff is educated about the danger
of untracked trash.
• Attackers always need a certain amount of information before attack. If the
attacker is in the surrounding area of the target, one common place to find this
information is to go through the target's trash in order to find little bits of
information that could be useful. This process of going through a target's trash
is known as dumpster diving.
• If the attackers are very lucky, and the target's security procedures are very
poor, they may actually find user IDs and passwords. We have studied earlier
that the users sometimes write their password down. When the password is
changed, they discard the paper where the old password was written on without
shredding it and in this way the lucky dumpster diver can get a valuable clue.
• Even though the attacker is not lucky enough to obtain a password directly,
they can found the name of employee and from that it's not hard to determine
user IDs for attackers.
• From hardware or software manuals, which is purchased by user may also
provide clues as what vulnerabilities exist on the target's computer systems and
networks. Like this by many ways the attacker may gather a variety of
information, which can be useful in a social engineering attack.
Page 4 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_________
Winter-2024 EXAMINATION
Model Answer – Only for the Use of RAC Assessors
Subject Name: Network an Information Security Subject Code: 22620
Q. Sub Marking
Answer
No. Q. N. Scheme
Q. Sub Marking
Answer
No. Q. N. Scheme
Adding new user account.
Modification or access of critical system files.
Modification or removal of binary files.
Starting or stopping processes.
Privilege escalation.
Use of certain programs.
(d) Explain Data Encryption Standard. 4M
Ans. Data Encryption Standard (DES) Correct
Diagram
• The Data Encryption Standard (DES) is the classic among the symmetric block 1M
cipher algorithms. DES was developed in the 1970s as a US-government &
standard for protecting non-classified information and was published as a Explanation
Federal Information Processing Standard. 3M
• DES encrypts 64 bit clear text blocks under the control of 56 bit keys. Each
key is extended by a parity byte give a 64 bit working key.
Q. Sub Marking
Answer
No. Q. N. Scheme
Right Plaintext (RPT)
4. Each LPT and RPT goes through 16 rounds of encryption process, each with
its own key.
5. In the end LPT and RPT are rejoined and Final Permutation (FP) is performed
on the combined block.
6. The result is 64-bit Cipher text.
Initial Permutation (IP) happens only once. IP replaces the first bit of original
Plaintext block with Same original Plaintext block, second bit with the 50 bit and
so on.
3. Attempt any THREE of the following : 12M
(a) Define following terms: 4M
(i) Operating system security
(ii) Hot fix
(iii) Patch
(iv) Service Pack
Ans. (i) Operating system security: The process of ensuring OS availability, 1M for
confidentiality, integrity is known as operating system security. OS security defining
refers to the processes or measures taken to protect the operating system from each term
dangers, including viruses, worms, malware, and remote hacker intrusions.
(ii) Hot fix: A hotfix is like a quick update that fixes a specific big problem in
software. It's not like regular updates which come on a schedule for small
improvements and bug fixes.
(iii) Patch: A software patch is primarily used to address vulnerabilities issues,
errors, or performance concerns in a software application. Patches can also
provide new features, improve compatibility with other software or hardware,
and increase overall security.
(iv) Service Pack: A service pack is a collection of updates and fixes,
called patches for an operating system or a software program. Many of these
patches are often released before a larger service pack, but the service pack
allows for an easy, single installation. An installed service pack also tends to
update the version number for Windows.
Q. Sub Marking
Answer
No. Q. N. Scheme
users will simply ignore the guidelines.
(iii). Others may not be good judges of what is a strong password.
(iv). For example, many users believe that reversing a word or capitalizing the
last letter makes a password un-guessable.
2. Computer-generated passwords:
(i). Passwords are quite random in nature. Computer generated passwords also
have problems.
(ii). If the passwords are quite random in nature, users will not be able to
remember them. Even if the password is pronounceable, the user may have
difficulty remembering it and so be tempted to write it down.
(iii). In general, computer-generated password schemes have a history of poor
acceptance by users.
(iv). FIPS PUB 181 defines one of the best-designed automated password
generators. The standard includes not only a description of the approach but
also a complete listing of the C source code of the algorithm.
