CNS DARSHAN - Docx Final
CNS DARSHAN - Docx Final
EXPERIMENT: 01
1. Aim: Study of different wireless network components.
2. Outcomes: At the end of the course, the student should be able to;
▪Use different open source tools for network security and analysis
▪Perform data analytics in social media datasets to secure system from social attacks.
▪Understanding the security and compatibility of components helps identify
vulnerabilities and ensures devices work seamlessly within the network.
▪ Evaluating component costs and total cost of ownership guides budget decisions for
efficient network design and management.
▪ Analysis reveals variations in signal strength, data transfer rates, and network coverage
based on component choices, enabling informed selection for specific applications.
3. Objectives: At the end of the session you should be able to
▪ Know about the devices and components in a wireless network.
▪ Know about the network security issues in different types of network
devices.
▪ Identify a mobile security app and how it works for mobile security?
4. Solution:
4.1 Introduction: The infrastructure network is most likely the type of wireless setup you
have in your home or office. It’s laid out similarly to a wired network, but
without wires.
2|P age
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
computers, and increase the network's range, additional types of hardware can be deployed.
4.2 Result: Features of different wireless network components has been studied.
3|P age
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
C) Switch
D) Wireless Network Card
2. What is the primary function of a wireless router in a home network?
A) Connect wired devices to the internet
B) Provide power to wireless devices
C) Manage and distribute wireless signals
D) Filter out unwanted wireless signals
4|P age
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
EXPERIMENT: 02
1. Aim: To study the features of any one of the Mobile Security Apps.
2. Outcomes: At the end of the course, the student should be able to;
▪ Understanding the app's ability to detect and prevent various threats such as malware,
phishing, or ransomware. This insight helps in assessing the app's effectiveness in
safeguarding the mobile device.
▪ Use different open source tools for network security and analysis studying the app's
interface, ease of use, and additional user-friendly features. This analysis provides
insights into how accessible and convenient the app is for the average user.
▪ Assessing the impact of the app on the device's performance, including its usage of
resources such as battery life, CPU, and memory.
4. Solutions:
4.1 Features of Norton Mobile Security: Norton Mobile Security is a comprehensive
mobile security app designed to protect Android and iOS devices from a range of security threats.
Here are some of its key features:
▪ Antivirus and Malware Protection: Norton Mobile Security scans for and detects
malware and viruses on your mobile device, ensuring that your device remains safe from
malicious software.
▪ Anti-Phishing: The app includes anti-phishing protection, warning you about potentially
dangerous websites and emails that may attempt to steal your personal information.
▪ App Advisor: Norton Mobile Security provides insights into the privacy and security of
apps you download, helping you make informed decisions about which apps to install.
▪ Wi-Fi Security: It scans Wi-Fi networks for potential security risks, ensuring that you
connect to safe and trustworthy networks, protecting you from threats like man-in-the-
middle attacks.
▪ Device Location and Anti-Theft: The app offers anti-theft features, allowing you to track
your device's location, remotely lock it, and even erase data if it's lost or stolen.
▪ Web Protection: Norton's Web Protection feature safeguards your device's online
activities and provides warnings about potentially harmful websites.
▪ Secure VPN: Some Norton Mobile Security packages include a secure VPN (Virtual
Private Network) for encrypting your online connections and protecting your data from
prying eyes on public networks.
▪ Parental Control: It offers parental control features to help parents monitor and manage
their children's device usage and internet activities.
▪ Privacy Protection: Norton Mobile Security helps protect your personal data and online
activities, safeguarding your privacy.
▪ Secure Messaging: It protects against malicious messages and offers call filtering to block
5|P age
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
4.2 Result: Features of the Mobile Security Apps has been studied successfully.
6|P age
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
3. Which feature in a mobile security app encrypts your internet connection and provides
online privacy and anonymity?
A) Anti-Theft
B) VPN Protection
C) Data Backup
D) Safe Browsing
7|P age
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
EXPERIMENT: 03
1. Aim: Study the security of network devices.
2. Outcomes: At the end of the course, the student should be able to;
▪ Identifying potential vulnerabilities in network devices, including routers, switches, and
firewalls, and assessing their susceptibility to exploitation. This information helps in
prioritizing security updates and patches.
▪ Evaluating the configuration settings and access control policies of network devices to
ensure they align with best practices.
▪ Assessing the network devices' ability to detect and respond to threats, such as
intrusion attempts or abnormal network behavior.
3. Objectives: At the end of the session you should be able to, Know about the network security
issues in different types of network devices.
