CNS ENDSEM notes
CNS ENDSEM notes
1. 🟠 Contention-Based Protocols
📌 Key Idea:
No prior reservation of the medium.
Nodes contend (compete) for channel access when they have data to
send.
⚙️How it works:
Uses mechanisms like CSMA/CA (Carrier Sense Multiple Access with
Collision Avoidance).
Nodes sense the channel and use RTS/CTS to reduce collisions.
❌ Limitations:
Cannot guarantee Quality of Service (QoS) (e.g., for real-time
voice/video).
Possible collisions due to contention.
May lead to unfairness.
✅ Example:
MACAW (Multiple Access with Collision Avoidance for Wireless) – improves
on MACA using RTS/CTS/DS/ACK.
o Traffic load
✅ Advantages:
Improved energy efficiency
Better delay management and fairness
Can be adaptive to traffic and power constraints
🧠 Example:
DPS (Distributed Priority Scheduling) – assigns dynamic priorities and
schedules transmissions accordingly.
Certainly! Here’s a pointwise short answer on Applications of Sensor
Networks suitable for exams:
2. Environmental Monitoring:
o Detection of forest fires and floods.
3. Healthcare:
o Patient diagnosis and monitoring using wearable sensors.
Here's the information converted into a clear comparative table between Ad Hoc
Wireless Networks and Sensor Networks:
Feature Ad Hoc Wireless Sensor Networks
Networks
2. Controller:
o Usually a microcontroller (low cost, flexible, low power).
3. Transceiver:
o Wireless communication device combining transmitter and receiver.
5. Power Source:
o Batteries (rechargeable or non-rechargeable) are main power
sources.
o Power harvesting possible (solar, RF, vibration).
Total Questions: 8
Questions:
1. Explain MACAW protocol in details.
2. What are hidden station and exposed station problem in WLAN?
3. Explain Adhoc Network MAC Layer with Design Issues, Design Goal &
Classification.
4. Comment on Adhoc Network MAC layer with design issues, Design goal.
5. Explain design issues and design goal in adhoc network MAC layer.
6. Comment on Adhoc Network MAC Layer with Design Issues, Design Goal.
7. Write a short note on MACAW.
8. What are hidden station and exposed station problem in WLAN?
1. Mobility of Nodes
In ad hoc wireless networks, nodes are mobile, resulting in highly dynamic
network topologies.
The movement of intermediate or end nodes causes frequent path
breakages during an ongoing session.
Unlike wired networks with fixed infrastructure, route maintenance
becomes a complex and continuous task.
Routing protocols must quickly adapt to topological changes to ensure
seamless data transmission.
2. Bandwidth Constraint
Wired networks benefit from technologies like fiber optics and WDM,
offering high bandwidth.
In contrast, wireless networks have limited radio spectrum, leading to
lower data rates.
Routing protocols must minimize control overhead to conserve bandwidth.
Maintaining up-to-date topology information at all nodes is bandwidth-
intensive and should be optimized.
5. Resource Constraints
Ad hoc nodes are usually portable, battery-operated devices with limited
energy and processing power.
Routing protocols must operate efficiently, minimizing CPU usage and
power consumption.
Increasing node capabilities would compromise portability due to size and
weight.
6. Location-Dependent Contention
Channel load varies with node density in a specific area.
High node density causes increased contention, packet collisions, and
bandwidth wastage.
Effective routing protocols must balance network traffic to avoid localized
congestion and contention.
