all NIS paper
all NIS paper
Page 1 / 28
Page 2 / 28
Page 3 / 28
Page 4 / 28
Page 5 / 28
Page 6 / 28
it only checks who is speaking and what is speaking (Who you are and
what you speak)
c) Differentiate between symmetric and asymmetric key 4M
cryptography. 1M for
Ans. each valid
point, any
four points
can be
considered
2M for
explanation
Initial Permutation (IP): It happens only once. It replaces the first bit
of the original plain text block with the 58th bit of the original plain
text block, the second bit with the 50th bit of original plain text block
and so on. The resulting 64-bits permuted text block is divided into
two half blocks. Each half block consists of 32 bits. The left block
called as LPT and right block called as RPT.16 rounds are performed
on these two blocks. Details of one round in DES
Page 7 / 28
Page 8 / 28
new RPT. The old RPT becomes new LPT, in a process of swapping.
Page 9 / 28
Page 10 / 28
Page 11 / 28
resources. Access control is to specify, control and limit the access to 2M for
the host system or application, which prevents unauthorized use to authenticati
access or modify data or resources. on
Authentication -
Authentication helps to establish proof of identities. The
Authentication process ensures that the origin of a message is correctly
identified. For example, suppose that user C sends a message over the
internet to user B. however, the trouble is that user C had posed as user
A when he sent a message to user B. how would user B know that the
message has come from user C, who posing as user A? This concept is
shown in fig. below. This type of attack is called as fabrication
Authentication is the process of determining identity of a user or other
entity. It is performed during log on process where user has to submit
Page 12 / 28
Caesar cipher:
It is proposed by Julius Caesar. In cryptography Caesar cipher also
known as Caesar cipher/code, shift cipher/code. It is one of the
simplest and most widely known encryption techniques. It is a type of
substitution technique in which each letter in the plain text is replaced
by a letter some fixed number of position
down the alphabet. For example, with a shift of 3, A would be replaced
by D, B would became E, and so on as shown in the table below.
Using this scheme, the plain text “SECRET” encrypts as Cipher text
“VHFUHW”. To allow someone to read the cipher text, you tell them
that the key is 3
For S:= (p+k)mod26
= (18 + 3) mod 26
= 21
=V
To allow someone to read the cipher text, you tell them that the key is3
Algorithm to break Caesar cipher:
1. Read each alphabet in the cipher text message, and search for it in
the second row of the table above.
2. When a match in found, replace that alphabet in the cipher text
message with the corresponding alphabet in the same column but the
first row of the table. (For example, if the alphabet cipher text is J,
replace it with G).
3. Repeat the process for all alphabets in the cipher text message.
b) Explain DMZ 4M
Ans. DMZ (Demilitarized Zone):- 1M for
It is a computer host or small network inserted as a “neutral diagram
zone” in a company‟s private network and the outside public network. 2M for
It avoids outside users from getting direct access to a company‟s data explanation
server. A DMZ is an optional but more secure approach to a firewall. It 1M for
Page 13 / 28
Page 14 / 28
Page 15 / 28
Page 16 / 28
4. The receiver calculates the message digest from the plain text or
message he received.
5. Receiver decrypts the encrypted message digest using the sender‟s
public key. If both the MDs are not same then the plaintext or message
is modified after signing.
Page 17 / 28
Page 18 / 28
Page 19 / 28
Page 20 / 28
Page 21 / 28
5. The TGS creates an encrypted key with a timestamp, and grants the
client a service ticket.
6. The client decrypts the ticket, tells the TGS it has done so, and then
sends its own encrypted key to the service server.
7. The service server decrypts the key, and makes sure the timestamp is
still valid. If it is, the
service contacts the key distribution center to receive a session that is
returned to the client.
8. The client decrypts the ticket. If the keys are still valid,
communication is initiated between client and server.
Page 22 / 28
The target system will drop these connections after a specific time-out
period, but if the attacker sends requests faster than the time-out period
eliminates them, the system will quickly be filled with requests. The
number of connections a system can support is finite, so when more
requests come in than can be processed, the system will soon be
reserving all its connections for fake requests. At this point, any further
requests are simply dropped (ignored), and legitimate users who want
to connect to the target system will not be able to. Use of the system
has thus been denied to them.