4. Solutions:
▪ Hub: An older networking device that simply broadcasts data to all connected devices,
lacking the intelligence of a switch. Hubs lack security features and operate at the
physical layer, making them highly susceptible to eavesdropping. They broadcast data to
all connected devices, providing no filtering or access control. Consequently, hubs are
insecure for modern network environments, and they should be replaced with more
secure devices like switches.
▪ Router: A device that connects multiple networks together and forwards data between
them. It often serves as a gateway between a local network and the internet. Routers
provide network security features like firewall and NAT to protect against external
threats. They control traffic between local and external networks, enforcing security
policies. However, routers must be properly configured and updated to remain secure.
Neglecting security measures can lead to vulnerabilities and potential breaches.
8|P age
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
▪ Switch: A device that connects devices within a local network and forwards data based
on MAC addresses, creating a more efficient network compared to hubs. Switches
provide network segmentation and MAC address filtering, enhancing security within
local networks. They do not have built-in firewall features, so additional security
measures may be required. Properly configured switches can help isolate and protect
sensitive data and devices within the network. However, vulnerabilities can still exist if
security best practices are not followed.
▪ Access Point (AP): A device that allows wireless devices to connect to a wired network.
It is commonly used to create Wi-Fi networks. Access points (APs) can be secure if
configured with strong encryption (e.g., WPA3) and a strong passphrase. They
should also have a unique administrative password to prevent unauthorized access.
However, if not properly secured, APs can be vulnerable to unauthorized network access
and potential attacks. Regularly updating firmware and security settings is essential for
AP security.
▪ Firewall: A security device or software that filters and controls network traffic to protect
a network from unauthorized access and threats. Firewalls provide network security by
controlling incoming and outgoing traffic based on predefined rules. They can block
malicious traffic, protecting against unauthorized access and cyber threats. However,
effective firewall security depends on well-defined and regularly updated rule sets.
Neglecting proper configuration and maintenance can lead to security vulnerabilities.
▪ Modem: A device that modulates and demodulates digital data to enable communication
between a computer and an internet service provider (ISP) over various transmission
mediums (DSL, cable, fiber, etc.). Modems themselves do not provide significant
security features but rely on other devices, such as routers and firewalls, for network
protection. It's important to change default login credentials and ensure remote access is
restricted. Some modems may have vulnerabilities that require firmware updates to
maintain security.
▪ Network Bridge: A device that connects two or more network segments and forwards
data between them, often used to connect different types of networks. etwork bridges
typically don't offer robust security features. They connect network segments without
built-in security mechanisms. For better security, additional devices like firewalls or
routers should be used to protect bridged networks. Security measures depend on the
connected devices and their configurations, rather than the bridge itself.
▪ Network Gateway: A device that connects two different networks and performs protocol
translation, allowing communication between networks with different protocols or
standards. Network gateways, like routers or firewall appliances, play a critical role in
network security. They can provide security features such as stateful packet inspection,
NAT, and VPN support to protect networks from external threats. To ensure security,
gateways must be properly configured, updated, and managed to enforce security policies
and control traffic effectively. Neglecting security measures can leave networks
vulnerable to various threats.
▪ Load Balancer: A device or software that distributes network traffic across multiple
servers to ensure optimal resource utilization and prevent server overloads. Load
balancers enhance security by distributing network traffic across multiple servers,
reducing the risk of server overload and potential denial-of-service attacks. They can also
provide SSL offloading and protect against some application-layer attacks. However, the
9|P age
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
4.2 Assumptions:
▪ Network Device Functionality: It is assumed that the network devices being studied are
designed and configured to function properly. Any vulnerabilities or security issues may
arise from misconfigurations or external factors.
▪ Security Updates: It is assumed that network devices have received regular security
updates and patches. The study may consider the implications of devices that do not
receive timely updates.
▪ User Knowledge and Behavior: Assumptions may be made about the knowledge and
behavior of users or administrators who interact with network devices. For example, they
are assumed to follow security best practices or may not be adequately trained in security.
4.3 Result: The security of the networking devices has been studied successfully.
10 | P a g
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
11 | P a g
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
EXPERIMENT: 04
1. Aim: To study the features of firewall in providing network security and to set Firewall
Security in windows.
2. Outcomes: At the end of the course, the student should be able to;
▪ Understanding how firewalls can filter incoming and outgoing traffic based on
predefined rules, helping to mitigate various threats like unauthorized access, malware,
and network attacks.
▪ Learning how modern firewalls offer application-level control, allowing you to manage
which software and services can access the network, enhancing security and
productivity.
▪ Exploring the firewall's logging and reporting capabilities, which enable the monitoring
of network traffic, identifying security incidents, and ensuring compliance with security
policies.