o Denial-of-service (DoS)
o Impersonation
o Rushing attacks
Classification
Network security
AES
It is a symmetric encryption algorithm
It is a block cipher
Key can be 128/192/256 bits
Data blocks are 128 bits
After key expansion the data (128 bits or 16 bytes ) are arranged into a 4x4 grid
in column major arrangement
Also called state array
Each round consists of 4 steps:
1) SubBytes or Substitution bytes
Here S-Box (16x16) is used to convert it byte into new bytes
Introduces confusion
Non-linear subtitution
2) Shift Rows
Here the rows are shifted k times
Ex. Row-0 is shifted 0 times
Uses left circular shift
Row-1 is shifted 1 time , row-2 is shifted 2 times, etc
3) Mix Columns
Skipped in the last round
This matrix is used to multiply the 4x4 state matrix to get the
new matrix
When we do the multiplication , instead of adding the results
we xor them
4) Add Round keys
Here the particular round key is XORed with the ouput of the
previous stage
Here we don’t consider state as table instead we just
consider it as 128 bit number
So these 4 steps are repeated in each round and generate a cipher text
DES
Data encryption standard
It is a block cipher
It is symmetric encryption algorithm
It used fixed sized 56 bit key, acutaul length is 64 bit but 8 bits are for parity
(every 8th bit is discarded)
Then for each round , the 56 bit key is converted to 48 bit keys
Data blocks are 64 bits
Uses Confution and diffusion
Consists of 16 rounds
Before the round begins Initial permutaion is done on the plain text using the ip
table
It reorders the 64 bits plaintext based on the new position in ip table
Increases diffusion before the process begins
After this The plain text is seperated in two halves
L and R each of 32bits
Great catch! Here's the revised DES notes where I explicitly explain the initial
permutation and integrate it naturally into the same-length, AES-style format:
DES
It is a symmetric encryption algorithm
It is a block cipher
Key size is 56 bits (input key is 64 bits, 8 bits for parity)
Data blocks are 64 bits
2. Key Mixing
o 48-bit round key is generated using key schedule
o Adds confusion
3. Substitution (S-boxes)
o Output is divided into 8 blocks of 6 bits
4. Permutation (P-box)
o The 32-bit result is permuted with a fixed table
Variations:
1) Double DES
Just apply des 2 times
2) Triple DES
Just encrypt the text three times either with two keys or three
keys
Certainly, Vaibhav! Here are expanded key points for ECB, CBC, CFB, and
OFB modes** that will help you write detailed exam answers with depth and
clarity. Each point adds useful insight or contrast that examiners appreciate.
🔁 1. Set
A set is just a collection of elements.
Example: {0, 1, 2, 3} is a set of integers.
🔧 2. Binary Operation
An operation that combines two elements of a set to produce another element
of the same set.
Examples:
+ in integers: 2 + 3 = 5 → still in integers
× in real numbers
🔄 3. Group
A group is a set + binary operation with these 4 properties:
1. Closure: a * b is in the set
2. Associativity: (a * b) * c = a * (b * c)
🧱 4. Ring
A ring has two operations: addition and multiplication
(R, +) is an abelian group
(R, ×) is associative
Multiplication distributes over addition
❌ Multiplicative inverse is not required
❌ Commutativity of multiplication is optional
Example: Integers (Z, +, ×)
🧮 5. Field
A field is a ring with more power:
(F, +) is an abelian group
(F\{0}, ×) is also an abelian group
Both operations obey distributivity
🔥 Every non-zero element must have a multiplicative inverse
Examples:
Rational numbers (1/2, 3/4...)
Finite fields: GF(p) → important in cryptography
🔢 6. Prime Number
Integer > 1 with exactly two divisors: 1 and itself
Used in modulo arithmetic, especially RSA encryption
2 is the only even prime
📦 Summary Table:
C = Memod n
M = Cdmod n
Find private
Digital signatures
You know
Choosen message attack
Known message attack
Key only attack
📌 Index
1. Introduction
2. Need for Digital Signatures
3. How Digital Signatures Work
4. Properties of Digital Signatures
5. Algorithms Used for Digital Signatures
6. Applications of Digital Signatures
7. Introduction to Digital Certificates
8. Structure of a Digital Certificate
9. Certification Authorities (CA)
10.The Role of Public Key Infrastructure (PKI)
11.Verification Process of Digital Certificates
12.Revocation of Digital Certificates
13.Difference Between Digital Signature and Certificate
14.Use Cases and Real-World Examples
15.Conclusion
1. ✅ Introduction
With the exponential rise in electronic communication, security has become a top
priority. Just like handwritten signatures verify the authenticity of paper
documents, digital signatures verify the authenticity of digital data. Similarly,
digital certificates act like ID cards issued to entities, verifying their identity on
the internet.