Page 23 / 28
Working on a PKI:
PKI and Encryption: The root of PKI involves the use of
cryptography and encryption techniques. Both symmetric and
asymmetric encryption uses a public key. There is always a risk of
MITM (Man in the middle). This issue is resolved by a PKI using
digital certificates. It gives identities to keys in order to make the
verification of owners easy and accurate.
Public Key Certificate or Digital Certificate: Digital certificates are
issued to people and electronic systems to uniquely identify them in the
digital world.
The Certification Authority (CA) stores the public key of a user
along with other information about the client in the digital
certificate. The information is signed and a digital signature is also
included in the certificate.
The affirmation for the public key then thus be retrieved by
validating the signature using the public key of the Certification
Authority.
Page 24 / 28
Generates the key pairs – This key pair generated by the CA can be
either independent or in collaboration with the client.
Issuing of the digital certificates – When the client successfully
provides the right details about his identity, the CA issues a
certificate to the client. Then CA further signs this certificate
digitally so that no changes can be made to the information.
Publishing of certificates – The CA publishes the certificates so
that the users can find them. They can do this by either publishing
them in an electronic telephone directory or by sending them out to
other people.
Verification of certificate – CA gives a public key that helps in
verifying if the access attempt is authorized or not.
Revocation – In case of suspicious behavior of a client or loss of
trust in them, the CA has the power to revoke the digital
certificate.
In HTTPS, the Web server's PKI certificate is used by the browser for
two purposes:
Page 25 / 28
Validate the identity of the Web server by verify the CA's digital
signature in the certificate.
Encrypt a secret key to be securely delivered to the Web server. The
secret key will be used to encrypt actual data to be exchanged between
the browser and the Web server.
Page 26 / 28
Page 27 / 28
Page 28 / 28
Page 1 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 2 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Diagram
1M
Page 3 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 4 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 5 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Limitations:-
1) Using the fingerprint scanner does not take into consideration
when a person physically changes
2) The cost of computer hardware and software programs can be
expensive
3) Using the fingerprint scanner can lead to false rejections and false
acceptance.
4) It can make mistakes with the dryness or dirty of the finger„s skin,
as well as with the age (is not appropriate with children, because the
size of their fingerprint changes quickly.
c) Explain Caesar’s cipher substitute technique with suitable 4M
example.
Ans. Caesar cipher technique is proposed by Julius Caesar. It is one of the Explanation
simplest and most widely known encryption techniques. It is a type of 2M
substitution technique in which each letter in the plain text is replaced Example
by a letter some fixed number of position down the alphabet. The 2M
Caesar cipher involves replacing each letter of the alphabet with the
letter three places further down the alphabet. For example, with a
shift of 3, A would be replaced by D, B would became E, and so on
as shown in the table below
Example
PLAIN TEXT - COMPUTER ENGINEERING
Convert each alphabet in the plain text, using the table, the cipher text
can be written as
CIPHER TEXT – FRPSXWHU HQJLQHHULQJ
Algorithm to break Caesar cipher:
Page 6 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
DES Encryption:-
Step 1: In the first step the 64-bit plain text undergoes initial
permutation which rearranges the bits to produce two 32-bit permuted
block which is called left plain text (LPT 32-bit) and right plain text
(RPT 32-bit).
Step 2: Now, 16 rounds of DES encryption will be performed on this
LPT and RPT with a 56-bit key.
Step 3: After the 16th round the 32-bit LPT and 32-bit RPT are
integrated which forms a 64-bit block again and then the final
permutation is applied to this 64-bit block, to obtain the 64-bit cipher
text.
Rounds in Data Encryption Standard
Each round of DES performs the same function. So, below are the
steps of the function performed in each round of DES algorithm:
Page 7 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
5. XOR and Swap:-In this step, the 32-bit LPT of the initial 64-bit
plain text is XOR with the output of P-box permutation. The result of
the XOR is the new RPT for next round and the old RPT is swapped
with LPT.