12 | P a g
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
4.1.1 Working of Firewall: Firewall match the network traffic against the rule set defined
in its table. Once the rule is matched, associate action is applied to the network traffic. For
example, Rules are defined as any employee from HR department cannot access the data from
code server and at the same time another rule is defined like system administrator can access
the data from both HR and technical department. Rules can be defined on the firewall based
on the necessity and security policies of the organization. From the perspective of a server,
network traffic can be either outgoing or incoming. Firewall maintains a distinct set of rules
for both the cases. Mostly the outgoing traffic, originated from the server itself, allowed to
pass. Still, setting a rule on outgoing traffic is always better in order to achieve more security
and prevent unwanted communication. Incoming traffic is treated differently. Most traffic
which reaches on the firewall is one of these three major Transport Layer protocols- TCP,
UDP or ICMP. All these types have a source address and destination address. Also, TCP and
UDP have port numbers. ICMP uses type code instead of port number which identifies
purpose of that packet. Default policy: It is very difficult to explicitly cover every possible
rule on the firewall. For this reason, the firewall must always have a default policy. Default
policy only consists of action (accept, reject or drop). Suppose no rule is defined about SSH
connection to the server on the firewall. So, it will follow the default policy. If default policy
on the firewall is set to accept, then any computer outside of your office can establish an SSH
connection to the server. Therefore, setting default policy as drop (or reject) is always a good
practice.
13 | P a g
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
these days to stop modern security breaches like advance malware attacks and
application-layer attacks. NGFW consists of Deep Packet Inspection, Application
Inspection, SSL/SSH inspection and many functionalities to protect the network from
these modern threats.
4.1.3 Types of Firewall: Firewalls are generally of two types: Host-based and Network-
based.
▪ Host- based Firewalls : Host-based firewall is installed on each network node which
controls each incoming and outgoing packet. It is a software application or suite of
applications, comes as a part of the operating system. Host-based firewalls are needed
because network firewalls cannot provide protection inside a trusted network. Host
firewall protects each host from attacks and unauthorized access.
▪ Network-based Firewalls : Network firewall function on network level. In other words,
these firewalls filter all incoming and outgoing traffic across the network. It protects the
internal network by filtering the traffic using rules defined on the firewall. A Network
firewall might have two or more network interface cards (NICs). A network-based
firewall is usually a dedicated system with proprietary software installed.
14 | P a g
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
Windows Firewall: Windows Firewall is a stateful firewall that comes installed with most modern
versions of Windows by default. On Windows 2008 Server machines, the firewall is enabled by
default, blocking many of the ports that cause so much trouble in otherwise unprotected Windows
systems. On virtual servers, the Windows Firewall ensures that only the services necessary for the
chosen function are exposed (the firewall will automatically configure itself for new server roles,
for instance, and when certain server applications are installed). As members of your domain, the
Windows Firewall of your virtual servers can be managed remotely, or through Group Policy.
4.2.1 Steps:
Restart the Windows firewall on the control panel and perform the following operations to
configure the firewall:
a. Go to Control Panel, and choose System Security > Windows Firewall.
15 | P a g
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
b. In the Windows Firewall window, click Turn Windows Firewall on or off on the left.
c. In the Customize Settings window, select Turn Windows Firewall on in Private
network settings and Public network settings.
16 | P a g
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
e. In the window that is displayed, perform the following operations to set related parameters:
▪ Select TCP.
▪ Select Specific local ports and enter 8080 in the text box.
17 | P a g
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
f. Click Next.
g. In the window that is displayed, select Allow the connection and click Next.
h. In the window that is displayed, ensure that the following check boxes are selected:
▪ Domain
▪ Private
▪ Public
18 | P a g
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
i.Click Next.
j. In the window that is displayed, enter a rule name in the Name text box, for
example, TCPPortin.
19 | P a g
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
20 | P a g
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
D) NAT Firewall
3. What is the main function of a stateful firewall?
A) It monitors network traffic and logs all data packets.
B) It filters traffic based on application layer protocols.
C) It keeps track of the state of active connections and makes access decisions.
D) It performs deep packet inspection for malware detection.
21 | P a g
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
EXPERIMENT: 05
1. Aim: Steps to ensure Security of any one web browser (Mozilla Firefox/Google Chrome).
2. Outcomes: At the end of the course, the student should be able to;
▪ By configuring Firefox's privacy settings, regularly clearing cookies and history, and
using private browsing mode, you can significantly enhance your online privacy and
reduce the risk of tracking and data exposure.