Property Description
Authenticatio
Verifies the identity of the sender
n
Non-
Sender cannot deny having sent it
repudiation
5. 🧠 Algorithms Used
1. RSA – Uses large integer factorization for public-private key generation
2. DSA (Digital Signature Algorithm) – Developed by NIST, faster than
RSA for signing
3. ECDSA – Elliptic Curve version, stronger with shorter keys
4. EdDSA – Modern elliptic curve digital signature scheme with improved
security and performance
3. If valid, the browser trusts the website and starts encrypted session.
12. ❌ Certificate Revocation
Reasons:
Private key is compromised
Owner is no longer valid (e.g., left company)
Mistakenly issued
Mechanisms:
CRL (Certificate Revocation List)
OCSP (Online Certificate Status Protocol) – Real-time revocation
checking
Verifies message
Purpose Verifies entity identity
integrity
Contains Public
No Yes
Key?
User/entity
Issued By Trusted CA
themselves
PKI
Public Key Infrastructure (PKI) is an integrated system of hardware, software,
policies, and standards that manages the creation, distribution, and revocation of
digital certificates. PKI supports the use of public key cryptography for the secure
transmission of information over insecure networks.
Helps in achieving
Confidentiality
Integrity
Authentication
Non repudiation
Importance:
Secure website
Email encryption
Software code signing
Secure login
VPNs
Components:
CA (certification authority)
RA (Registration authority)
End-Users
Certificate Repository
Certificate Revocation Lists
Public key and private keys
Active attacks
Modification of original message
Or creation of false messages
Interruption
modification
fabrication
Principles of security
Confidentiality
Authentication
Intergrity
Availability
Non repudation
Access control
In an active attack, Victim gets While in a passive attack, Victim does not
informed about the attack. get informed about the attack.
1. Unauthorized Access
Definition:
Unauthorized access is the act of gaining access to a computer system, network,
or data without permission. It violates data confidentiality and can result in theft,
manipulation, or destruction of information.
How It Happens:
Weak or stolen passwords
Exploiting unpatched vulnerabilities
Malware that bypasses authentication
Social engineering (e.g., phishing)
Consequences:
Data theft or leakage
Loss of user trust and legal penalties
System manipulation or destruction
Potential ransomware attacks
Prevention:
Use of strong, multi-factor authentication (MFA)
Regular patching and updating of software
Role-based access control (RBAC)
Continuous monitoring and auditing
Conclusion:
All three threats — Unauthorized Access, DDoS, and MitM — pose serious risks to
cybersecurity. They affect confidentiality, integrity, and availability (CIA) of
information. Preventive strategies, awareness, and regular monitoring are key to
mitigating these attacks effectively.
List and Explain Various Computer Network Security Mechanisms
Network security mechanisms are the techniques and tools used to protect data
during transmission and storage in a computer network. These mechanisms aim
to maintain the confidentiality, integrity, and availability (CIA) of data, as
well as ensure authentication and non-repudiation.
✅ 1. Encryption
Definition:
Encryption is the process of converting data into a coded format (ciphertext) so
that only authorized parties can understand it.
Types:
Symmetric Encryption: Same key for encryption and decryption (e.g.,
AES, DES).
Asymmetric Encryption: Uses a public key for encryption and a private
key for decryption (e.g., RSA).
Purpose: Ensures confidentiality of data during transmission.
✅ 2. Authentication Mechanism
Definition:
Authentication verifies the identity of a user or device before granting access.
Common Methods:
Password-based authentication
Two-factor authentication (2FA)
Biometric authentication (e.g., fingerprint, face recognition)
Digital certificates
Purpose: Ensures only authorized users access the network or data.
✅ 4. Firewalls
Definition:
A firewall is a network security device (hardware/software) that monitors and
controls incoming and outgoing network traffic based on security rules.
Types:
Packet-filtering firewalls
Stateful inspection firewalls
Next-generation firewalls
Purpose: Acts as a barrier between trusted and untrusted networks.
✅ 6. Digital Signatures
Definition:
A digital signature is a cryptographic technique used to verify the authenticity
and integrity of a message, software, or digital document.