(v). The algorithm generates words by forming pronounceable syllables and
concatenating them to form a word. A random number generator produces a
random stream of characters used to construct the syllables and words.
Q. Sub Marking
Answer
No. Q. N. Scheme
OR
2. Passphrase Selection
• Use a string of unrelated but memorable words or a phrase.
• This approach increases the length of the password while maintaining ease of
memorization.
• Example: HorseBatteryStapleCloud.
Page 9 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_________
Winter-2024 EXAMINATION
Model Answer – Only for the Use of RAC Assessors
Subject Name: Network an Information Security Subject Code: 22620
Q. Sub Marking
Answer
No. Q. N. Scheme
word and incorporating variations.
• Example: From "I love chocolate chip cookies in 2024," create Ilc3Cci@24.
Limitations:
1. Weak Security: Caesar's cipher is vulnerable to brute force attacks since there
are only 25 possible shifts.
2. Frequency Analysis: Attackers can exploit letter frequency patterns to break
the cipher.
• Replace each letter in the plaintext with the letter shifted by the key.
Non-alphabetic characters remain unchanged.
Page 10 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_________
Winter-2024 EXAMINATION
Model Answer – Only for the Use of RAC Assessors
Subject Name: Network an Information Security Subject Code: 22620
Q. Sub Marking
Answer
No. Q. N. Scheme
3. Decrypt the Message:
• H → K, E → H, L → O, L → O, O → R
• W → Z, O → R, R → U, L → O, D → G
Encrypted message: KHOOR ZRUOG
Decryption Process:
To decrypt, shift each letter backwards by 3:
• K → H, H → E, O → L, O → L, R → O
• Space remains unchanged.
• Z → W, R → O, U → R, O → L, G → D
Decrypted message: HELLO WORLD
Q. Sub Marking
Answer
No. Q. N. Scheme
• SMTP uses TCP port number 25 for his service. Hence, e-mail is delivered
from sender to receiver by having the source machine established a TCP
connection to port 25 of the destination machine.
1. At the sender's end, an SMTP server takes the message sent by a user's
computer.
2. At the sender's end, the SMTP server at the sender's then transfers the message
to the SMTP server of the receiver.
3. The receiver's computer then drags the email message from SMTP server at the
receiver's end, using other email protocols like Post Office Protocol (POP) or
Internet Mail Access Protocol (IMAP).
Page 12 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_________
Winter-2024 EXAMINATION
Model Answer – Only for the Use of RAC Assessors
Subject Name: Network an Information Security Subject Code: 22620
Q. Sub Marking
Answer
No. Q. N. Scheme
The following sequence occurs during connection setup:
2. Mail transfer:
After the connection has been established, the SMTP sender may send one or more
messages to the SMTP receiver.
3. Connection termination:
(a) The sender sends a QUIT command and waits for a reply.
(b) Sender initiates TCP close operation for the TCP connection.
(c) The receiver initiates its TCP close after sending is reply to the QUIT command.
Q. Sub Marking
Answer
No. Q. N. Scheme
plaintext. plaintext.
Page 14 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_________
Winter-2024 EXAMINATION
Model Answer – Only for the Use of RAC Assessors
Subject Name: Network an Information Security Subject Code: 22620
Q. Sub Marking
Answer
No. Q. N. Scheme
Q. Sub Marking
Answer
No. Q. N. Scheme
Government.
• Mostly cyber crime is an attack on data or information about individual,
corporations or governments.
• Generally, the attacks do no take place on a physical body but it will be on
the personal or corporate virtual body that means a set of informational
attributes which define people and institutions etc. on the internet.
• In the digital world any person’s virtual identities are important elements-
information’s about individuals can be used in multiple computer data
bases owned by governments and corporations.
• There are other crimes that involve attempts to disrupt the actual workings
of the internet.
o Financial
o Piracy
o Hacking
o Cyber-terrorism
o Online Pornography
o Sabotage
The abuse of computers has also given birth to a gamut of new age crimes
that are addressed by the Information Technology Act, 2000.