▪ Regularly reviewing and updating Firefox add-ons and extensions ensures that they don't
introduce vulnerabilities or pose security risks. It helps maintain a secure browsing
experience.
▪ Using Firefox's built-in password manager or a trusted password manager extension, you
can secure and manage your login credentials, enhancing protection against unauthorized
access to your accounts.
3. Objectives: At the end of the session you will be able to
▪ Understand the security and privacy features and operation
of browsers.
▪ Know the security vulnerabilities of browsers.
▪ Explore, how to browsers hacks and there steps for better security.
▪ Learn, how to stop advertisers from tracking you
▪ Learn to stop your browser from automatically downloading
malware.
▪ Learn to block pop-ups and ads
▪ Know , how to avoid unsafe websites
▪ Learn how to manage cookies
4. Solutions:
4.1 Firefox: Mozilla Firefox, commonly known as Firefox, is a popular web browser
developed by the Mozilla Foundation and its subsidiary, Mozilla Corporation. It is a free and
open-source web browser that is available for various operating systems, including Windows,
macOS, and Linux. Firefox is known for its focus on user privacy and security, as well as its
support for web standards and customization through extensions and themes.
22 | P a g
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
▪ Block unwanted pop-ups: For both Mac and PC - go to Firefox menu > Preferences (Mac)
Options (PC) > Privacy & Security > Permissions section. Check "Block pop-up windows".
▪ Block unwanted add-ons: For both Mac and PC - go to Firefox menu > Preferences (Mac)
Options (PC) > Privacy & Security > Permissions section. Check "Warn you when websites
try to insall add-ons".
▪ Don't save passwords: For both Mac and PC - go to Firefox menu > Preferences (Mac)
Options (PC) > Privacy & Security > Browser Privacy section. Uncheck the "Ask to save
logins and passwords for websites" box.
23 | P a g
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
▪ Using a master password: If you do save passwords, set a Master password so they aren't
easily accessible to anyone with access to the system. For both Mac and PC - go to Firefox
menu > Preferences (Mac) Options (PC) > Privacy & Security > Browser Privacy
section. Check "Use a master password". Set a master password that is compliant with
campus Password Standards Note: The master password setting is not appropriate for
passwords that provide access to P3 or P4 sensitive data.
▪ Java/javascript: Java is now disabled by default in Firefox, but can be activated for trusted
sites. More info here.
▪ Cookies and Site Data: For both Mac and PC - go to Firefox menu > Preferences (Mac)
Options (PC) > Privacy & Security > CContent Blocking. Select "Custom" and set Cookies
to block "Third-party trackers". Also place checks to block Cryptominers and
Fingerprinters.
▪ Tracking Protection: For both Mac and PC - go to Firefox menu > Preferences (Mac)
Options (PC) > Privacy & Security > Content Blocking. Check "Always" under "Send
websites a “Do Not Track” signal that you don’t want to be tracked".
▪ Deceptive Content and Dangerous Software Protection: For both Mac and PC - go to
Firefox menu > Preferences (Mac) Options (PC) > Privacy & Security > Security section.
Check "Block dangerous and deceptive content", "Block dangerous downloads" and "Warn
you about unwanted and uncommon software".
▪ Firefox Data Collection and Use: For both Mac and PC - go to Firefox menu >
Preferences (Mac) Options (PC) > Privacy & Security > Firefox Data Collection and Use
section. Uncheck "Allow Firefox to send technical and interaction data to Mozilla", "Allow
Firefox to install and run studies" and "Allow Firefox to send backlogged crash reports on
your behalf".
24 | P a g
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
4.2 Assumptions:
▪ Frequent Updates: Assume that web browsers will release frequent security updates
and patches to address vulnerabilities. This assumption highlights the importance of
keeping your browser up to date.
▪ Third-Party Risks: Assume that browser extensions and plugins may introduce
additional security risks. This assumption emphasizes the need to carefully vet and
update third-party extensions for security.
4.3 Result: Security of any one Mozilla Firefox wweb browser has been implemented
successfully.
25 | P a g
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
26 | P a g
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
EXPERIMENT: 06
1. Aim: Study of different types of vulnerabilities for hacking a websites / Web
Applications.
2. Outcomes: At the end of the course, the student should be able to;
▪ By studying various vulnerabilities, one can identify potential weaknesses in web
applications, such as SQL injection, cross-site scripting (XSS), or insecure
authentication.
▪ Understanding the different types of vulnerabilities helps assess the level of risk
associated with a web application.
▪ Perform data analytics in social media datasets to secure system from social attacks.
▪ It empowers organizations to proactively safeguard their online assets against potential
threats.
