0% found this document useful (0 votes)
15 views7 pages

Nis Ut2 Answers

The document discusses the importance of firewalls in securing internal networks, detailing their functions such as protecting against vulnerable services, ensuring privacy, and providing logging facilities. It also explains cyber law, particularly the IT Act, 2000, which governs cyber activities and outlines various cyber crimes. Additionally, the document covers digital certificates, their structure, types, and the workings of SMTP in email security.

Uploaded by

CISCO NETWORKING
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views7 pages

Nis Ut2 Answers

The document discusses the importance of firewalls in securing internal networks, detailing their functions such as protecting against vulnerable services, ensuring privacy, and providing logging facilities. It also explains cyber law, particularly the IT Act, 2000, which governs cyber activities and outlines various cyber crimes. Additionally, the document covers digital certificates, their structure, types, and the workings of SMTP in email security.

Uploaded by

CISCO NETWORKING
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

NEED OF FIREWALL

A firewall makes it easier to secure internal networks by providing the following services that

facilitates one to stop intruders from accessing their system.

Protects System from Vulnerable Services: Firewalls can be configured to filter out dangerous services
and expose the protected network to fewer risks. For example, firewalls could be configured to block
services like NFS (which allows systems to share directories and disks, causing a remote directory or
disk to appear to be local) from entering or leaving the subnet.

Privacy: Seemingly mild information may actually be useful to an attacker. Firewalls can block these
types of useful information from reaching the hands of the attackers.

Provides Log Facility: A firewall is capable of providing a tracing facility, which could be used to
determine form where the attack/probe originated.

WHAT IS CYBER LAW?

Cyber law is a term used to describe the legal issues related to use of

communications technology.

Cyber law is the rule which controls the conduct of the cyber activity and the

security under the cyber space.

Cyber law is the law related to the cyber space which includes computers, networks, software, data
storage devices, the Internet, websites, emails and electronic devices like cell phones, ATM machines
etc.

It is less of a distinct field of law in the way that property or contract are as it is an intersection of
many legal fields, including intellectual property, privacy, freedom of expression, and jurisdiction.

The IT ACT, 2000 is an act that has been made punishable. The main objective of

this Act is to create a environment information Technology can be used safely.

The IT Act, 2000 as altered by The IT Act, 2008 is known as the Cyber law. It has a separate chapter
entitled "Offences" in which various cyber crimes have been declared as penal offences punishable
with imprisonment and fine.

WHAT IS DIGITAL CERTIFICATES? Explain in Details.


Digital Certificates are not only issued to people but they can be issued to computers, software
packages or anything else that need to prove the identity in the electronic world.

Digital certificates are based on the ITU standard X.509 which defines a standard certificate format for
public key certificates and certification validation. Hence digital certificates are sometimes also
referred to as X.509 certificates.

Public key pertaining to the user client is stored in digital certificates by The Certification Authority
(CA) along with other relevant information such as client information, expiration date, usage, issuer
etc.

A digital certificate combines an individual's identity to a public key, Digital certificate contained all
the information receiver needs to be assured about the public key owner's identity, The certificates
are created and formatted based on the X.509 standard, which tells the necessary fields of a certificate
and possible values that can be inserted into the fields.

The different fields within certificates are as follows.

1. Version Number : Version number specifies the format and fields that can be used. It identifies
the version of theX.509 standard that was followed to create a certificate.
2. Subject : Specifies the owner of the certificate.
3. Public key : It contains the public key that bounds to the certified subject, also this identifies
the algorithm that was used to create the private/public key pair.

4. Issuer : The CA that generated and digitally signed the certificate.

5. Serial number : It is a unique number which identifies that this specific certificate is
issued by a particular CA.

6. Validity : Identifies the dates through which certificates are valid for use.

7. Certificate Usage : Specifies the approved use of certificate, which says that for what purpose
the user can use this public key.

8. Signature Algorithm : Identifies the hashing algorithm and digital signature algorithm used for
digitally signed the certificates.

9. Extensions :This allows additional data which can be encoded into thecertificate to
expand the certificate’s functionality

➢ There are four main types of certificates used

1. End - entity Certificates: These are issued by a CA to a specific subject. Such as accounting
department or a firewall.

2. CA Certificates: In the case of stand alone or root CA's, it may self signed or it may be issued
by a superior CA within a hierarchical model. In this model the superior CA gives the authority
and allows the sub-ordinates CA to accept request for certificate and generate the individual
certificates when a company needs to have multiple internal CAs, then this may be necessary.

3. Cross-certificates: These are used when independent CA's establish peer-to peer trust
relationships. Simply put they are a mechanism through which one CA can issue a certificate
allowing its user to trust another CA.
4. Policy Certificate: A Policy certificate is used for placing policy information .Within
sophisticated CA used for high-security applications, a mechanism is required to provide
centrally controlled policy information to PKI clients.

Explain the working of SMTP in Email Security.

Electronic mail(Email) is the most widely used application on the Internet. Using Email, user can send
a text messages, pictures, videos and sounds etc. to other Internet Users.

Now a day’s security for Email messages has become an extremely important issue.

Every Email message consists of a number of header lines which are followed by actual message
contents means a keyword, followed by colons. Header keywords are-From , To , Subject and Date.
The SMTP operation follows three phases

➢ 1.Connection set up : An SMTP sender will attempt to set up a TCP connection with a target
host when it has one or more mail message to deliver to that host.

➢ The following sequence occurs during connection setup;

➢ (a)The sender opens a TCP connection with the receiver.

➢ (b)Once the connection is established, the receiver identifies itself with 220 Service Ready".

➢ (c)The sender identifies itself with the HELO command.

➢ (d)The receiver accepts the sender's identification with "250 OK".

➢ (e) If the mail service on the destination is not available, the destination host returns a "421
Service Not Available reply in step 2 and the process is terminated.

➢ 2.Mail transfer: After the connection has been established, the SMTP sender May send one or
more messages to the SMTPreceiver

➢ .There are three logical phases to the transfer of a message;

➢ (a)A MAIL command identifies the originator of the message.

➢ (b) One or more RCPT commands identify the recipients of this message.

➢ (c)A DATA command transfers the message text.

➢ 3.Connection termination : The SMTP sender closes the connection in the following manner;

➢ (a) The sender sends a QUIT command and waits for a reply.

➢ (b) Sender initiates TCP close operation for the TCP connection.

➢ (c)The receiver initiates its TCP close after sending is reply to the QUIT command.
Draw the ITIL Framework diagram.

What is Compliance standards.


The international organization for standardizations (ISO), established in 1947, is a non-
governmental international body, that collaborates with the International Electro Technical
Commission(IEC) and International Telecommunication Union( ITU) and Information and
Communications Technology (ICT) Standards.
What Is Hacking? List Type of hacking.
Hacking is the act of identifying and then exploiting weaknesses in a computer system or
network, usually to gain unauthorized access to personal or organizational data. Hacking is
the process of finding some security holes in a computer system or network in order to gain
access to personal or corporate information. One example of computer hacking is the use of
a password cracking technique to gain access to a computer system. The process of gaining
illegal access to a computer system, or a group of computer systems, is known as hacking.
This is accomplished by cracking the passwords and codes that grant access to systems.
Cracking is the term used to describe the process of obtaining a password or code.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy