Nis w22 Ans (1) - 1
Nis w22 Ans (1) - 1
L |= (Autonomous)
ia al (ISO/IEC - 27001 - 2005 Certified)
Page 1/27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 2/27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
A Le (Autonomous)
aia caal (ISO/IEC - 27001 - 2005 Certified)
WINTER — 2022 EXAMINATION
MODEL ANSWER
INTELUGIBLE | UNINTELUGIBLE
DATA CRYPTOGRAPHY T—9) yr Dioggpan
d) State the meaning of hacking. 2M
Ans. | Hacking in simple terms means an illegal intrusion into a computer} Correct
system and/or network. Government websites are the hot target of the | &!anation
hackers due to the press coverage, it receives, Hackers enjoy the 2M
media coverage.
OR
Hacking is the act of identifying and then exploiting weaknesses in a
computer system or network, usually to gain unauthorized access to
personal or organizational data. Hacking is not always a malicious
activity, but the term has mostly negative connotations due to its
association with cybercrime.
e) Describe sniffing attack. 2M
Ans. | This is software or hardware that is used to observe traffic as it passes | _ Co/7ect
through a network on shared broadcast media. It can be used to view aman
all traffic or target specific protocol, service, or string of characters
like logins. Some network sniffers are not just designed to observe
the all traffic but also modify the traffic. Network administrators use
sniffers for monitoring traffic. They can also use for network
bandwidth analysis and to troubleshoot certain problems such as
duplicate MAC addresses.
f) Explain need for firewall. 2M
Ans. | A firewall is a network security device that monitors incoming | 4” ‘©
and outgoing network traffic and permits or blocks data packets ness aM
based on a set of security rules.
e [ts purpose is to establish a barrier between your internal network
and incoming traffic from external sources (such as the internet)
in order to block malicious traffic like viruses and hackers.
e Firewalls can be an effective means of protecting a local system
or network of systems from network-based security threats while
at the same time affording access to the outside world via wide
area networks and the Internet.
Page 3/27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 4/27
jo Tey,
Page 5/27
aT Te MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
a i (Autonomous)
aaa (ISO/IEC - 27001 - 2005 Certified)
WINTER — 2022 EXAMINATION
MODEL ANSWER
Limitations:-
1) Using the fingerprint scanner does not take into consideration
when a person physically changes
2) The cost of computer hardware and software programs can be
expensive
3) Using the fingerprint scanner can lead to false rejections and false
acceptance.
4) It can make mistakes with the dryness or dirty of the fingers skin,
as well as with the age (is not appropriate with children, because the
size of their fingerprint changes quickly.
c) Explain Caesar’s cipher substitute technique with suitable 4M
example.
Ans. | Caesar cipher technique is proposed by Julius Caesar. It is one of the | Explanation
simplest and most widely known encryption techniques. It is a type of 2M
substitution technique in which each letter in the plain text is replaced | —_-
223 xanple
by a letter some fixed number of position down the alphabet. The 2M
Caesar cipher involves replacing each letter of the alphabet with the
letter three places further down the alphabet. For example, with a
shift of 3, A would be replaced by D, B would became E, and so on
as shown in the table below
Pian }
heat A B c;] Dy E
Cipher
text D E F G E I 7/E|LIMI N| Oo] F
wrt
CphriQ |k |S |r |u |v |w Ix |¥ |z |A |B \c
ext
Example
PLAIN TEXT - COMPUTER ENGINEERING
Convert each alphabet in the plain text, using the table, the cipher text
can be written as
CIPHER TEXT —- FRPSXWHU HQJLQHHULQJ
Algorithm to break Caesar cipher:
Page 6/27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
[ew Sermunenn ]
[ pt uP
DES Encryption:-
Step 1: In the first step the 64-bit plain text undergoes initial
permutation which rearranges the bits to produce two 32-bit permuted
block which is called left plain text (LPT 32-bit) and right plain text
(RPT 32-bit).
Step 2: Now, 16 rounds of DES encryption will be performed on this
LPT and RPT with a 56-bit key.
Step 3: After the 16th round the 32-bit LPT and 32-bit RPT are
integrated which forms a 64-bit block again and then the final
permutation is applied to this 64-bit block, to obtain the 64-bit cipher
text.
Rounds in Data Encryption Standard
Each round of DES performs the same function. So, below are the
steps of the function performed in each round of DES algorithm:
Page 7/27
re
-” #4,
z 3
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
a1 | ans - (Autonomous)
“*, a
5. XOR and Swap:-lIn this step, the 32-bit LPT of the initial 64-bit
plain text is XOR with the output of P-box permutation. The result of
the XOR is the new RPT for next round and the old RPT is swapped
with LPT.
DES Decryption:-
The same Data Encryption Standard algorithm used for encrypting
the plain text is also used to decrypting the cipher text. But the
algorithm is reversed, such as the initial and final permutation events
are reversed. Even the sequence of the sub keys applied in 16 rounds
of DES is also reversed.