3. Objectives: After going through this session, you should be able to:
▪ Know the reasons for attacking web applications
▪ Identify different types of Web Application Vulnerability
4. Solutions:
4.1 Web Application Vulnerabilities:
27 | P a g
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
▪ SQL Injection Attack: A SQL injection attack is a security exploit that occurs when an
attacker manipulates a web application's input fields to inject malicious SQL code into the
database queries. This allows the attacker to potentially access, modify, or delete data in
the database, and it's a significant threat to web applications. Preventing SQL injection
involves using parameterized queries, input validation, and other security measures to
block unauthorized SQL code execution. This helps protect against data breaches and
unauthorized access to databases.
• Union Based SQL Injection
• String Based SQL Injection
• Error Based SQL Injection
▪ Cross Site Scripting (XSS): Cross-Site Scripting (XSS) is a common web application
security vulnerability that occurs when malicious scripts are injected into web pages
viewed by other users. These scripts are executed in the context of a user's web browser,
potentially allowing an attacker to steal sensitive information, like cookies or session
tokens, or manipulate web content on the victim's browser. There are three main types of
XSS attacks: stored, reflected, and DOM-based. To prevent XSS, developers should
validate and sanitize user input, use output encoding, and implement security headers, like
Content Security Policy (CSP), to mitigate the risk of these attacks.
• Stored XSS
• Reflected XSS
• Dom based XSS
▪ Broken Authentication / Session Management: A Broken Authentication and Session
Management attack is a security vulnerability that occurs when an application fails to
properly authenticate and manage user sessions. This can lead to unauthorized access or
tampering with user accounts and data. Attackers can exploit weaknesses in login
mechanisms, session tokens, and password management to gain unauthorized access to an
application. To prevent such attacks, developers should implement secure authentication
processes, manage session tokens carefully, and follow best practices for password storage
and reset procedures. Effective security measures are crucial in guarding against these types
of security breaches.
28 | P a g
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
▪ Cross site request forgery (CSRF): A Cross-Site Request Forgery (CSRF) attack is when
an attacker tricks a user into unwittingly performing actions on a different website where
the user is logged in. The attacker exploits the user's active session to execute unauthorized
actions, like changing settings or making transactions, without the user's knowledge. To
prevent CSRF, developers use anti-CSRF tokens and secure authentication methods to
ensure that only legitimate actions are accepted, safeguarding users from unintended
manipulations.
29 | P a g
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
redirects or forwards, but the input is not properly validated or sanitized. Attackers can
exploit this vulnerability by crafting malicious URLs that trick users into unknowingly
navigating to a different website or performing unintended actions on the same website.
To prevent this issue, developers should validate and sanitize user input, and avoid relying
on user-generated data to construct redirection URLs, ensuring that the redirects and
forwards are authorized and secure. This helps protect users from potential phishing or
manipulation.
▪ Missing function level access control: Missing Function Level Access Control is a
security vulnerability found in web applications when there is insufficient validation and
authorization in place to control access to various functions or features. This vulnerability
may allow unauthorized users to access or perform actions that should only be available to
privileged users or administrators. To address this issue, developers should implement
proper access control mechanisms to ensure that users can only access the functions or
features they are authorized to use, thereby preventing unauthorized access and
maintaining security.
4.2 Assumptions:
▪ Human Error: Assume that many vulnerabilities are introduced due to human errors in
development and configuration. This assumption highlights the importance of thorough
code reviews and proper security training for developers.
▪ Regulatory Compliance: Assume that websites and web applications must comply with
various data protection and privacy regulations. This assumption underscores the need for
legal and regulatory considerations in vulnerability assessments.
▪ Third-Party Risks: Assume that third-party components, libraries, and integrations in web
applications may introduce additional security risks. This assumption emphasizes the
importance of conducting vendor risk assessments.
▪ Zero-Day Vulnerabilities: Assume that unknown or unpatched vulnerabilities may exist
in web applications. This assumption highlights the need for strong security practices and
monitoring to detect and respond to emerging threats.
4.3 Result: Vulnerabilities for web applications has been studied successfully.
4.4 References:https://www.toptal.com/cyber-security/10-most-common-web-security-
vulnerabilities
30 | P a g
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
31 | P a g
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
EXPERIMENT: 07
1. Aim: Analysis the Security Vulnerabilities of E-commerce services.
2. Outcomes: At the end of the course, the student should be able to;
▪ Identifying and understanding security vulnerabilities enables E-commerce businesses
to take proactive measures to mitigate risks.
▪ Addressing vulnerabilities enhances compliance with data protection regulations and
industry standards.