DES Decryption:-
The same Data Encryption Standard algorithm used for encrypting
the plain text is also used to decrypting the cipher text. But the
algorithm is reversed, such as the initial and final permutation events
are reversed. Even the sequence of the sub keys applied in 16 rounds
of DES is also reversed.
3. Attempt any THREE of the following: 12
a) Explain the term Authorization and Authentication with respect 4M
to security. Explanation
Ans. Authorization: It is a process of verifying that the known person has of each term
2M
the authority to perform certain operation. It cannot occur without
authentication. It is nothing but granting permissions and rights to
individual so that he can use these rights to access computer resources
or information.
Page 8 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
In the above example, the plaintext has been padded so that it neatly
fits in a rectangle. This is known as a regular columnar transposition.
An irregular columnar transposition leaves these characters blank,
though this makes decryption slightly more difficult. The columns are
now reordered such that the letters in the key word are ordered
alphabetically.
Page 9 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 10 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Examples:
1) Web servers
It‟s possible for web servers communicating with internal database
servers to be deployed in a DMZ. This makes internal databases more
secure, as these are the repositories responsible for storing sensitive
information. Web servers can connect with the internal database
server directly or through application firewalls, even though the DMZ
continues to provide protection.
2) DNS servers
A DNS server stores a database of public IP addresses and their
associated hostnames. It usually resolves or converts those names to
IP addresses when applicable. DNS servers use specialized software
and communicate with one another using dedicated protocols. Placing
a DNS server within the DMZ prevents external DNS requests from
gaining access to the internal network. Installing a second DNS
server on the internal network can also serve as additional security.
3)Proxy servers
A proxy server is often paired with a firewall. Other computers use it
to view Web pages. When another computer requests a Web page, the
proxy server retrieves it and delivers it to the appropriate requesting
Page 11 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
This hidden information can be plain text, cipher text or even images. OR
In modern steganography, data is first encrypted by the usual means Advantage
and then inserted, using a special algorithm, into redundant data that 1M
is part of a particular file format such as a JPEG image. Disadvantag
e 1M
Page 12 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Steganography process:
Cover-media + Hidden data + Stego-key = Stego-medium
Cover media is the file in which we will hide the hidden data, which
may also be encrypted using stego-key. The resultant file is stego-
medium. Cover-media can be image or audio file.
Advantages:
1. With the help of steganography we can hide secret message within
graphics image.
2. In modern Steganography, data is encrypted first and then inserted
using special algorithm so that no one suspects its existence.
Drawbacks:
1. It requires lot of overhead to hide a relatively few bits of
information.
2. Once the system is discovered, it becomes virtually worthless.
b) Explain honey pots. 4M
Ans. Honeypots are designed to purposely engage and deceive hackers and
identify malicious activities performed over the Internet. The Explanation
2M
honeypots are designed to do the following:
Any
1. Divert the attention of potential attacker. relevant
diagram 2M
2. Collect information about the intruder‟s action.
3. Provide encouragement to the attacker so as to stay for some time,
allowing the administrations to detect this and swiftly act on this.
Page 13 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 14 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Analysis Engine:
This component examines the collected network traffic & compares it
to known patterns of suspicious or malicious activity stored in the
signature database. The analysis engine acts like a brain of the IDS.
Signature database:
It is a collection of patterns & definitions of known suspicious or
malicious activity.
User Interface & Reporting:
This is the component that interfaces with the human element,
providing alerts & giving the user a means to interact with & operate
the IDS.
d) Describe working principle of SMTP. 4M
Ans. 1. Composition of Mail: A user sends an e-mail by composing an Working
principle
electronic mail message using a Mail User Agent (MUA). Mail User explanation
Agent is a program which is used to send and receive mail. The 2M
message contains two parts: body and header. The body is the main
part of the message while the header includes information such as the Suitable
sender and recipient address. The header also includes descriptive diagram 2M
information such as the subject of the message. In this case, the
message body is like a letter and header is like an envelope that
contains the recipient's address.
