Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
79 views14 pages

INS Assignment 3

Uploaded by

Unknown number
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
79 views14 pages

INS Assignment 3

Uploaded by

Unknown number
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 14
Assignment =3, 7 "Vlo 93 Delle —Lvleud a a ~ ) Defin der? VExploin ly . ‘ c > Dn “ldo, ) an individhed oy oi jp ains.UnatThorteed_aeceys._ a Q_ syst ity th oy physical loadin «They. iS km, netiuark, L We__mali ee, ents suchas steating re clo Ive ) cautsiiny clamage or cig tive inf nlomshan, i AS uDhing There ovte_velHnuy cpl oer af a So > “Hack Ng “These, individuals use ilk exploit vu fees oc eae peli. ny ¢_mativeded by tinoneial gain, Tideoleyy “ox eid on i ae | — 1) Malware $= Fnliciqus coflwaye including viv use I ____worms,“hojans,.6 van can itil y systems cause —hevmn_twithoud. Hunan _int ) Tnsideys Ereplayee.s ov individual ith access ‘ o_System _who_rmisuise thei porilepen 1 wapnsts ,suth ag dad thet 19) oY sabslage. \ 4) Phighers 3 They use decepliye ena uiebsitt “Compaen me: hos to + ssi _ oe aking mele fipns hes — offen troupes ches | SPyyvesonedion. ——8 Scape hala ge iat le e we _qrre-wsritien seviphs 0x tusks 1 Set Hock without on in-depth unde, a Siok = Sponsored Lebo Govewnnnrd ove regan ie at cond uct ci hen—ee pishage Cybern eu - teysort using”. lags & 4 cchniguen ty achiev their Goals. Q.2) Whol ig Fivewoll & evyphin He limitotiony « Ano. A Fivewol) is 0 nelwork security device on softwore thet ache os 0 borriew bebyiee o_ trusted —inteunal network bs untrusted exten] networks, such ag the incdeneh. Ts virnant ; besten ig to monitor 4 control inconning tb | Fi sdb behishe eal ncules ecuritu Dolicien. Crewolle ae designed to enhance nel udoyk security bu Ailing b blocking materially haymful or Ginauthor dala igautele Heue Gore sone limitations ctf a i) aan, Deskin Dovid pMohwawer Eirewslle Ose [ + tect one any eve noglwyre_ JNO a com entering a1 aie try auth ema}] abtachend ae downlonel. “They primarily es as a a Sackbyess Bie Mefense Against Tsicley Thrads= Firewalls any inedlective oS addeessing shreds ora inating bom oie dhe trusted nehdbyk such os Malicines sites swith airthiniced sccen gL yo Secuwe Enevupled Batic & Fivewnlls | can ingle +e __ingpec} encrypted tyofhic rm | op they chnmat cosily’ deciphey “He conbend } ¥ annec How) o Deep Macks E inspechon a is requicedl tea elfccrive anolyte al-_encrysted taLhich qnen Reus He bade funchons ale i Aroditonel fixtwalls. S A) _Compky — Annlicerion Layer Thoeaks &- Modern attack often Jesgel_yulneva bi iltien od the cxpmlicarhioy While fixewalls offey Som amplicon lowes ‘a TiMwing they _moy not be capobl: of idles ne backing atloniat! app licabion - specie _dineak Vahl, 3) False Positives Engel Fivewolls moa gencurde false itive. alse negative clue 4p “the compl ity ining bm maltdainging tihtering xulea. ORY of foilue = Ththe fivewall itself is compan ee. it can hove Seveve ConSeyuencea : Jel on fi Nl jie — 8.8 Faplain Dhighin —odlack with exarnple Avy. Dhisting is, ilo of Cubes ack ix which “ ollackens impersonate Lu i to deceive individuals indo ve ectling sengif. infor mrcctior i i ing eluils jor easonal fla, | Hee is an example of phi hing odtock = “Tmogine you receive an emai) thet AMP ears dn be ork your bank & it includes) fe banks lou rmattints The ernai) nfo nan you thet there has bebn suspieigun ocHivily on—yourr accourt 6 uroes You tp click o link vewifu uous atcount ~ detail to Secuae if She link gyrevidd Kes yori tea wehst that also looks like your banks official gfe However, this website is a cleven limifalon Creorted by dhe adfockesu, When voy entey_uour Useuname b- Gasswosd ithe inbox mation: corphutal bu attackers, who Can shen -acceys Your ‘real bonk occount. This is a chesle exeMple ol o Phishing odtack , whete the olacken ipmensond’n a rusted Source do tyick You indo divulging ensitive infor modion. “To protect uoursel® Jom hishing cdldacla, poly vewify dhe cuban of ermails 6 websita, & civord clicking on Susmiciou§ links or shanin pensonal inforrmadn unkss you oe. certain ofp their itm. staph cidenend types of ‘Das MOS (menial of Sd tice) Lacks, aac 7 us ~atlempls_to_disrupl disnhie athens e —anclning “of alo coxa. hr ‘oxeal _-seuice Thisie —asie_sevewnl -tpen of Dos alfack = > y Smurf Attack ¢- AvackexS sence! TCMP echo meguest ty a nelunrk broadcast add-vreg ; with Vi i in I i : on the EEA “p_respondl fp the victim pede nbialy. ves loacliney it | » 2 Srrows ent Redixechion= This _ hoppens when Yo. one “Hp ing chrying cto a a swhipage Howeves oncthen cpavle with a_Aebhesend apens ae can view only” epee a “unable fo view clhe covdends af the ‘orginal po eo. This is hecawe cig attacker has vedivecked” tae Sv igin al page doo did fester page 2 a 9 Clogin ons 3= losin connection the con _be_ ho Communicadion elween the Sener _& dhe weceiver . “The aHtackesis Close che open connection O qrevewt the user Hronn accessing nresourcel wel “cpp icoth m1 —tinally cxashen. Tn this cose che uses ig unable ce ged access do the webpogt: : Wa aut Aeordrop Diack = -filachens _cend TP _goclek + J TP rapcked : ra _, Lraam Saulooedlan 40 or: ihe when + otbrntrh sD aE * Syst | onetoS oe dhenas 0) HTP Flood t= PHuckens Pind o weh cevven with o massive numben “af HTTP wegue st. T u Causing ceannice Aissuplint 8.8) Evoloin Secure elecdaonic -trangociion. Secure Electinnic_ Ronsachan or SET 1 ot gystem thet ensuxey tho secuniht b inckerity .. ii \. , i Re Vv in cords in a Scenosig «SET i ea ead cthot ena blen Spoyeneed bik it o Secus ity —___rctoeal opplied “4 4 dibhesievc} enc wumtion hos bing vec inigyth ii strerougls credit costd » be SET mxctoco! web in de by mator Cneqewnizaties like Vise , Mastercard pet Michosof uy hiol , ded its Secure “Froneachion ‘Te Wicle Secuse aecket lotyeat SF Grotocal nostaicds the mreverling f "St n jp mexchowdh thus keting 4h thieven a The srr att hockens includen Coshurerdion — Au ante for_making - i ae _X. 804 Cn ZA ~_use of _standasiel ‘Digited Cesctificade ke Hchicee cule soi tal 53 Seve Here's how SET _Works*— ) Pasi cipard Roles = Thene vie sthyee_main Poahic pends in a ST 4yansaction , the cardholder, te f merchant J Payment _arteway » Digital Cestificcdes & Each pedficipart is issued a gital_ceomlikicate which Contaisn their public key Ceortiticote Rutho widen at. 2) Focyption AN Communitahion belween the position X = A OM \ D PYOtT eoveschrnmping oe Lanopesiing, 4) Dink Stonafuse s= Digital Sionodusen ase used fo S dhe inser enticity of the ria = j dl indented eet Durer involven _gevey ite aa co id execudion on a talc sysitm rn ire ig_—an nuptial U m7 On "hte nya Creoclion b Catling Yn Ibis indial—ge the | virus is _cntded_by a male Is 9 cece _hockew —warile lh Virus, | pA hich: ee Vaaious unclians 6 Say! 1s. 4 cious ations, Such_as__ Spreading mechanism b mali 2) Dropanadion 2 Viruses need a means of spreadin “Pantpngian he gyedems . They can clo “thy Simaugh various methods Such as email aHoahments , infected files, Network shaves ox infected websites. g x Oni i i a Sea i+ cxecude cade, This can Wwe i ixw’s design. game commen actigns include replicating elf, modifving or damaging Piles & compe omising the sect b privady “of the infeckd sytem 4) Payload Activation 2 Many VWruses hove a soy sant is_-he malicious achon they axe a, ® U a | de ‘ned a er cy a could he an th ng 1 | Di Shabded ‘enal of oi gee erttack axe encrpe sing Jgles for yancsam { 5) Dekchn fb Removal As securridy meas wi | ivi hen CoWare elfmrt+ tn fe b remove virugen allan cea ©. Idewttten a virus i} f delete he i ded Jileo ees at > if rang fe op ES Myuses” atiediscondinued by ei one while then exsist fox_extended Tepiccl, ry Discuss GS) Hondshnking qaaincal in dlefoil. Aw SSI (Secure Sockets foyer) Handshake poshcol, which has beh ouceeded Bu TLS (Transport loyen Security) js a crucial “part of estubliching Secure encrypted conneccHowl belween ci chet ard a Qeuvew oven the ane Here's i ceplniien of the SsLITLS handshake Onatoeals S Cienk Hello ‘The cliend initiates the handshak: by nding a“ Cliew! Hello” messane eves, This Smessane inchileg the clier*hs Supmated ceyping scp alge¥ithme a random value di ethey Porumelsis, Tt dlso specifier the higheat “F1S_veusisy. 