We can categorize Cybercrimes in two ways
• The computer as a Target: using a computer to attack other computers.
e.g. Hacking, Virus/Worm attacks, DOS attack etc.
• Computer as a weapon: using a computer to commit real world crimes.
e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds,
Pornography etc.
Cyber laws:
•
It is the term used to describe the legal issues related to use of
communications technology.
• Cyber law is the rule which regulates the conduct of the cyber activities
and the security under the cyber space.
• Cyber law is the law related to the cyber space which includes computers,
networks, software, data storage devices, the internet, websites, emails and
electronic devices like cell phones, ATM machines etc.
• It is less of a distinct field of law in the way that property or contract are as
it is an intersection of many legal fields, including intellectual property,
privacy, freedom of expression and jurisdiction.
• In essence, cyber law is an attempt to apply law designed for the physical
world, to human activity on the internet.
Laws made to prevent Cyber Crimes:
• Information Technology Act, 2000
• Amendment in IT Act, 2000, in 2008
Q. Sub Marking
Answer
No. Q. N. Scheme
• In India, the IT act,2000 as alter by the IT act, 2008 is known as cyber law.
It has a separate chapter entitled offences in which various Cyber Crimes
have been declared as penal offences punishable with imprisonment and
fine.
Cyber law includes laws relating to :
• Cyber Crimes
• Intellectual property
• Data protection and Privacy
• Electronic and Digital Signatures
The following are the details of cyber laws in India:
1. Section 65 – Tampering with computer Source Documents
2. Section 66 - Using password of another person
3. Section 66D - Cheating Using computer resource
4. Section 66E - Publishing private Images of Others
5. Section 66F - Acts of cyber-Terrorism
6. Section 67 - Publishing Child Porn or predating children online
7. Section 69 - Govt.’s Power to block websites
8. Section 43A - Data protection at corporate level
• Law may be formed in two ways: the first way is the legislative body and
the second way is to add new amendments by case laws. The case law is
defined as the law which is made by the current decisions of the cases
which has been taken by courts.
OR
(d) Write a brief note on Firewall configuration and state its limitations. 4M
Ans. 2M for
A firewall is a combination of packet filter and application level gateway. Explanation
Based on these, there are three to configurations. &
½ M for
1. Screened Host firewall, Single-Homed Bastion. each correct
2. Screened Host firewall, Dual-Homed Bastion limitation
3. Screened Subnet Firewall (any 4)
Page 17 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_________
Winter-2024 EXAMINATION
Model Answer – Only for the Use of RAC Assessors
Subject Name: Network an Information Security Subject Code: 22620
Q. Sub Marking
Answer
No. Q. N. Scheme
only if it is intended for the application gateway, by examining the
destination address field of each incoming IP Packet.
• It will also ensure that the outgoing traffic is allowed only if it is
originated from application-level gateway, by examining the source
address field of every outgoing IP Packet.
• An application-level gateway performs authentication as well as proxy
functions.
Q. Sub Marking
Answer
No. Q. N. Scheme
Limitations:
1. Firewall cannot protect against attacks that bypass the firewall.
2. Firewall does not protect against insider threats like employees innocently
cooperates with an external attacker.
3. Firewall cannot protect against the transfer of virus infected programs or files.
4 It may not be able to protect against viruses and infected files since it may not be
possible to scan all incoming traffic.
OR
Firewall Configuration:
Firewall configuration involves setting up rules and policies to control network
traffic to protect systems from unauthorized access and cyber threats. A firewall
acts as a barrier between trusted internal networks and untrusted external
networks, like the internet. Configuration typically includes:
1. Defining Access Rules: Specifying which traffic is allowed or blocked based
on IP addresses, ports, and protocols.
2. Network Address Translation (NAT): Mapping private IP addresses to
public ones for secure communication.
3. Intrusion Prevention: Monitoring and blocking malicious traffic patterns.
4. Setting Up Zones: Segregating networks into zones (e.g., internal, DMZ,
external) with specific access rules.
5. Logging and Monitoring: Enabling logs for auditing and troubleshooting
network traffic.