Page 15 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 16 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 17 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 18 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
through the internet service provider and then sent to the outside
world (Internet). This way, the packets are tagged with only the
Public IP address (Firewall level) and the internal private IP
addresses are not exposed to potential intruders
Page 19 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 20 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Explanation
4M
It encrypts and seal the transport and application layer data during
transmission. It also offers integrity protection for internet layer. It
sits between transport and internet layer of conventional TCP/IP
protocol 1. Secure remote internet access: Using IPsec make a local
call to our internet services provider (ISP) so as to connect to
organization network in a secure fashion from our house or hotel
from there; to access the corporate network facilities or access remote
desktop/servers. 2. Secure branch office connectivity: Rather than
subscribing to an expensive leased line for connecting its branches
across cities, an organization can setup an IPsec enabled network for
security. 3. Setup communication with other organization: Just as
IPsec allow connectivity between various branches of an
organization, it can also be used to connect the network of different
organization together in a secure & inexpensive fashion. Basic
Concept of IPsec Protocol: IP packet consist two position IP header &
actual data IPsec feature are implemented in the form of additional
headers called as extension header to the standard, default IP header.
IPsec offers two main services authentication & confidentially. Each
of these requires its own extension header. Therefore, to support these
two main services, IPsec defines two IP extension header one for
authentication & another for confidentiality.
Page 21 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 22 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 23 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
5. The TGS creates an encrypted key with a timestamp, and grants the
client a service ticket.
6. The client decrypts the ticket, tells the TGS it has done so, and then
sends its own encrypted key to the service.
Page 24 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
7. The service decrypts the key, and makes sure the timestamp is still
valid. If it is, the service contacts the key distribution center to
receive a session that is returned to the client.
8. The client decrypts the ticket. If the keys are still valid,
communication is initiated between client and server.
c) Write a brief note on firewall configuration 6M
Ans. A firewall is combination of packet filter and application level Diagram
2M
getway , Base on these there are three types of configurations
Explanation
4M
Page 25 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 26 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 27 / 27
lOMoARcPSD|21419424
Page 1 / 25
Page 2 / 25
Page 3 / 25
3. Integrity: when the contents of the message are changed after the
sender sends it, but before it reaches the intended recipient, we say
that the integrity of the message is lost. For example, here user C
tampers with a message originally sent by user A, which is actually
destined for user B. user C somehow manages to access it, change its
contents and send the changed message to user B. user B has no way
of knowing that the contents of the message were changed after user
A had sent it. User A also does not know about this change. This type
of attack is called as modification.
Page 4 / 25
Page 5 / 25
Fig : Steganography
Page 6 / 25
Cover media is the file in which we will hide the hidden data, which
may also be encrypted using stego-key. The resultant file is stego-
medium. Cover-media can be image or audio file. Stenography takes
cryptography a step further by hiding an encrypted message so that
no one suspects it exists. Ideally, anyone scanning your data will fail
to know it contains encrypted data. Stenography has a number of
drawbacks when compared to encryption. It requires a lot of overhead
to hide a relatively few bits of information. I.e. One can hide text,
data, image, sound, and video, behind image.
Applications :
1. Confidential communication and secret data storing
2. Protection of data alteration
3. Access control system for digital content distribution
4. Media Database systems
Page 7 / 25
PLAIN TEXT:
MAHARASTRA STATE BOARD OF TECHNICAL EDUCATION
LET ORDER BE:4,5,3,2,1
CIPHER
TEXT:ARTRECUORAEDCACNHTAATIDIASTOFNETMASBOH
LA
Page 8 / 25
Any four
differences
1M each
Page 9 / 25
2M for
Caesor’s
cipher
technique
Page 10 / 25
Page 11 / 25
4) Enter a specific port number. In this case, it’s 443. Click Next.
Page 12 / 25
Page 13 / 25
Diagram
2M
e) Find the output of initial permutation box when the input is given 4M
in hexadecimal as
0 x 0003 0000 0000 0001
Page 15 / 25
Ans.