Purpose: Ensures non-repudiation and data integrity.
✅ 8. Hashing
Definition:
Hashing converts data into a fixed-length string (hash value) which represents
the original data.
Example Algorithms: MD5, SHA-256
Purpose: Ensures data integrity by detecting changes in data.
Final Words:
These mechanisms work collectively to build a secure network architecture. No
single mechanism can ensure full protection—layered security (defense in
depth) is the best approach.
Here’s an extended SPPU-style answer (ideal for 10-mark or long theory
questions) covering Classical Encryption Techniques: Monoalphabetic,
Polyalphabetic Substitution, and Rail Fence Transposition Cipher.
🔒 1. Substitution Ciphers
Substitution ciphers encrypt the plaintext by replacing its elements (typically
letters) with ciphertext characters. These techniques preserve the character
count but modify their identity.
Example – Depth = 2:
Plaintext: MEETMEAFTERTHETOGAPARTY
Step 1: Zigzag writing
MEMATRHTGPRY
ETEFETEOAAT
Step 2: Read row-wise →
Ciphertext: MEMATRHTGPRYETEFETEOAAT
Example – Depth = 3:
Plaintext: WEAREDISCOVEREDFLEEATONCE
Zigzag across 3 rails:
W...E...C...R...L...A...E
.E.R.D.S.O.E.E.F.E.T.N.C.
..A...I...V...D...E...O..
Ciphertext: WECRLATEERDSOEEFETNCAIVDENO
Drawbacks:
Easy to break using brute force and pattern analysis.
Does not hide frequency or patterns; merely rearranges data.
Secure versions: Multiple transposition steps, or key-based permutation
of columns (e.g., Columnar Transposition).
✅ Summary Table
2. Basic Working
The stream cipher takes a secret key (K) and uses it to initialize an
internal state.
It then uses a next-state function f to update this state over time.
An output function g generates the keystream bits (zi), which are
XORed with the plaintext to produce ciphertext.
In many designs, an initialization vector (IV) is also used to ensure
uniqueness and randomness.
6. Disadvantages
Key Reuse is Dangerous: If the same key is used for two messages,
attackers can easily find patterns by XORing the ciphertexts.
Less Flexible: Stream ciphers have fewer modes of operation compared
to block ciphers.
Stream
Feature Block Cipher
Cipher
Bitwise/
Data Type Blockwise
Bytewise
8. Conclusion
Stream ciphers are a type of symmetric encryption algorithm that are efficient,
lightweight, and useful for streaming data. However, careful
implementation is necessary to avoid key reuse and maintain security. A well-
designed stream cipher using a cryptographically strong PRNG can be as
secure as a block cipher like AES.
Let me know if you'd like me to convert this into a handwritten-style PDF, make a
diagram, or prepare viva-style questions from this topic too.
Introduction:
Cyberstalking is a form of online harassment where an individual uses the
internet, email, social media, or other digital technologies to repeatedly stalk,
threaten, or harass another person. Unlike traditional stalking, cyberstalking
allows perpetrators to target victims anonymously, from any location, and at any
time, making it more invasive and psychologically damaging.
Definition:
Cyberstalking is the use of electronic communication or digital means to
harass, intimidate, monitor, or threaten someone persistently, causing emotional
distress, fear, or danger to the victim's safety and privacy.
Social Effects:
o Isolation, withdrawal from online and offline interactions.
Safety Risks:
o Escalation from online threats to real-world stalking or violence.
3. Celebrity Stalking:
o Fans stalking public figures or influencers online, sometimes
progressing to offline incidents.
Anonymity Low – stalker is usually seen High – stalker can hide behind
Aspect Traditional Stalking Cyberstalking
fake identities
Conclusion:
Cyberstalking is a serious digital crime that affects the safety, dignity, and
mental well-being of individuals, especially women and minors. As the digital
world expands, the scope of cybercrimes like stalking is also increasing. To fight
it, a multi-layered approach involving law enforcement, strong
cybersecurity habits, awareness, and strict laws is essential. Everyone
should stay informed, vigilant, and empowered to ensure a safer cyberspace.