Limitations of Firewall:
1. Cannot Prevent Internal Threats: Firewalls are ineffective against threats
originating within the network.
2. Limited Protection for Encrypted Traffic: Cannot inspect encrypted data
Page 19 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_________
Winter-2024 EXAMINATION
Model Answer – Only for the Use of RAC Assessors
Subject Name: Network an Information Security Subject Code: 22620
Q. Sub Marking
Answer
No. Q. N. Scheme
without additional tools like SSL inspection.
3. Dependence on Configuration: Poorly configured firewalls can become a
vulnerability.
4. Ineffectiveness Against Social Engineering: Firewalls cannot prevent
attacks like phishing or human errors.
5. Resource Intensive: Complex configurations may lead to performance
bottlenecks.
While firewalls are a critical component of network security, they should be part
of a layered defence strategy, including antivirus software, intrusion detection
systems, and user training.
Q. Sub Marking
Answer
No. Q. N. Scheme
attempts, or data exfiltration. By being network-focused, it monitors traffic in
real-time without interfering with endpoint operations.
Key Characteristics:
Page 21 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_________
Winter-2024 EXAMINATION
Model Answer – Only for the Use of RAC Assessors
Subject Name: Network an Information Security Subject Code: 22620
Q. Sub Marking
Answer
No. Q. N. Scheme
Scale Limited Large-scale
Complexity Easier to detect and Harder to defend against
mitigate
Page 22 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_________
Winter-2024 EXAMINATION
Model Answer – Only for the Use of RAC Assessors
Subject Name: Network an Information Security Subject Code: 22620
Q. Sub Marking
Answer
No. Q. N. Scheme
data) of the message or document.
2. The hash is then encrypted using the sender’s private key to create the digital
signature.
3. The digital signature is attached to the document and sent to the receiver.
4. The receiver decrypts the signature using the sender’s public key and compares
the hash to verify authenticity.
Applications:
Advantages:
(ii) Steganography:
Page 23 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_________
Winter-2024 EXAMINATION
Model Answer – Only for the Use of RAC Assessors
Subject Name: Network an Information Security Subject Code: 22620
Q. Sub Marking
Answer
No. Q. N. Scheme
How Steganography Works:
For example:
Applications:
Advantages:
Page 24 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_________
Winter-2024 EXAMINATION
Model Answer – Only for the Use of RAC Assessors
Subject Name: Network an Information Security Subject Code: 22620
Q. Sub Marking
Answer
No. Q. N. Scheme
Key Features:
1. Time-based Tickets: Ensures tickets are valid only for a specific time period,
reducing misuse.
2. Mutual Authentication: Both client and server confirm each other’s identity
3. Single Sign-On (SSO): Users authenticate once and gain access to multiple
services.
4. Symmetric Cryptography: Kerberos primarily uses symmetric encryption
(e.g., AES or DES) for encrypting tickets and session keys.
5. Mutual Authentication: Both the client and the server verify each other’s
identity, reducing the risk of man-in-the-middle attacks.
6. Replay Attack Protection: Kerberos includes timestamps in its tickets,
ensuring that old or duplicated tickets cannot be reused.
7. Single Sign-On (SSO): Users authenticate once and can access multiple
services within the network without re-entering credentials.
Page 25 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_________
Winter-2024 EXAMINATION
Model Answer – Only for the Use of RAC Assessors
Subject Name: Network an Information Security Subject Code: 22620
Q. Sub Marking
Answer
No. Q. N. Scheme
Q. Sub Marking
Answer
No. Q. N. Scheme
▪ Optical: Uses light to capture the ridge patterns.
▪ Capacitive: Measures electrical differences in ridge and valley patterns.
▪ Ultrasonic: Uses sound waves to map the fingerprint structure.
2. Feature Extraction: Algorithms extract specific features like:
▪ Minutiae Points: Ridge endings and bifurcations (branching points).
▪ Core and Delta Points: Central points and triangular patterns.
▪ Ridge counts and flow patterns.
3. Template Creation: The extracted features are stored as a mathematical
representation (not as an actual image) to ensure privacy.
