CSS exam prep 3 (2)
CSS exam prep 3 (2)
1. Handshake Protocol
🔏 2. Record Protocol
● Provides confidentiality and integrity for the actual data.
📜 3. Alert Protocol
● Sends error or warning messages during communication.
● Alerts include:
○ Unexpected message
○ Bad certificate
○ Decryption failure
○ Handshake failure
IPsec achieves security in both transport and tunnel modes through encryption and
authentication, but they differ in what they protect: transport mode protects only the
payload, while tunnel mode protects the entire IP packet, including the header.
Transport Mode:
Protection:
Encrypts only the payload (data) of the IP packet, leaving the IP header (including
source and destination addresses) unprotected.
Use Case:
Primarily used for host-to-host communication where the IP header information can
remain exposed, like private or trusted networks.
Security:
Provides confidentiality and integrity for the data being transmitted, but the IP header is
visible to intermediate routers.
Tunnel Mode:
Protection:
Encrypts the entire IP packet, including both the header and the payload, providing
end-to-end security.
Use Case:
Used for connecting entire networks (e.g., VPNs) where the entire IP packet needs to
be protected, including the destination address.
Security:
Offers higher security than transport mode, as the entire packet, including the
header, is encrypted, making it harder for eavesdroppers to intercept or modify the
data.
IP Header:
A new IP header is added to the encrypted packet, containing the source and
destination addresses of the IPSec gateways, allowing intermediate routers to
forward the packet to the correct destination.
3) Explain the role of AH and ESP in IPSEC
Ans:
Introduction to IPsec
IPsec operates in two modes: Transport Mode and Tunnel Mode, and it uses two key
protocols to achieve security—Authentication Header (AH) and Encapsulating Security
Payload (ESP).
Authentication Header (AH) is a protocol in IPsec that provides data integrity and
authentication, but does not offer encryption. It ensures that the data is from a verified
source and has not been tampered with during transit.
Features of AH:
● Protects the entire packet, including the IP header (in transport mode).
Use Case:
Encapsulating Security Payload (ESP) is a more widely used IPsec protocol that provides
confidentiality, authentication, and integrity. ESP can encrypt the data payload, making
it invisible to attackers.
Features of ESP:
● Can protect either just the payload (in transport mode) or the entire IP packet (in
tunnel mode).
Use Case:
ESP is ideal for securing sensitive data, such as in remote access connections and
site-to-site VPNs, where both privacy and authentication are required.
3) Explain IPSEC protocol in detail. Also write applications and advantages of IPSEC.?
Ans:
🛡️ Integrity – Guarantees that the data has not been altered during transmission.
✅ Authentication – Confirms that the data is sent from a verified source.
🔁 Replay Protection – Prevents replay attacks by rejecting duplicate or old
packets.
6. Applications of IPsec
Virtual Private Networks IPsec is widely used in creating secure VPN tunnels over
(VPNs) public internet.
Secure Remote Access Allows employees to securely connect to corporate
networks from remote locations.
Advantages of IPsec
Advantage Description
🌐 Transparent to
Applications
Works at the network layer, so no need to modify
applications.
💻 Supports IPv4 and IPv6 Compatible with both IP versions, future-proofing the
security infrastructure.
🔁 Flexible Modes Offers both transport and tunnel mode depending on the
use case.
⚙️ Automatic Key
Management
Uses IKE for secure and automated key exchange and
renewal.
1. Introduction
In the field of cybersecurity, protecting a computer network from unauthorized access and
malicious attacks is of paramount importance. Two essential tools used for this purpose are
Firewalls and Intrusion Detection Systems (IDS). While both are security mechanisms,
they serve different purposes and operate differently.
2. What is a Firewall?
A Firewall is a network security device or software that monitors and controls incoming and
outgoing network traffic based on a set of security rules. Its primary function is to create
a barrier between a trusted internal network and untrusted external networks, such as the
internet.
Example:
A firewall can be compared to a security guard at a building entrance who only allows
authorized individuals to enter based on an approved list.
3. Types of Firewalls
Type Description
Packet-Filtering Firewall Filters traffic based on packet headers (IP address, port
number, protocol).
Stateful Inspection Tracks the state of active connections and makes decisions
Firewall based on connection context.
Hardware Firewall Physical device used at the network perimeter to filter traffic.
