0% found this document useful (0 votes)
2 views

CSS exam prep 3 (2)

The document outlines the functions of various SSL protocols, including Handshake, Record, Alert, and Change Cipher Spec protocols, which establish secure connections, ensure data integrity, and manage communication errors. It also discusses IPsec's transport and tunnel modes, detailing their security features and applications, as well as the roles of Authentication Header (AH) and Encapsulating Security Payload (ESP) in providing data integrity and confidentiality. Additionally, it covers firewalls and Intrusion Detection Systems (IDS), highlighting their functions, types, and differences, along with an overview of phishing and web browser attacks.

Uploaded by

ishitamore1905
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

CSS exam prep 3 (2)

The document outlines the functions of various SSL protocols, including Handshake, Record, Alert, and Change Cipher Spec protocols, which establish secure connections, ensure data integrity, and manage communication errors. It also discusses IPsec's transport and tunnel modes, detailing their security features and applications, as well as the roles of Authentication Header (AH) and Encapsulating Security Payload (ESP) in providing data integrity and confidentiality. Additionally, it covers firewalls and Intrusion Detection Systems (IDS), highlighting their functions, types, and differences, along with an overview of phishing and web browser attacks.

Uploaded by

ishitamore1905
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Enlist the various functions of different protocols of SSL

1. Handshake Protocol

●​ Establishes a secure connection between client and server.​

●​ Authenticates the server (and optionally the client).​

●​ Negotiates cipher suites.​

●​ Establishes a shared session key for encryption.​

🔏 2. Record Protocol
●​ Provides confidentiality and integrity for the actual data.​

●​ Breaks data into blocks, compresses, encrypts, and transmits.​

●​ Adds MAC (Message Authentication Code) to detect tampering.​

📜 3. Alert Protocol
●​ Sends error or warning messages during communication.​

●​ Alerts include:​

○​ Unexpected message​

○​ Bad certificate​

○​ Decryption failure​

○​ Handshake failure​

●​ Helps in managing secure connection termination.​

🛠️ 4. Change Cipher Spec Protocol


●​ Signals that future messages will be encrypted using the negotiated cipher suite and
session key.​

●​ Sent by both client and server to activate encryption.​

Summary Table (Optional for Exam):


Protocol Function

Handshake Protocol Authentication, key exchange, session setup

Record Protocol Data encryption, integrity check using MAC

Alert Protocol Error/warning notifications during session

Change Cipher Indicates switch to encrypted communication


Spec

2) How security is achieved in transport and tunnel to mode of IPSEC.


ANS:

IPsec achieves security in both transport and tunnel modes through encryption and
authentication, but they differ in what they protect: transport mode protects only the
payload, while tunnel mode protects the entire IP packet, including the header.

Transport Mode:

​ Protection:​
Encrypts only the payload (data) of the IP packet, leaving the IP header (including
source and destination addresses) unprotected.
​ Use Case:​
Primarily used for host-to-host communication where the IP header information can
remain exposed, like private or trusted networks.
​ Security:​
Provides confidentiality and integrity for the data being transmitted, but the IP header is
visible to intermediate routers.

Tunnel Mode:

​ Protection:​
Encrypts the entire IP packet, including both the header and the payload, providing
end-to-end security.
​ Use Case:​
Used for connecting entire networks (e.g., VPNs) where the entire IP packet needs to
be protected, including the destination address.
​ Security:​
Offers higher security than transport mode, as the entire packet, including the
header, is encrypted, making it harder for eavesdroppers to intercept or modify the
data.
​ IP Header:​
A new IP header is added to the encrypted packet, containing the source and
destination addresses of the IPSec gateways, allowing intermediate routers to
forward the packet to the correct destination.

​ 3) Explain the role of AH and ESP in IPSEC
​ Ans:

Introduction to IPsec

IPsec (Internet Protocol Security) is a suite of protocols designed to secure IP


communications by authenticating and encrypting each IP packet during data transmission.
It ensures three primary security services:

●​ Confidentiality – Keeping data hidden from unauthorized users.​

●​ Integrity – Ensuring the data is not altered in transit.​

●​ Authentication – Verifying the identity of the sender.​

IPsec operates in two modes: Transport Mode and Tunnel Mode, and it uses two key
protocols to achieve security—Authentication Header (AH) and Encapsulating Security
Payload (ESP).