4. Matching: The template is compared to stored fingerprint templates in the
database during verification or identification.
Applications:
Retina scanning is a biometric technique that uses the unique patterns of blood
vessels in the retina (a thin layer of tissue at the back of the eye) to identify or
verify a person's identity. The retina's intricate vascular patterns are unique to each
individual, even between identical twins, and remain stable over time, making this
method highly accurate and secure.
1. Image Capture: The individual looks into a scanner, which emits a low-energy
infrared light. The light illuminates the retina and highlights the blood vessels.
Page 27 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_________
Winter-2024 EXAMINATION
Model Answer – Only for the Use of RAC Assessors
Subject Name: Network an Information Security Subject Code: 22620
Q. Sub Marking
Answer
No. Q. N. Scheme
2. Pattern Detection: The scanner captures the reflected light, mapping the blood
vessel pattern of the retina.
3. Template Generation: The captured image is converted into a digital template
using algorithms that store the unique features.
4. Matching: During authentication, the scanned retina is compared to pre-stored
templates in a database for identity verification.
1. Data Collection: The system captures a user’s typing patterns during regular
use or during a pre-defined training phase. Metrics analysed include:
▪ Dwell Time: The time a key is pressed.
▪ Flight Time: The time between releasing one key and pressing the next.
▪ Typing Speed: Overall speed at which the user types.
▪ Error Patterns: How a user handles mistakes (e.g., use of the
backspace key).
2. Template Creation: The system uses the collected data to create a biometric
Page 28 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_________
Winter-2024 EXAMINATION
Model Answer – Only for the Use of RAC Assessors
Subject Name: Network an Information Security Subject Code: 22620
Q. Sub Marking
Answer
No. Q. N. Scheme
profile or template of the user’s typing patterns.
3. Verification: During authentication, the user’s current typing behaviour is
compared to the stored profile.
4. Machine Learning Models: Advanced systems use AI and machine learning to
continuously improve the accuracy of keystroke dynamics by adapting to changes
in a user's typing style over time.
Key Features:
Q. Sub Marking
Answer
No. Q. N. Scheme
4. Limited Context Awareness: It cannot inspect packet contents or track
application-level data (e.g., HTTP requests).
How it Works:
Advantages:
1. Simple to implement and configure.
2. Efficient for networks with basic traffic control needs.
3. Can prevent unauthorized access based on IP addresses or port numbers.
Disadvantages:
1. Lacks the ability to inspect deeper packet contents (e.g., payload).
2. Cannot detect malicious traffic hidden in allowed protocols (e.g., HTTP or
HTTPS).
3. Does not track connection states, leading to potential security gaps.
Example Use Case: A packet filter firewall might block incoming packets from
specific IP addresses (e.g., known malicious sources) or disallow access to certain
ports (e.g., 22 for SSH) to restrict unauthorized access to a server.
Page 30 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_________
Winter-2024 EXAMINATION
Model Answer – Only for the Use of RAC Assessors
Subject Name: Network an Information Security Subject Code: 22620
Q. Sub Marking
Answer
No. Q. N. Scheme
A Proxy Server is an intermediary server that sits between a client (such as a user’s
computer) and the server providing the service (such as a website). The proxy
server makes requests on behalf of the client and then forwards the response back to
the client. It acts as a "gateway" that facilitates or controls communication between
a user and the internet or other network resources.
Key Features:
How it Works:
1. A client (e.g., a user’s web browser) sends a request to access a resource, such
as a webpage.
2. The proxy server intercepts the request and makes the same request to the
destination server (e.g., the website).
3. The destination server responds with the requested resource (e.g., the webpage).
4. The proxy server forwards the resource back to the client.
5. If the proxy server has cached the resource (and caching is enabled), it can
return the cached content without querying the destination server.
1. Forward Proxy: The most common type, used by clients (e.g., users) to access
Page 31 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_________
Winter-2024 EXAMINATION
Model Answer – Only for the Use of RAC Assessors
Subject Name: Network an Information Security Subject Code: 22620
Q. Sub Marking
Answer
No. Q. N. Scheme
external resources. It typically serves for anonymity, content filtering, or bypassing
restrictions.