Attempt any THREE of the following: 12
a) Explain the term Authorization and Authentication with respect 4M
to security. Explanation
Ans. Authorization: It is a process of verifying that the known person has of each term
2M
the authority to perform certain operation. It cannot occur without
authentication, It is nothing but granting permissions and rights to
individual so that he can use these rights to access computer resources
or information.
Page 8/27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
oO|;|R|A N G |E
cio t|MIiP U T
EIR |P R oO |G
Ri|A |M[IM [I N
G | L E x x M
In the above example, the plaintext has been padded so that it neatly
fits in a rectangle. This is known as a regular columnar transposition.
An irregular columnar transposition leaves these characters blank,
though this makes decryption slightly more difficult. The columns are
now reordered such that the letters in the key word are ordered
alphabetically.
Page 9/27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Ss|6 |1 |4 [3 |2
o|R|AIN|IGIE
c;}OoO|M/[P U {T
E|R|P RZ 1|O |.G
RIA IM{M|{I N
G/L E x |X |M
secure approach to a firewall. It can effectively acts as a proxy server. Any one
The typical DMZ configuration has a separate computer or host in Exarrple
iM
network which receives requests from users within the private
network to access a web sites or public network. Then DMZ host
initiates sessions for such requests on the public network but it is not
able to initiate a session back into the private network. It can only
forward packets which have been requested by a host. The public
network’s users who are outside the company can access only the
DMZ host. It can store the company’s web pages which can be served
to the outside users. Hence, the DMZ can’t give access to the other
company’s data. By any way, if an outsider penetrates the DMZ’s
security the web pages may get corrupted but other company’s
information can be safe.
Page 10/27
a ae,
— -, MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
al | |e (Autonomous)
aaa (ISO/IEC - 27001 - 2005 Certified)
Examples:
1) Web servers
It’s possible for web servers communicating with internal database
servers to be deployed in a DMZ. This makes internal databases more
secure, as these are the repositories responsible for storing sensitive
information. Web servers can connect with the internal database
server directly or through application firewalls, even though the DMZ
continues to provide protection.
2) DNS servers
A DNS server stores a database of public IP addresses and their
associated hostnames. It usually resolves or converts those names to
IP addresses when applicable. DNS servers use specialized software
and communicate with one another using dedicated protocols. Placing
a DNS server within the DMZ prevents external DNS requests from
gaining access to the internal network. Installing a second DNS
server on the internal network can also serve as additional security.
3)Proxy servers
A proxy server is often paired with a firewall. Other computers use it
to view Web pages. When another computer requests a Web page, the
proxy server retrieves it and delivers it to the appropriate requesting
Page 11/27
”
=
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
aa ?
3
ae HH
5 (Autonomous)
“*, ee,
i)
orm ee nil
(ISO/IEC - 27001 - 2005 Certified)
Page 12 / 27
=—, MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
a
(ISO/IEC - 27001 - 2005 Certified)
actin Sepety
1
mene
b
tnemanee
ee ae
Steganography process:
Cover-media + Hidden data + Stego-key = Stego-medium
Cover media is the file in which we will hide the hidden data, which
may also be encrypted using stego-key. The resultant file is stego-
medium. Cover-media can be image or audio file.
Advantages:
1. With the help of steganography we can hide secret message within
graphics image.
2. In modern Steganography, data is encrypted first and then inserted
using special algorithm so that no one suspects its existence.
Drawbacks:
1. It requires lot of overhead to hide a relatively few bits of
information.
2. Once the system is discovered, it becomes virtually worthless.
b) Explain honey pots. 4M
Ans. Honeypots are designed to purposely engage and deceive hackers and
identify malicious activities performed over the Internet. The Explanation
2M
honeypots are designed to do the following:
Any
1. Divert the attention of potential attacker. relevant
diagram2M
2. Collect information about the intruder’s action.
Page 13 / 27
oe, io Feey, Ye
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
z 3
+
Ta, -
= (Autonomous)
"eg 7 ll
(ISO/IEC - 27001 - 2005 Certified)
Fl
< ia !
ROVER HONEY HeEWALL
Pot
Page 14/27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
* Analysis Engine:
This component examines the collected network traffic & compares it
to known patterns of suspicious or malicious activity stored in the
signature database. The analysis engine acts like a brain of the IDS.
* Signature database:
It is a collection of patterns & definitions of known suspicious or
malicious activity.
* User Interface & Reporting:
This is the component that interfaces with the human element,
providing alerts & giving the user a means to interact with & operate
the IDS.
d) Describe working principle of SMTP. 4M
Ans. 1. Composition of Mail: A user sends an e-mail by composing an Working
prindple
electronic mail message using a Mail User Agent (MUA). Mail User explanation
Agent is a program which is used to send and receive mail. The 2M
message contains two parts: body and header. The body is the main
part of the message while the header includes information such as the Suitable
sender and recipient address. The header also includes descriptive diagram 2M
information such as the subject of the message. In this case, the
message body is like a letter and header is like an envelope that
contains the recipient's address.