1. Authentication Header (AH)

Authentication Header (AH) is a protocol in IPsec that provides data integrity and
authentication, but does not offer encryption. It ensures that the data is from a verified
source and has not been tampered with during transit.

Features of AH:

●​ Provides connectionless integrity and data origin authentication.​

●​ Protects the entire packet, including the IP header (in transport mode).​

●​ Does not provide confidentiality, as it does not encrypt the data.​

Use Case:

AH is suitable in scenarios where data confidentiality is not critical, but verification of


sender identity and message integrity is necessary.
2. Encapsulating Security Payload (ESP)

Encapsulating Security Payload (ESP) is a more widely used IPsec protocol that provides
confidentiality, authentication, and integrity. ESP can encrypt the data payload, making
it invisible to attackers.

Features of ESP:

●​ Provides data encryption, ensuring confidentiality.​

●​ Offers authentication and integrity checking.​

●​ Can protect either just the payload (in transport mode) or the entire IP packet (in
tunnel mode).​

●​ Typically used in Virtual Private Networks (VPNs).

Use Case:

ESP is ideal for securing sensitive data, such as in remote access connections and
site-to-site VPNs, where both privacy and authentication are required.

3) Explain IPSEC protocol in detail. Also write applications and advantages of IPSEC.?

Ans:

Key Features of IPsec

​ 🔒 Confidentiality – Ensures that the data is encrypted and cannot be read by


unauthorized users.​

​ 🛡️ Integrity – Guarantees that the data has not been altered during transmission.​
​ ✅ Authentication – Confirms that the data is sent from a verified source.​
​ 🔁 Replay Protection – Prevents replay attacks by rejecting duplicate or old
packets.​

6. Applications of IPsec

Application Area Explanation

Virtual Private Networks IPsec is widely used in creating secure VPN tunnels over
(VPNs) public internet.
Secure Remote Access Allows employees to securely connect to corporate
networks from remote locations.

Site-to-Site Security Connects multiple offices securely over an IP network.

Secure Communications IPsec is a mandatory part of IPv6, enabling built-in security.


in IPv6

Cloud Infrastructure Protects data transferred between on-premises and cloud


Security services.

Advantages of IPsec

Advantage Description

🔐 Strong Security Offers end-to-end encryption and robust authentication


mechanisms.

🌐 Transparent to
Applications
Works at the network layer, so no need to modify
applications.

💻 Supports IPv4 and IPv6 Compatible with both IP versions, future-proofing the
security infrastructure.

🔁 Flexible Modes Offers both transport and tunnel mode depending on the
use case.

⚙️ Automatic Key
Management
Uses IKE for secure and automated key exchange and
renewal.

🧩 Interoperability Supported by most operating systems and network


devices.
Firewall and Intrusion Detection System (IDS)

1. Introduction

In the field of cybersecurity, protecting a computer network from unauthorized access and
malicious attacks is of paramount importance. Two essential tools used for this purpose are
Firewalls and Intrusion Detection Systems (IDS). While both are security mechanisms,
they serve different purposes and operate differently.

2. What is a Firewall?

A Firewall is a network security device or software that monitors and controls incoming and
outgoing network traffic based on a set of security rules. Its primary function is to create
a barrier between a trusted internal network and untrusted external networks, such as the
internet.

Example:

A firewall can be compared to a security guard at a building entrance who only allows
authorized individuals to enter based on an approved list.

Key Functions of a Firewall:

●​ Allows or blocks traffic based on predefined rules.​

●​ Prevents unauthorized access.​

●​ Protects systems from malware, hackers, and other threats.​

3. Types of Firewalls

Type Description

Packet-Filtering Firewall Filters traffic based on packet headers (IP address, port
number, protocol).

Stateful Inspection Tracks the state of active connections and makes decisions
Firewall based on connection context.

Proxy Firewall Acts as an intermediary and inspects data at the application


(Application Layer) layer.
Next-Generation Firewall Includes advanced features like deep packet inspection,
(NGFW) malware detection, and IDS/IPS.

Software Firewall Installed on individual devices; controls traffic on a


per-device basis.

Hardware Firewall Physical device used at the network perimeter to filter traffic.

Cloud-Based Firewall Hosted in the cloud; used for securing cloud-based


infrastructure.