▪ Analyzing vulnerabilities prepares E-commerce services to respond effectively to
security incidents.
3. Objectives: After going through this session, you should be able to:
▪ Know about Security Vulnerabilities of E-commerce services.
▪ Identify the vulnerabilities input validations and database servers.
▪ Point out the vulnerabilities in TCP/IP Protocols used for
communications.
4. Solutions:
32 | P a g
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
▪ Financial Frauds or Payment Frauds: This type is one of the most typical for
eCommerce and dates back to the very first attempts of the businesses going online.
Often, scammers used to make unauthorized transactions and immediately wipe out the
trails. Or else, they can use the fake emails, accounts, and names, and even IP addresses
to look like the real customer. After they have requested a refund with, for instance, a
fake screenshot, most eCommerce platforms basically give them money for nothing,
especially if they’re not aware of this financial trick. With being reported in over 70% of
all attacks, payment frauds are still one of the top reasons why companies experience
huge cost losses. Solution: Make sure your eCommerce platform cooperates only with
verified and authoritative payment systems. Additionally, some companies make it
possible to conduct a transaction only after logging in to the individual account before
any purchase, which minimizes the risks of financial fraud and prevents common security
vulnerabilities as well.
▪ Spam Attacks: Though emails are considered to be the most powerful marketing
channel for eCommerce, they are also the typical web security vulnerabilities hackers can
easily take advantage of. The random comments left on the product pages, under your
blog posts, or the contact forms can not only harm the customers’ trust but also slow
down your platform as well. Needless to say, that one infected link left by a spammer is
more than enough to affect your site’s speed, provide access to personal customer
information and other sensitive data. Additionally, the spamming activity can become a
serious threat to the customers’ security as well, which can easily undermine your site’s
credibility. Solution: Use anti-spamming software for security vulnerabilities detection
and its successful removal. Such software can easily spot the infected URLs and safely
remove them from your site so that no one can see them. Typically, such software type
uses various algorithms to filter the comments and detect the computer-generated links
which can be potentially dangerous for your site’s security, and even provide you with
the details about the email of the actual sender if it is possible.
▪ Triangulation Fraud: This stands for creating a fake site with an identical interface and
products at a cheaper price. After the customers complete the transaction, they basically
donate the money to the criminals, as the products they wanted to purchase simply don’t
exist and never be shipped to them. The reason why this type of fraud is harmful to your
eCommerce platform is that you can lose your new clients, loyal customers, and their trust
as well: no one wants to go back to the site (even with the slight differences in a brand’s
name or interface) after being cheated there at once. Solution: Basically, no one can stop
scammers from creating a platform that looks just like your online store. However, it’s
possible to prevent your customers from being fooled by simply informing them about this
issue and pointing out the real domain of your eCommerce platform. Even a simple
information letter can in fact prevent your customers from money loss and also strengthen
your store’s authority as well.
33 | P a g
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
▪ Bot Attack: Some criminals also attack eCommerce sites with bots, that basically act like
real users and can hardly be detected by the security system. This is why bot attack is
considered to be one of the common security vulnerabilities you should always keep in
mind. Usually, you can check the bot traffic in the site’s analytics and get the records about
the exact time and details of their behavior. Solution: To make sure your site is secure
enough and won’t go down during any of the hacking attempts, always introduce a
CAPTCHA test for critical actions such as logging in or products’ purchase. In addition,
track the traffic and block the one generated from the suspicious sources, analyze the failed
log-in attempts and protect your mobile apps. Large companies also consider employing
bot migration software - the perfect solution for minimizing IT security vulnerabilities.
▪ Brute Force Attacks: Brute-force attacks refer to the hacking method of guessing the
system passwords. So far that’s one of the most dangerous security vulnerability types that
can attack your online store’s panel and attempt to get full access to it. During this attack,
the various programs and complex algorithms are used to generate any possible
combination to crack your site’s password. After that, any scenario is possible: criminals
can ask for the reward or steal the client’s personal data, send spam offers, etc — all they
planned to do since the site owner has lost access to the admin panel. Solution: This attack
can’t be predicted but can be prevented instead. For minimizing the site’s security
vulnerability, developers recommend using strong, complex passwords and do not store
them on your digital files, computer documents, browsers, etc. In addition to that, you can
protect the site by changing the password regularly (for instance, on a monthly basis or
once a quarter).
34 | P a g
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
overflows, developers should implement proper input validation, bounds checking, and use
secure coding practices. Additionally, operating systems and compilers offer various
security mechanisms to mitigate these vulnerabilities.