2) Senven Hellat “The Seuver eepand uth aa_“Souves He re meg ane’, “Ln thi message sther _seavest choose the chron mulually suppavted —eiphest suite 0 rondom value & confiymn the TLS version bbe used. code ty th cliew! This cesrhihicade she ludes the senvey Public ey. ‘i AY. Searven Key Exchange te Spon “rey Soe. m Seaver mar -send, addtional) Me rch, oe einkormodion ov pervade, a Seaver Hello Done t= "ae Craven ce “Servant Hellobone” neg ange as c_senver_tns corayleded ihe pose Cote hentia niiamaiion 8) Finished = “the Sewven_sends a “fi a i message whichis _a hoch sf all —_—_hondshake Message jt has vereiveds Thic_gllow Mew | the client o__vesttiy dhe hondrake irdecgity _| The 5 his hondshake qretneal 6 Sundamerdal | fy secusniy ting aptlng = 7 cain Leccvn ys SD He conbiderdialtty ig ay ev.chonged over dhe j ip Wile . 38) Waite _ghort note on PGP, ” Av. eg ae cba (PGP) isa widely used try hee PGP was spinal develo by Phil Zinn | e719 4 AS a" meapange bY conrenny =f ee 2 ee in th ety eee v9e) 0 fom ok_sueel 4 leo & ' | Keu_Fecchuyes = ZI ____——! Fy Dablic iv " = PEP uses_a_pair_of ‘Keys, — ‘o Dublic Key fo enevuption an shy foy_decruption + The_gublic key can he hated — while “the " aprivade Key must be kept senha a 3 End-ty-fnd_Enex pian & Pat enabler endtoend oe enowelin ensytity hat only the inden, d_vecipiod d_sthe con dtc and message ox clef, 9 Doital Sionaive + DEP allwe users to giqn heir 1 seen ae s wih thei pote Aa in) wou exify the authenticity of the senden orl the irdegaiy’ ‘af the contend, 4) Web of Frust® PGP emplous a “web of trust” model whee users _cun_sign each, crthest keys, eclablishing a nehuesk af trusted vreledionghip within oa _compsunity 3 OpenPGP landed = TGP hos evalved irc on open 7 Stondaud Known 48 _Open'PGP_, enguding suerpesia b—, ‘lity omang vasios PGP compatible Dhan and inogtle mertetHond Fa 8 Secuve Communicodion &- PGP ig _commanl used fox | sectusting email communicedion by h ‘ i jormg oF dada. Poh tel OD Eyploin Man -in= middle crltock 9 i dw. A” Man-in-middle attack iS “a S¥rm ft — intercept ond pos ibly a ters the communiced bettie wo _centien, oFlen withoul dheiy knowledge or nes Tao MTTM ark "i cthe ackey positions themegelves belween the iva leqitimoke _uvties. acting asa “ha Cubexad tack in which an_ottackey sentiyy mn in_dhe—conttanicction » allowing Ahern do eaverdyo, Tonipulode_, o even inypercohed the podrhien invelved Here» how! on MitM attack: workst a" b Tea ception & “The ache ints cept I Communication behween she victim i i { indender| secupient 2) Decryplions TF enexuption’ is in use the ottac Kew right ottermpt do deer ape sthe inctesrcemled Y derfa , exposing its ident, 3) Eaves doppi t= The cdlackey can silerdly monitor commun tcedion, collecting - information like tgin creclevdial Pasi di or _confirlendial Messagen sO 4) Hala eo Th Some = the Hacker This Aa involve roieelint alias contend, changing tne recipients” adthieas or mad ing f kc E (faa cen ab Sma So Gace fH aia | Teepesisenedion & “The _cldackes sh imp oN fear ante hg a ee ion sentially easing pun io eine al : 1D. ANUTNON TZ Pa aki eae | Common methods used in MitM ottack ineluder > ARP Poisoning ¢ Tina local Helwork sock ens pam can minimulate the Ackhress ‘Resolution a DVeolocol cache Aclizecting cbaffic thvough heir systems ONS epooting $= ts dampeing with Domain Name 7 System © CONS) wesponfes, critackevs can _vediveed ugeHs +o malicious website. J! pasyreye fet ) J = —* Wii Envescsopping 2- PHackeys can sel up aque wi-fi hotspots, ewhicing users to connec do _cthem_,_ & dhen {nese ging their haf fie. O15 Explain 7 the Jb Low ing eum J VRAPD OOR Ny) Trapdoor inthe _cante + of computer ac fence cayptoy rap gin a specific design Kets Or Fae vail in__a_syctem thot allows authorized users to _gexovm cesta ; “or ncceas _apecific. infor mahian ~ Haile parted unawihonzed users Prom ‘the sume. This__-levm is often ue) ine contest of cryqto gacaphic cyclers, secs Like ube __ hes ar where a © trond oor fun chi ; chi dodo, in such a_taoy Jali it, "noni be eles ecrymed__by comeone with knowledge of ' Ske \_ ROOTKIT Anu, A Rootkit is oO Ju pe of malicious enftumre thot “is fqned dn gal unauth mized access and control Avex ‘a computer or a computing system, often oct the deemest level of she orperaching System Rookki | u inal dp hide thei” ‘Dr esence on “an infeed ayetem . enabling therm dn Cox out vaso malicious —_achitlien without being dete

You might also like