4. What is an Intrusion Detection System (IDS)?

An Intrusion Detection System (IDS) is a security tool that monitors network traffic and
detects suspicious activities or known threats. Unlike firewalls, IDS does not block
traffic but instead generates alerts for administrators when potential intrusions are detected.

Example:

An IDS works like a CCTV surveillance system that monitors all activities and notifies the
owner in case of any suspicious behavior, but does not stop it directly.

Key Functions of IDS:

●​ Monitors network for unusual behavior or known attack patterns.​

●​ Sends alerts to administrators for further action.​

●​ Helps identify vulnerabilities and security gaps.​

5. Difference Between Firewall and IDS

Aspect Firewall Intrusion Detection System (IDS)

Primary Controls and filters network Detects suspicious activity and alerts
Function traffic admin

Action Taken Can block or allow traffic Only monitors and sends alerts

Type of Security Preventive (stops attacks) Detective (identifies attacks)

Position in At network gateway (entry/exit Inside the network (monitoring traffic


Network point) internally)

Real-Time Yes No, alerts after detection


Response
Example Like a security guard who Like a CCTV that records and
stops intruders reports intruders

Characteristics of Firewalls

The key characteristics that define an effective firewall are:

Characteristic Description

Traffic Filtering Firewalls allow or block traffic based on rules related to IP


addresses, ports, and protocols.

Monitoring and Firewalls keep logs of network activity, helping administrators


Logging track suspicious behavior.

Access Control Only authorized users or systems are allowed to communicate


through the firewall.

Policy Enforcement Implements organizational security policies across network


devices.

Stateful Inspection Tracks the state of active connections to make more informed
decisions.

User Authentication Some firewalls include features for verifying user identity before
allowing access.

VPN Support Modern firewalls often support secure connections like VPN
tunneling.

Intrusion Prevention Advanced firewalls include intrusion prevention features to detect


and stop threats.

3. Application Layer Firewall Protocols

Application Layer Firewalls, also known as proxy firewalls, work at the seventh layer
(Application Layer) of the OSI model. They inspect and filter traffic based on
application-level data, such as HTTP, FTP, DNS, or SMTP protocols.

Unlike basic firewalls that only examine headers, application layer firewalls analyze the
actual content of network packets, providing deeper inspection.

4. Advantages of Application Layer Firewall Protocols

Advantage Description
Deep Packet Inspection Analyzes content inside the packets, not just header info.

Granular Control Allows control over specific applications, URLs, or even


keywords.

Prevention of Specific Detects and blocks attacks like SQL injection, cross-site
Attacks scripting, etc.

Protocol-Level Filtering Can understand and enforce rules based on specific


application protocols.

Improved Security Provides detailed logs and reports for forensic analysis.
Monitoring

5. Disadvantages of Application Layer Firewall Protocols

Disadvantage Description

High Resource Requires more CPU and memory due to deep inspection.
Consumption

Reduced Network Speed Can introduce latency due to thorough packet inspection.

Complex Configuration Requires detailed configuration and understanding of


application protocols.

Cost Typically more expensive than traditional firewalls.

Limited Throughput May not be ideal for very high-speed or high-volume


networks.

Intrusion Detection System (IDS)

1. Introduction

In today’s connected world, cybersecurity threats are increasing rapidly. Organizations need
systems that not only prevent threats but also detect suspicious activities. One such tool
is the Intrusion Detection System (IDS). IDS plays a vital role in identifying potential
attacks by monitoring network traffic or host systems and alerting administrators when
anomalies are detected.

2. Definition of IDS

An Intrusion Detection System (IDS) is a security system designed to monitor network


or system activities for malicious actions, policy violations, or suspicious behavior. It does
not block traffic but rather detects and reports such activities to system administrators for
appropriate action.

3. Types of IDS

Type Description

Network-based IDS Monitors entire network traffic to detect suspicious activity.


(NIDS)

Host-based IDS (HIDS) Monitors activities on a specific host or device (e.g., log files,
system calls).

4. Working of IDS

●​ Traffic Monitoring: IDS captures network or system data.​

●​ Analysis: It analyzes this data against known attack signatures or behavioral


patterns.​

●​ Detection: If suspicious activity is found, it is flagged.​

●​ Alerting: The system generates alerts to notify the administrator.​

6. Features of IDS

●​ Real-time monitoring​

●​ Signature and behavior-based detection​

●​ Alert generation​

●​ Logging of suspicious activity​

●​ Integration with other security tools​

7. Advantages of IDS

Advantage Description

Early Detection Helps detect threats before serious damage occurs.