An Intrusion Detection System (IDS) is a security tool that monitors network traffic and
detects suspicious activities or known threats. Unlike firewalls, IDS does not block
traffic but instead generates alerts for administrators when potential intrusions are detected.
Example:
An IDS works like a CCTV surveillance system that monitors all activities and notifies the
owner in case of any suspicious behavior, but does not stop it directly.
Primary Controls and filters network Detects suspicious activity and alerts
Function traffic admin
Action Taken Can block or allow traffic Only monitors and sends alerts
Characteristics of Firewalls
Characteristic Description
Stateful Inspection Tracks the state of active connections to make more informed
decisions.
User Authentication Some firewalls include features for verifying user identity before
allowing access.
VPN Support Modern firewalls often support secure connections like VPN
tunneling.
Application Layer Firewalls, also known as proxy firewalls, work at the seventh layer
(Application Layer) of the OSI model. They inspect and filter traffic based on
application-level data, such as HTTP, FTP, DNS, or SMTP protocols.
Unlike basic firewalls that only examine headers, application layer firewalls analyze the
actual content of network packets, providing deeper inspection.
Advantage Description
Deep Packet Inspection Analyzes content inside the packets, not just header info.
Prevention of Specific Detects and blocks attacks like SQL injection, cross-site
Attacks scripting, etc.
Improved Security Provides detailed logs and reports for forensic analysis.
Monitoring
Disadvantage Description
High Resource Requires more CPU and memory due to deep inspection.
Consumption
Reduced Network Speed Can introduce latency due to thorough packet inspection.
1. Introduction
In today’s connected world, cybersecurity threats are increasing rapidly. Organizations need
systems that not only prevent threats but also detect suspicious activities. One such tool
is the Intrusion Detection System (IDS). IDS plays a vital role in identifying potential
attacks by monitoring network traffic or host systems and alerting administrators when
anomalies are detected.
2. Definition of IDS
3. Types of IDS
Type Description
Host-based IDS (HIDS) Monitors activities on a specific host or device (e.g., log files,
system calls).
4. Working of IDS
6. Features of IDS
● Real-time monitoring
● Alert generation
7. Advantages of IDS
Advantage Description
8. Limitations of IDS
Limitation Description
Cannot Prevent Attacks Only detects and alerts; cannot block or stop traffic.
Requires Expert Needs trained staff to analyze alerts and take appropriate
Monitoring actions.
What is Phishing?
Phishing is a type of cyber attack where an attacker attempts to trick individuals into
revealing personal or sensitive information by posing as a trustworthy entity, usually
through emails, messages, phone calls, or fake websites.
Phishing relies on social engineering techniques to manipulate the victim into taking an
action, such as clicking on a malicious link or entering credentials into a fake login page.
1. Bait: The attacker creates a fake but convincing message or website.
2. Hook: The victim is lured into clicking a link, opening an attachment, or entering data.
3. Catch: The attacker collects the victim’s data or infects the system with malware.
Type Description
Email Phishing Most common form; fake emails that appear to be from trusted
sources like banks or companies.
Spear Phishing Targeted phishing aimed at a specific individual or organization
using personalized details.
Smishing (SMS Phishing via SMS messages, often containing malicious links or
Phishing) phone numbers.
Vishing (Voice Phishing via phone calls, where attackers pretend to be from
Phishing) banks, tech support, etc.
Clone Phishing A legitimate email is cloned and slightly modified with malicious
links or attachments.
5. Prevention Tips
Introduction
Web browsers are the primary tools people use to access the internet. As they act as a
bridge between users and online resources, they have become prime targets for attackers.
A web browser attack is an exploit that takes advantage of vulnerabilities in the browser
software or its extensions to carry out malicious activities.
Malicious Attackers create harmful browser extensions that steal user data
Extensions/Add-ons or control browser actions.
Clickjacking Tricking users into clicking something different from what they
see (e.g., invisible buttons).
Phishing via Fake Attackers create fake login pages that appear identical to real
Websites ones to steal credentials.
Cross-Site Scripting Injecting malicious scripts into trusted websites which execute in
(XSS) the victim’s browser.
Keep Browser Updated Always use the latest browser version to fix known
vulnerabilities.
Avoid Suspicious Don’t click unknown links or download files from
Links/Downloads untrusted websites.
Use Reputed Extensions Only install extensions from official browser stores.
Enable Pop-up Blockers Helps prevent malicious ads from launching scripts or
downloads.