0 0 0 3 Hexadecimal
0000 0000 0000 0011 Binary
Correct
0 0 0 0 Hexadecimal output 4M
0000 0000 0000 0000 Binary
0 0 0 0 Hexadecimal
0000 0000 0000 0000 Binary
0 0 0 1 Hexadecimal
0000 0000 0000 0001 Binary
Input
1 2 3 4 5 6
1 0 0 0 0 0 0
2 0 0 0 0 0 0
3 0 0 0 0 0 0
4 0 0 0 0 0 0
5 0 0 0 0 0 0
6 0 0 0 0 0 0
7 0 0 0 0 0 0
8 0 0 0 0 0 0
Permutation table
1 2 3 4 5 6
1 58 50 42 34 26 18
2 60 52 44 36 28 20
3 62 54 46 38 30 22
4 64 56 48 40 32 24
5 57 49 41 33 25 17
6 59 51 43 35 27 19
7 61 53 45 37 29 21
8 63 55 47 39 31 23
Page 16 / 25
Output
1 2 3 4 5 6
1 0 0 0 0 0 0
2 0 0 0 0 0 0
3 0 0 0 0 0 0
4 1 0 0 0 0 0
5 0 0 0 0 0 0
6 0 0 0 0 0 0
7 0 0 0 0 0 0
8 0 0 0 0 0 0
Hexadecimal
0000 0082 0000 0002
Note: Any other relevant logic shall be considered.
5. Attempt any TWO of the following 12M
a) Describe the following terms 6M
i) Asset
ii) Vulnerability
iii) Risks
Ans. i) Asset: Asset is any data, device, or other component of the
environment that supports information-related activities. Assets
Descriptio
generally include hardware, software and confidential information. n of each
term 2M
ii) Vulnerability: It is a weakness in computer system & network.
The term "vulnerability" refers to the security flaws in a system that
allows an attack to be successful. Vulnerability testing should be
performed on an on-going basis by the parties responsible for
resolving such vulnerabilities, and helps to provide data used to
identify unexpected dangers to security that need to be addressed.
Such vulnerabilities are not particular to technology — they can also
apply to social factors such as individual authentication and
authorization policies.
Page 17 / 25
OR
Risk is any event or action that could cause a loss or damage to
computer hardware, software, data, or information.
b) Describe network base IDS with suitable diagram 6M
Ans.
Diagram
2M
Page 18 / 25
COBIT stands for ―Control Objectives for Information and related Explanatio
Technology‖, it is a framework that was developed by ISACA n 4M
(Information System Audit and Control Association). It is a set of
guidance material for IT governance to manage their requirements,
technical issues, and business risks.
Page 19 / 25
Page 20 / 25
Page 21 / 25
3. The client decrypts the ticket, tells the TGS it has done so, and then
sends its own encrypted key to the service.
Page 22 / 25
4. The service decrypts the key, and makes sure the timestamp is still
valid. If it is, the service contacts the key distribution center to
receive a session that is returned to the client.
5. The client decrypts the ticket. If the keys are still valid,
communication is initiated between client and server.
c) Write a brief note on firewall configuration 6M
i) Packet filter as a firewall
ii) Application level gateway firewall
iii) Circuit level gateway firewall Explanatio
Ans. n with
1. Packet filter as a firewall : As per the diagram given below diagram
Firewall will act according to the table given for example source IP 2M
150.150.0.0 is the IP address of a network , all the packets which are each
coming from this network will be blocked by the firewall in this way
it is acting as a firewall. Table also having port 80, IP Address
200.75.10.8 & port 23 firewall will act in the similar fashion. Port 23
is for Telnet remote login in this case firewall won’t allow to login
onto this server. IP Address 200.75.10.8 is the IP address of
individual Host, all the packet having this IP address as a destination
Address will be denied. Port 80 no HTTP request allowed by firewall
Page 23 / 25
Page 24 / 25
Page 25 / 25
1) The answers should be examined by key words and not as word-to-word as given
in the model answer scheme.