Real-time Alerts Notifies security teams immediately.

Supports Compliance Helps meet regulatory requirements for monitoring.

Identifies Internal Detects misuse or suspicious behavior from inside the


Threats network.

8. Limitations of IDS

Limitation Description

Cannot Prevent Attacks Only detects and alerts; cannot block or stop traffic.

False Positives May generate alerts for harmless activity.

Requires Expert Needs trained staff to analyze alerts and take appropriate
Monitoring actions.

What is Phishing?

Phishing is a type of cyber attack where an attacker attempts to trick individuals into
revealing personal or sensitive information by posing as a trustworthy entity, usually
through emails, messages, phone calls, or fake websites.

Phishing relies on social engineering techniques to manipulate the victim into taking an
action, such as clicking on a malicious link or entering credentials into a fake login page.

3. How Phishing Works

1.​ Bait: The attacker creates a fake but convincing message or website.​

2.​ Hook: The victim is lured into clicking a link, opening an attachment, or entering data.​

3.​ Catch: The attacker collects the victim’s data or infects the system with malware.​

4. Common Types of Phishing Techniques

Type Description

Email Phishing Most common form; fake emails that appear to be from trusted
sources like banks or companies.
Spear Phishing Targeted phishing aimed at a specific individual or organization
using personalized details.

Whaling Targets high-level executives or VIPs in an organization with


specially crafted messages.

Smishing (SMS Phishing via SMS messages, often containing malicious links or
Phishing) phone numbers.

Vishing (Voice Phishing via phone calls, where attackers pretend to be from
Phishing) banks, tech support, etc.

Pharming Redirects users to fake websites by compromising DNS settings.

Clone Phishing A legitimate email is cloned and slightly modified with malicious
links or attachments.

Angler Phishing Conducted through social media platforms by creating fake


customer service profiles.

5. Prevention Tips

●​ Do not click on suspicious links or attachments.​

●​ Verify email addresses and sender identities.​

●​ Use multi-factor authentication (MFA).​

●​ Keep systems and antivirus software updated.​

●​ Educate users about phishing awareness.

What are the web browser attracts

Introduction

Web browsers are the primary tools people use to access the internet. As they act as a
bridge between users and online resources, they have become prime targets for attackers.
A web browser attack is an exploit that takes advantage of vulnerabilities in the browser
software or its extensions to carry out malicious activities.

2. Common Types of Web Browser Attacks


Attack Type Description

Drive-by Downloads Malicious code is automatically downloaded and installed when


a user visits a compromised website.

Malicious Attackers create harmful browser extensions that steal user data
Extensions/Add-ons or control browser actions.

Clickjacking Tricking users into clicking something different from what they
see (e.g., invisible buttons).

Man-in-the-Browser Malware installed in the browser modifies web pages or


(MitB) captures data without the user’s knowledge.

Phishing via Fake Attackers create fake login pages that appear identical to real
Websites ones to steal credentials.

Cross-Site Scripting Injecting malicious scripts into trusted websites which execute in
(XSS) the victim’s browser.

Session Hijacking Attackers steal session tokens to gain unauthorized access to


user accounts.

Browser Hijacking Changes browser settings like homepage or search engine


without user permission, often redirecting to ads or malicious
sites.

3. Effects of Browser Attacks

●​ Theft of sensitive information (passwords, bank details)​

●​ System slowdown or crash​

●​ Unwanted ads and pop-ups​

●​ Unauthorized access to online accounts​

●​ Installation of additional malware​

4. Prevention and Protection

Prevention Method Description

Keep Browser Updated Always use the latest browser version to fix known
vulnerabilities.
Avoid Suspicious Don’t click unknown links or download files from
Links/Downloads untrusted websites.

Use Reputed Extensions Only install extensions from official browser stores.

Use Antivirus and Protects your system against browser-based threats.


Anti-malware

Enable Pop-up Blockers Helps prevent malicious ads from launching scripts or
downloads.

Use HTTPS Websites Ensures encrypted connection to protect your data.

You might also like