Introduction:
Cyber espionage is one of the most dangerous forms of cybercrime that involves
unauthorized access to confidential data, often by a state or organization, for
political, military, or economic advantage. Unlike traditional spying, cyber
espionage leverages the internet and computer networks, allowing attackers to
steal sensitive information remotely and stealthily.
Definition:
Cyber espionage is the act of illegally accessing or infiltrating networks,
systems, or digital communication platforms to obtain confidential, classified, or
proprietary information, typically for intelligence, economic, or military gain.
It is often conducted by nation-states, corporate spies, or cyber
mercenaries.
Key Characteristics:
Stealthy & Persistent – Attackers remain undetected for months.
Targeted – Focused on high-value targets such as defense, research,
government, or business sectors.
Long-Term Impact – Can weaken national security and economic
competitiveness.
Not Immediate Damage – Unlike ransomware, the goal is not quick
money, but long-term advantage.
6. Man-in-the-Middle Attacks:
o Intercepting communications between systems to gather
intelligence.
Research
Innovation blueprints, vaccine formulas
Labs
Sector Targeted Information
Economic Loss:
o Theft of trade secrets can cost billions and erode competitive edge.
Diplomatic Conflicts:
o May lead to international tensions and cyberwarfare allegations.
Financial or Destruction/disruption of
Goal Intelligence gathering
personal gain systems
State-sponsored or Individuals,
Actors Military or nation-states
professional groups criminals
Durati
Long-term, silent Short-term Depends on strategy
on
Preventive Measures:
1. Network Security Protocols:
o Firewalls, intrusion detection systems, encryption.
3. Awareness Training:
o Educate staff on phishing, malware, and social engineering.
Conclusion:
Cyber espionage represents a modern form of digital warfare, where intelligence,
economics, and national security intersect. With the increasing digitization of
defense, business, and governance, the risk and sophistication of cyber
espionage are growing rapidly. Combating this threat requires a combination of
robust cyber laws, advanced technical defense mechanisms, strategic
policies, and global cooperation. Nations and organizations must treat cyber
espionage with the same seriousness as traditional espionage to secure their
data and sovereignty in the digital era.
Definition:
Cyber terrorism is the unlawful use or threat of use of computer networks and
softwareinternet technologies by terrorist organizations to attack or disrupt
critical systems, spread fear, cause harm, or achieve ideological, political, or
religious objectives.
It is different from cybercrime or cyber espionage, as the intent is to cause
terror, destruction, or large-scale disruption.
Key Characteristics:
Ideologically Motivated: Driven by religion, politics, or separatism.
Targets Critical Infrastructure: Power grids, water systems, air traffic,
banks.
Mass Impact: Intended to spread fear, confusion, or chaos among the
public.
Global Reach: Attackers can operate remotely from any country.
Low Entry Barrier: Even small groups can carry out massive digital
attacks.
Aspec
Cyber Terrorism Cyber Espionage Cybercrime
t
2. Public Panic:
o Misinformation and fake news lead to mass hysteria.
3. Economic Disruption:
o Stock markets, transport systems, and businesses get paralyzed.
5. International Collaboration:
o Share cyber intelligence and joint exercises with allies.
Conclusion:
Cyber terrorism is a grave threat in the digital era, where warfare is no longer
limited to borders or physical weapons. As digital infrastructure becomes central
to governance, security, and daily life, terrorist groups have found cyberspace to
be a powerful battlefield. Nations like India must adopt strong cybersecurity
policies, international partnerships, advanced threat detection
technologies, and legal reforms to effectively combat this invisible enemy.
Vigilance, preparedness, and resilience are key pillars in defending against cyber
terrorism.
Introduction:
In an increasingly digital world, cyber security has become a top priority for
governments, corporations, and individuals. To protect critical information
infrastructure, prevent cyberattacks, and manage risks, countries and
organizations adopt cyber security policies — formal frameworks and
strategies that guide secure use, protection, and response to cyber threats.
Definition:
A Cyber Security Policy is a formal set of rules, principles, or practices adopted
by a government or organization to safeguard data, networks, infrastructure, and
services from unauthorized access, attacks, and breaches.