Page 15/27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 16 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 17 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
saianeal (ISO/IEC - 27001 - 2005 Certified)
Packet Filtering
Page 18 / 27
wa MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
a. |= (Autonomous)
Pence (ISO/IEC - 27001 - 2005 Certified)
femide
comrection |
Needle bot
Y= network
Applicatios level gateway firewall
Page 19 / 27
”
Page 20 / 27
a<<
s
MAHARASHTRA STATE BOARD OF TECHNICAL
(Autonomous)
EDUCATION
Diagram
[ 2M
TT =
Explanation
a] gles aM
Applicaton Layer
gol ations Linger
a ~Tranuport layer
Re unpre ———
Cama #
It encrypts and seal the transport and application layer data during
transmission. It also offers integrity protection for internet layer. It
sits between transport and internet layer of conventional TCP/IP
protocol 1. Secure remote internet access: Using IPsec make a local
call to our internet services provider (ISP) so as to connect to
organization network in a secure fashion from our house or hotel
from there; to access the corporate network facilities or access remote
desktop/servers. 2. Secure branch office connectivity: Rather than
subscribing to an expensive leased line for connecting its branches
across cities, an organization can setup an IPsec enabled network for
security. 3. Setup communication with other organization: Just as
IPsec allow connectivity between various branches of an
organization, it can also be used to connect the network of different
organization together in a secure & inexpensive fashion. Basic
Concept of IPsec Protocol: IP packet consist two position IP header &
actual data [Psec feature are implemented in the form of additional
headers called as extension header to the standard, default IP header.
IPsec offers two main services authentication & confidentially. Each
of these requires its own extension header. Therefore, to support these
two main services, IPsec defines two IP extension header one for
authentication & another for confidentiality.
Page 21/27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
@ Piste | Encypia
Fig: AP and ESP
Attempt any TWO of the following: 12
a) Define virus and describe the phases of virus. 6M
Ans. Definition: Virus is a program which attaches itself to another Definition
2M
program and causes damage to the computer system or the network. It
is loaded onto your computer without your knowledge and runs Phases 4M
against your wishes.
During the lifecycle of virus it goes through the following four
phases:
1. Dormant phase: The virus is idle and activated by some event.
2. Propagation phase: [t places an identical copy of itself into other
programs or into certain system areas on the disk.
3. Triggering phase: The virus is activated to perform the function
for which it was intended.
4. Execution phase: The function of virus is performed
Page 22 / 27
~~
al e MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
hice (ISO/IEC - 27001 - 2005 Certified)
WINTER — 2022 EXAMINATION
MODEL ANSWER
Subject: Network & Information Security Subject Code 22620
b) Explain Kerberos with help of suitable diagram. 6M
Ans. | Kerberos: Kerberos is a network authentication protocol. It is
designed to provide strong authentication for client/server | Stepby step
applications by using secret-key cryptography. It uses secret key ope
cryptography. It is a solution to network security problems. It} _ 4).
provides tools for authentication and strong cryptography over the} gaeran6
network to help you secure your information system There are 4
parties involved in Kerberos protocol
i) User
ii) Authentication service (AS)
iii) Ticket granting server (TGS)
iv) Service server
Working of Kerberos:
1. The authentication service, or AS, receivers the request by the
client and verifies that the client is indeed the computer it claims to
be. This is usually just a simple database lookup of the user’s ID.
User Id
——
—|
client
Authentication server (AS)
Page 23 / 27
oe Fae
re,
*S——~ MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
: Us
(Autonomous)
ane (ISO/IEC - 27001 - 2005 Certified)
Cc)
Chent
Authentication server (AS)
Om
cent
Authenticaten server (AS)
TGT Ticket -
Tene stare Ehrs 2 —
5. The TGS creates an encrypted key with a timestamp, and grants the
client a service ticket.
Ss
[|__| —
il
Amthonicsbos sores (AS)
Eacrypted key Ss a
‘Tien starep: © bes se
6. The client decrypts the ticket, tells the TGS it has done so, and then
sends its own encrypted key to the service.
Page 24/27
“+ MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
; $ (Autonomous)
Perasseet (ISO/IEC - 27001 - 2005 Certified)
Eacrypted key
Tene ttamp Shr
Ticket Granting Server (TGS)
Service terver
7. The service decrypts the key, and makes sure the timestamp is still
valid. If it is, the service contacts the key distribution center to
receive a session that is returned to the client.
Service server
8. The client decrypts the ticket. If the keys are still valid,
communication 1s initiated between client and server.
c) Write a brief note on firewall configuration 6M
Ans. | A firewall is combination of packet filter and application level an
getway , Base on these there are three types of configurations
Explanation
Firewall Configurations: 4M
]
|
Sorsened Hos! firewall, Gesveres Host frase, } Screered
Singie-+tomed Bastion QuarHorned Bastion ‘Subnet Firewall
Page 25/27
oa * MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
a bs (Autonomous)
i (ISO/IEC - 27001 - 2005 Certified)
Eelsi
Ld
|
|
#| ——
ga, Ele
Fig: Dule Homed Bastion
Page 26 / 27
Jae MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
a | | |= (Autonomous)
al (ISO/IEC - 27001 - 2005 Certified)
i
_——s some ‘uae 4aoe
:
sg |@f2\e=—
|| Packet finer
TELNET +
i
; ee U
Fig: Screened Subnet Firewall
Page 27/27