2. Reverse Proxy: Positioned in front of one or more web servers, it handles
incoming requests and forwards them to the appropriate server in the back-end.
Reverse proxies are often used to load balance traffic, improve security, and
optimize performance.
3. Transparent Proxy: This type does not modify the request or response, and the
client is often unaware of its presence. It is used for monitoring or caching.
4. Anonymous Proxy: This type of proxy hides the user's IP address from the
destination server, providing some level of anonymity.
5. High Anonymity Proxy: This proxy not only hides the client’s IP address but
also makes it appear as though the client is not using a proxy at all.
Advantages:
1. Privacy and Anonymity: By hiding the client’s IP address, proxies provide
anonymity for users.
3. Access Control: Proxies can restrict access to certain websites or content, either
for security reasons or to enforce company policies.
Disadvantages:
1. Single Point of Failure: If the proxy server goes down, clients may be unable
to access the resources they need.
2. Slower Performance: In some cases, proxy servers can slow down traffic due
to their intermediary role, especially if they are overloaded.
3. Limited Security: While proxies provide some security features, they are not a
substitute for other security measures like firewalls and intrusion detection systems.
Page 32 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_________
Winter-2024 EXAMINATION
Model Answer – Only for the Use of RAC Assessors
Subject Name: Network an Information Security Subject Code: 22620
Q. Sub Marking
Answer
No. Q. N. Scheme
Page 33 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_________
Winter-2024 EXAMINATION
Model Answer – Only for the Use of RAC Assessors
Subject Name: Network an Information Security Subject Code: 22620
Q. Sub Marking
Answer
No. Q. N. Scheme
attribution and the right to object to derogatory treatment of the work.
(ii) Patent:
1. Exclusive Rights: The patent holder has the exclusive right to use, make, sell,
or license the invention.
2. Invention: The patent is granted for new inventions or improvements to
existing inventions.
3. Novelty: To qualify for a patent, the invention must be novel, meaning it must
be new and not previously disclosed to the public in any form (e.g., published in
scientific papers, patents, or existing products).
4. Non-Obviousness: The invention must not be obvious to someone skilled in
the relevant field based on existing knowledge or inventions.
5. Utility: The invention must be useful and capable of providing some practical
benefit.
Page 34 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_________
Winter-2024 EXAMINATION
Model Answer – Only for the Use of RAC Assessors
Subject Name: Network an Information Security Subject Code: 22620
Q. Sub Marking
Answer
No. Q. N. Scheme
6. Disclosure Requirement: To obtain a patent, the inventor must publicly
disclose detailed information about the invention, including how it works and how
to make it.
7. Limited Duration: Patents typically last for 20 years from the filing date (in
most countries), after which the invention enters the public domain, and anyone
can use it without permission.
Types of Patents:
1. Utility Patents: These are the most common type and cover new inventions or
functional improvements to existing products or processes. Examples include
machines, tools, software algorithms, or chemical compounds.
2. Design Patents: These protect the aesthetic design of an article or product,
such as the unique visual appearance of a chair or a smartphone. They do not cover
the functionality of the item.
3. Plant Patents: These are granted for new, distinct, and asexually reproduced
varieties of plants (e.g., new strains of flowers or crops).
(iii) Trademark:
Page 35 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_________
Winter-2024 EXAMINATION
Model Answer – Only for the Use of RAC Assessors
Subject Name: Network an Information Security Subject Code: 22620
Q. Sub Marking
Answer
No. Q. N. Scheme
consumer trust.
Types of Trademarks:
Page 36 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_________
Winter-2024 EXAMINATION
Model Answer – Only for the Use of RAC Assessors
Subject Name: Network an Information Security Subject Code: 22620
Q. Sub Marking
Answer
No. Q. N. Scheme
4. Enforcement: The trademark holder has the right to enforce the trademark by
taking legal action against others who use a confusingly similar mark in a way that
could cause consumer confusion or dilution of the trademark's value.
Page 37 of 37