Cyber security policies are essential for:
Defining clear responsibilities
Establishing security standards
Responding to incidents
Promoting awareness and resilience
4. NCIIPC Guidelines
Protects infrastructure categorized as critical (e.g., energy, telecom,
banking, transportation).
Works under the National Technical Research Organisation (NTRO).
Promotes threat intelligence sharing and resilience planning.
5. Digital India Cyber Security Initiatives
Under the umbrella of the Digital India campaign, cyber security has
been a key enabler.
Initiatives include:
o Cyber Swachhta Kendra (Botnet cleaning center)
o International cooperation
Acceptable Use
Defines rules for using organizational IT resources
Policy (AUP)
Data Classification
Categorizes data as public, confidential, or restricted
Policy
BYOD Policy Sets rules for using personal devices in the workplace
Here is a detailed answer on "What are Cyber Crimes – with Types and
Examples", written in a structured academic format suitable for 9-mark
university exams.
Introduction:
With the advancement of the internet and information technology, digital
platforms have become an integral part of everyday life. However, the
widespread use of computers, smartphones, and the internet has given rise to a
new category of criminal activity known as cybercrime.
Definition:
Cyber Crime refers to unlawful acts where a computer, network, or digital
device is used either as a tool, target, or both, to commit an offense.
These crimes are typically committed with the intent to:
Steal sensitive data
Cause harm to individuals or organizations
Disrupt services
Gain unauthorized access
Spread hate, fear, or false information
Email Sending emails that appear to come from Fake company HR job
Spoofing someone else offer mail
Hacking military
Using cyberspace to threaten
Cyber Terrorism systems, spreading fake
national security or spread panic
terror alerts
Spying on defense
Cyber Stealing classified/confidential
systems through
Espionage information from governments
malware
Sharing or possessing
Hosting illegal images or
Child Pornography sexually explicit content
videos on dark web
involving minors
Online
Selling illegal goods through Telegram/Instagram drug
Drug/Weapon
dark web or social media delivery accounts
Trafficking
Preventive Measures:
1. Strong Passwords and Multi-Factor Authentication (MFA)
2. Avoiding suspicious links or emails
3. Updating software and antivirus regularly
4. Using secure websites (HTTPS)
5. Cyber hygiene awareness through workshops and training
Conclusion:
Cyber crimes are a serious challenge in today’s digitally connected world. As
technology evolves, so do the methods of cyber criminals. Therefore,
awareness, legal enforcement, technical vigilance, and international
cooperation are key to combating this modern threat. By strengthening our
digital infrastructure and promoting responsible online behavior, we can create a
safer and more secure cyberspace for all.
Great question, Vaibhav! For a question like “Motive of Attackers in Cyber
Crime”, you should include key categories of motivations with examples under
each. Here's a detailed pointwise breakdown:
1. Financial Gain 💰
The most common motive—attackers seek monetary profit through illegal
means.
Examples:
o Credit/debit card fraud
o Ransomware attacks
Examples:
o Hacking defense/military servers
4. Cyber Terrorism ☠️
Using cyberspace to create fear, panic, or destabilize nations.
Targets: Airports, railways, power grids, defense systems
Examples:
o Shutting down air traffic systems
Conclusion:
Understanding the motive helps in profiling attackers, designing defensive
strategies, and ensuring better law enforcement responses. Every cyber
crime is intentional and driven by some gain, ideology, or emotional impulse.
Here’s a detailed exam-ready answer on Cyber Security Principles and
Services, ideal for a 9-mark question or even more depending on your
elaboration needs:
1. Confidentiality
Definition: Ensures that sensitive information is only accessible to
authorized users.
Example: Encrypting sensitive data like passwords or customer
information.
2. Integrity
Definition: Protects information from being modified by unauthorized
parties.
Example: Hashing and digital signatures are used to verify data integrity.
3. Availability
Definition: Ensures that systems, data, and services are accessible when
needed.
Example: Using redundant systems, backups, and DDoS protection.
4. Authentication
Definition: Confirms the identity of a user, system, or entity.
Example: Username-password login, OTP, biometric verification.
