Nis Ut2 Answers
Nis Ut2 Answers
A firewall makes it easier to secure internal networks by providing the following services that
Protects System from Vulnerable Services: Firewalls can be configured to filter out dangerous services
and expose the protected network to fewer risks. For example, firewalls could be configured to block
services like NFS (which allows systems to share directories and disks, causing a remote directory or
disk to appear to be local) from entering or leaving the subnet.
Privacy: Seemingly mild information may actually be useful to an attacker. Firewalls can block these
types of useful information from reaching the hands of the attackers.
Provides Log Facility: A firewall is capable of providing a tracing facility, which could be used to
determine form where the attack/probe originated.
Cyber law is a term used to describe the legal issues related to use of
communications technology.
Cyber law is the rule which controls the conduct of the cyber activity and the
Cyber law is the law related to the cyber space which includes computers, networks, software, data
storage devices, the Internet, websites, emails and electronic devices like cell phones, ATM machines
etc.
It is less of a distinct field of law in the way that property or contract are as it is an intersection of
many legal fields, including intellectual property, privacy, freedom of expression, and jurisdiction.
The IT ACT, 2000 is an act that has been made punishable. The main objective of
The IT Act, 2000 as altered by The IT Act, 2008 is known as the Cyber law. It has a separate chapter
entitled "Offences" in which various cyber crimes have been declared as penal offences punishable
with imprisonment and fine.
Digital certificates are based on the ITU standard X.509 which defines a standard certificate format for
public key certificates and certification validation. Hence digital certificates are sometimes also
referred to as X.509 certificates.
Public key pertaining to the user client is stored in digital certificates by The Certification Authority
(CA) along with other relevant information such as client information, expiration date, usage, issuer
etc.
A digital certificate combines an individual's identity to a public key, Digital certificate contained all
the information receiver needs to be assured about the public key owner's identity, The certificates
are created and formatted based on the X.509 standard, which tells the necessary fields of a certificate
and possible values that can be inserted into the fields.
1. Version Number : Version number specifies the format and fields that can be used. It identifies
the version of theX.509 standard that was followed to create a certificate.
2. Subject : Specifies the owner of the certificate.
3. Public key : It contains the public key that bounds to the certified subject, also this identifies
the algorithm that was used to create the private/public key pair.
5. Serial number : It is a unique number which identifies that this specific certificate is
issued by a particular CA.
6. Validity : Identifies the dates through which certificates are valid for use.
7. Certificate Usage : Specifies the approved use of certificate, which says that for what purpose
the user can use this public key.
8. Signature Algorithm : Identifies the hashing algorithm and digital signature algorithm used for
digitally signed the certificates.
9. Extensions :This allows additional data which can be encoded into thecertificate to
expand the certificate’s functionality
1. End - entity Certificates: These are issued by a CA to a specific subject. Such as accounting
department or a firewall.
2. CA Certificates: In the case of stand alone or root CA's, it may self signed or it may be issued
by a superior CA within a hierarchical model. In this model the superior CA gives the authority
and allows the sub-ordinates CA to accept request for certificate and generate the individual
certificates when a company needs to have multiple internal CAs, then this may be necessary.
3. Cross-certificates: These are used when independent CA's establish peer-to peer trust
relationships. Simply put they are a mechanism through which one CA can issue a certificate
allowing its user to trust another CA.
4. Policy Certificate: A Policy certificate is used for placing policy information .Within
sophisticated CA used for high-security applications, a mechanism is required to provide
centrally controlled policy information to PKI clients.
Electronic mail(Email) is the most widely used application on the Internet. Using Email, user can send
a text messages, pictures, videos and sounds etc. to other Internet Users.
Now a day’s security for Email messages has become an extremely important issue.
Every Email message consists of a number of header lines which are followed by actual message
contents means a keyword, followed by colons. Header keywords are-From , To , Subject and Date.
The SMTP operation follows three phases
➢ 1.Connection set up : An SMTP sender will attempt to set up a TCP connection with a target
host when it has one or more mail message to deliver to that host.
➢ (b)Once the connection is established, the receiver identifies itself with 220 Service Ready".
➢ (e) If the mail service on the destination is not available, the destination host returns a "421
Service Not Available reply in step 2 and the process is terminated.
➢ 2.Mail transfer: After the connection has been established, the SMTP sender May send one or
more messages to the SMTPreceiver
➢ (b) One or more RCPT commands identify the recipients of this message.
➢ 3.Connection termination : The SMTP sender closes the connection in the following manner;
➢ (a) The sender sends a QUIT command and waits for a reply.
➢ (b) Sender initiates TCP close operation for the TCP connection.
➢ (c)The receiver initiates its TCP close after sending is reply to the QUIT command.
Draw the ITIL Framework diagram.