▪ Log Forging: Log forging, also known as log injection or log manipulation, is a
cybersecurity attack where an attacker manipulates or forges log entries in system or
application logs. This can be done to hide malicious activities, create a false narrative, or
deceive security personnel and automated monitoring systems. Log forging can undermine
the reliability of log data and hinder the detection of security incidents. Solution: To
mitigate this threat, organizations should implement proper access controls, log integrity
measures, and secure log storage practices to ensure the accuracy and trustworthiness of
log records.
▪ Missing XML Validation: Missing XML validation refers to a security vulnerability
where an application or system does not properly validate the structure and content of
XML (Extensible Markup Language) data it receives. This oversight can lead to security
risks such as XML injection attacks, where malicious XML data is used to exploit
vulnerabilities in the target system, potentially compromising data integrity and system
security. Solution: To address this vulnerability, developers should implement robust
XML validation checks to ensure that incoming XML data adheres to expected formats
and doesn't contain malicious elements or code.
▪ Vulnerabilities in database server: Vulnerabilities in a database server refer to
security weaknesses and flaws in the server software or its configuration that can be
exploited by attackers to gain unauthorized access, manipulate, or compromise the data
stored in the database. These vulnerabilities can result from various factors, including
software bugs, misconfigurations, weak authentication, and inadequate access controls.
Solution: It's essential to identify and patch these vulnerabilities to protect sensitive data
and maintain the security of the database server. Regular security updates, access
controls, and security assessments can help mitigate these risks.
4.2 Assumptions:
▪ Regulatory Compliance: Assume that e-commerce services must comply with various
data protection and privacy regulations. This assumption highlights the importance of
legal and regulatory considerations.
▪ Supply Chain Risks: Assume that third-party vendors and suppliers in the e-commerce
ecosystem may introduce additional security risks. This assumption underscores the
need for vendor risk assessments.
▪ Insider Threats: Assume that insider threats, whether intentional or accidental, are a
possibility within the organization. This assumption highlights the need for access
controls, monitoring, and employee education.
▪ Payment Security: Assume that payment processing and financial transactions within
e-commerce services are a target for cybercriminals. This assumption underscores the
need for strong payment security measures.
4.3 Result: The security Vulnerabilities for E commerce website has been studied
successfully.
35 | P a g
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
4.5 References:
https://community.broadcom.com/symantecenterprise/viewdocument/common-
security-vulnerabilities-in?CommunityKey=1ecf5f55-9545-44d6-b0f4-
4e4a7f5f5e68&tab=librarydocuments
4.6 Quiz and Viva questions:
4.6.1 Viva Questions:
1. Describe the risks and consequences of cross-site scripting (XSS) in the context of
e-commerce.
2. What role do inadequate authentication and authorization mechanisms play in e-
commerce security vulnerabilities?
3. How can e-commerce platforms defend against Distributed Denial of Service
(DDoS) attacks?
4. Discuss the security challenges related to insecure APIs in e-commerce services.
4.6.2 Quiz questions:
1. What is the primary objective of implementing security practices like encryption,
secure payment gateways, and access controls in e-commerce services?
A) To enhance website aesthetics
B) To improve website search engine optimization
C) To protect customer data and ensure secure transactions
D) To reduce website load times
2. What security mechanism helps protect e-commerce services from phishing attacks
aimed at stealing customer login credentials?
A) Two-factor authentication (2FA)
B) Secure Socket Layer (SSL) certificates
C) Public Key Infrastructure (PKI)
D) Cookie tracking
3. Which type of security vulnerability is related to storing customer passwords in an
insecure or plaintext format, making them vulnerable to theft?
A) SQL Injection
B) Brute Force Attack
C) Insecure password storage
D) Cross-Site Scripting (XSS)
36 | P a g
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
EXPERIMENT: 08
1. Aim: Analysis the Security Vulnerabilities of E-mail applications.
2. Outcomes: At the end of the course, the student should be able to;
▪ Identifying and understanding security vulnerabilities in email applications allows for
proactive measures to mitigate risks, such as implementing encryption, spam filters, and
authentication protocols to protect sensitive email content from unauthorized access and
phishing attacks.
▪ Addressing vulnerabilities in email applications helps safeguard the privacy and integrity
of email communications.
▪ Analyzing vulnerabilities prepares organizations to respond effectively to email security
incidents.
3. Objectives: At the end of the session you should be able to
▪ Understand the security issues and vulnerability in Email system.
▪ Identify the threats in Email Communication
▪ Point out the limitations exists in currently used protocols.
4. Solutions:
4.1 Threats in E mail communication: Email communication, while an essential and
widely used method of correspondence, is susceptible to various threats and security risks. These
threats can compromise the confidentiality, integrity, and availability of email content. Here are
some common threats associated with email communication:
▪ Phishing: Phishing emails attempt to trick recipients into revealing sensitive
information such as login credentials, financial data, or personal information. Attackers
often impersonate trusted entities, making it challenging for users to discern the
authenticity of the email.
▪ Email Spoofing: Attackers can forge the sender's email address to make it appear as if
an email is coming from a legitimate source. This tactic is often used to deceive
recipients into taking specific actions or revealing information.
▪ Man-in-the-Middle (MitM) Attacks: In transit, email communications can be
intercepted and eavesdropped upon by attackers. This can lead to data theft,
unauthorized access, or content manipulation.
▪ Data Leakage: Sensitive information can be unintentionally exposed through email,
especially when users forward, reply to, or inadvertently send emails to the wrong
recipients.
▪ Email Interception: Government agencies, hackers, or unauthorized third parties can
intercept emails as they traverse the internet or email servers, violating privacy and
potentially exposing confidential content.
▪ Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks: Email
servers can become overwhelmed with excessive incoming email traffic, causing service
disruption and potentially rendering email accounts inaccessible.
▪ Social Engineering: Attackers may use psychological manipulation techniques to
37 | P a g
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
deceive email users into revealing sensitive information or taking harmful actions.
▪ Email Account Compromise: Weak passwords, lack of multi-factor authentication
(MFA), and other security weaknesses can lead to unauthorized access to email
accounts, allowing attackers to impersonate the account holder.
▪ Email Forwarding and Filtering Abuse: Attackers can manipulate email forwarding
and filtering rules to redirect or hide important emails, making it difficult for users to
detect suspicious activity.
▪ Unencrypted Email: Email content that is not properly encrypted is vulnerable to
eavesdropping during transmission, potentially exposing confidential information.
▪ Email Harvesting: Email addresses can be harvested from public sources and used for
spam or targeted attacks.
▪ Eavesdropping: E-mail messages pass through networks which are part of big picture
i.e. Internet with a lot of people on it. So it is very easy for someone to track or capture
your message and read it.
▪ Identity theft: Identity theft is a crime in which someone fraudulently acquires and
misuses another person's personal information for financial or other fraudulent purposes,
often leading to financial losses and legal complications for the victim.
4.2 Limitations exist in currently used protocols: Any Network service like email
system must provide following five services for security reasons:
▪ Message Integrity: It says that the same message/data should arrive at receiver end as
it can be sent by sender. No alteration intentionally or accidentally takes place during
38 | P a g
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
transfer.
▪ Message Authentication: It ensures that message can be received from the sender only
or from the trusted source. In this receiver must be sure about the identity of sender.
▪ Message Non-repudiation: It ensures that anytime sender should not be able to deny
sending of message which originally sends by him/her.
▪ Entity Authentication: It ensures identification of user; the user must be verified before
accessing the resources and services. This is done by asking login-id and password.
▪ SMTP: SMTP does not encrypt messages. So, the communication between SMTP servers is in
plain text so eavesdropping takes place. If you are login to SMTP server using your username
and password that is also pass in plain text so again anyone stole your information during
transfer. Messages sent through SMTP also contains information about sending computer
and software used which when capture can be used for malicious intent.
▪ POP and IMAP: POP and IMAP are pull protocols, Request is sent to mail server to access the
mailbox and for that login using username and password is required. These details are not
encrypted before sending unless SSL is used. So, our confidential information is at stake.
4.3 Assumptions:
▪ Continuous Threats: Assume that email applications will always be under the threat of
various cyberattacks, such as phishing, malware, and spam. This assumption emphasizes
the need for constant vigilance and security measures.
▪ User Vulnerability: Assume that end-users are a common weak point in email security.
Users may inadvertently click on malicious links or download harmful attachments. This
assumption underscores the importance of user awareness and training.
▪ Evolving Attack Techniques: Assume that attackers will continually develop new
tactics and techniques. This assumption highlights the need for staying up to date with
the latest threats and vulnerabilities.
▪ Data Sensitivity: Assume that emails may contain sensitive information. This
assumption emphasizes the importance of protecting data during transmission and
storage.
4.4 Result: Security Vulnerabilities of E-mail applications has been studied successfully.
4.5 References:
https://www.cybertalk.org/2023/01/19/15-email-security-risks-and-how-to-address-
them-2023/
39 | P a g
22100BTCSE11478 DARSHAN TONGIYA
BTCS503N CYBER AND NETWORK SECURITY
40 | P a g
22100BTCSE11478 DARSHAN TONGIYA