5. Authorization
Definition: Determines the permissions and access rights of
authenticated users.
Example: Role-Based Access Control (RBAC) used in companies.
6. Non-repudiation
Definition: Ensures that a party cannot deny the authenticity of their
actions.
Example: Email systems using digital signatures for verification.
7. Accountability
Definition: Tracks and logs user activities to maintain responsibility.
Example: Audit logs in servers or databases showing user actions.
1. Access Control
Purpose: Restricts access to data or systems.
Techniques: Passwords, biometrics, smart cards.
2. Data Encryption
Purpose: Protects data during storage or transmission.
Types: Symmetric (AES), Asymmetric (RSA).
✅ Conclusion
Cyber security principles define what to protect, while services describe how to
protect. Together, they form a comprehensive strategy to secure digital
environments against growing cyber threats. Adopting both effectively ensures
the confidentiality, integrity, and availability of information systems.
Let me know if you'd like a table format or shorter version for a 5-mark answer!
3. Techniques:
o ARP Spoofing
o DNS Spoofing
o HTTPS stripping
4. Impacts:
o Data theft, identity theft, session hijacking, financial fraud
5. Prevention:
o Use HTTPS
o Use VPN
6. Example:
o Attacker intercepts credentials while user logs in to a bank website
over unsecured Wi-Fi.
✅ 2. Phishing
✍️Points to Include:
1. Definition:
o A social engineering attack where attackers trick users into
revealing sensitive information via fake emails or websites.
2. How It Works:
o User receives a seemingly legitimate email with a link to a fake site.
3. Types of Phishing:
o Email Phishing
4. Impacts:
o Identity theft, financial loss, malware installation
5. Prevention:
o Check sender address carefully
6. Example:
o Fake email claiming to be from your bank asking you to verify
account details.
✅ 3. Malware
✍️Points to Include:
1. Definition:
o Malicious software designed to damage, disrupt, or gain
unauthorized access to systems.
2. Types of Malware:
o Virus, Worm, Trojan Horse, Ransomware, Spyware, Adware, Rootkit
3. How It Spreads:
o Infected email attachments
4. Impacts:
o Data loss, system damage, unauthorized access, financial theft,
spying
5. Prevention:
o Install antivirus/antimalware
o Regular backups
6. Example:
o WannaCry ransomware encrypts data and demands payment in
Bitcoin.
4. Impacts:
o Website downtime
o Business loss
o Resource exhaustion
5. Prevention:
o Use DDoS protection services (e.g., Cloudflare)
o Load balancing
6. Example:
o An online shopping site is flooded with traffic during sales, making it
crash.
✅ 5. SQL Injection
✍️Points to Include:
1. Definition:
o A code injection technique where attackers insert malicious SQL
queries into input fields.
2. How It Works:
o Attacker enters SQL code in user input (like login form) to
manipulate the database.
3. Impacts:
o Unauthorized data access
o Bypassing login
4. Prevention:
o Use parameterized queries (Prepared Statements)
5. Example:
o Input like ' OR '1'='1 in a login field bypasses authentication.
6. Real-World Case:
o Sony Pictures (2011) data breach was partially caused by SQL
injection.
;
Great question! Here's what happens in AODV and DSDV when the source
node receives multiple route replies for the same destination:
o Hop Count
2. If equal, then the route with the lowest hop count is preferred.
🔸 Why?
To ensure:
Freshness (avoiding outdated routes)
Efficiency (shorter path = less delay)
✅ Result:
Only one route is chosen, and the others are discarded.
DSDV (Destination-Sequenced Distance Vector)
🔹 Scenario:
DSDV is proactive, so all nodes maintain and update their routing tables
periodically. However, updates from different neighbors may provide multiple
routes to the same destination.
🔹 What happens?
When multiple routes to the same destination are received (in periodic or
triggered updates):
The route with the highest destination sequence number is chosen.
If sequence numbers are equal, the route with the lowest metric (e.g.,
hop count) is selected.
✅ Result:
Routing table is updated accordingly; old or less optimal routes are replaced.
🆚 Summary Table:
Action on Select best and discard Update table with best route
multiple replies others