2) The model answer and the answer written by candidate may vary but the
examiner may try to assess the understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given
more Importance (Not applicable for subject English and Communication Skills).
4) While assessing figures, examiner may give credit for principal components
indicated in the figure. The figures drawn by candidate and model answer may
vary. The examiner may give credit for any equivalent figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the
assumed constant values may vary and there may be some difference in the
candidate’s answers and model answer.
6) In case of some questions credit may be given by judgement on part of
examiner of relevant answer based on candidate’s understanding.
7) For programming language papers, credit may be given to any other
program based on equivalent concept.
[Q.1 E]
1.
From S-22
[Q.1 E]
From S-22
10. The matching program will analyze the template with the
input. This will then be output for any specified use or purpose.
b) Explain DOS with neat diagram.
Ans. Denial Of Service Attack: Denial of service (DOS) attack scan exploits a
known vulnerability in a specific application or operating system, or
they may attack features (or weaknesses) in specific protocols or
services. In this form of attack, the attacker is attempting to deny
authorized users access either to specific information or to the computer
system or network itself. The purpose of such an attack can be simply to
prevent access to the target system, or the attack can be used in
conjunction with other actions in order to gain unauthorized access to a
computer or network. SYN flooding is an example of a DOS attack that
takes advantage of the way TCP/IP networks were designed to function,
and it can be used to illustrate the basic principles of any DOS attack.
SYN flooding utilizes the TCP three-way handshake that is used to
establish a connection between two systems. In a SYN flooding attack,
the attacker sends fake communication requests to the targeted system.
Each of these requests will be answered by the target system, which
then waits for the third part of the handshake. Since the requests are
[Q.6 A]
fake the target will wait for responses that will never come, as shown in
Figure. From S-22
The target system will drop these connections after a specific time-out
period, but if the attacker sends requests faster than the time-out period
eliminates them, the system will quickly be filled with requests. The
number of connections a system can support is finite, so when more
requests come in than can be processed, the system will soon be
reserving all its connections for fake requests. At this point, any further
requests are simply dropped (ignored), and legitimate users who want
to connect to the target system will not be able to. Use of the system has
[Q.2 C]
From S-22
3. Then, the sender sends this encrypted message digest with the
plaintext or message to the receiver.
4. The receiver calculates the message digest from the plain text
or message he received.
5. Receiver decrypts the encrypted message digest using the
sender’s public key. If both the MDs are not same then the
plaintext or message is modified after signing.
A L L I S
W E L L F
O R Y O U
R E X A M
PLAIN TEXT: ALL IS WELL FOR YOUR EXAM
LET ORDER BE: 3, 1, 4, 5, 2.
Cipher Text: LYXLWALOELSFIOURRAME.
c) Describe packet filter router firewall with neat diagram.
Packet filter as a firewall: As per the diagram given below Firewall will
Ans. act according to the table given for example source IP 150.150.0.0 is the
IP address of a network, all the packets which are coming from this
network will be blocked by the firewall in this way it is acting as a
firewall. Table also having port 80, IP Address 200.75.10.8 & port 23
firewall will act in the similar fashion. Port 23 is for Telnet remote login
in this case firewall won’t allow to login onto this server. IP Address
200.75.10.8 is the IP address of individual Host, all the packet having
this IP address as a destination Address will be denied. Port 80 no HTTP [Q.6 C]
request allowed by firewall. From S-23
places further down the alphabet. For example, with a shift of 3, A would
be replaced by D, B would became E, and so on as shown in the table
below.
Example
PLAIN TEXT - COMPUTER ENGINEERING
Convert each alphabet in the plain text, using the table, the cipher text
can be written as
CIPHER TEXT – FRPSXWHU HQJLQHHULQJ Algorithm to break
Caesar cipher:
1. Read each alphabet in the cipher text message, and search for it
in the second row of the table above.
2. When a match in found, replace that alphabet in the cipher text
message with the corresponding alphabet in the same column but
the first row of the table. (For example, if the alphabet cipher text
is J, replace it with G).
Repeat the process for all alphabets in the cipher text message
b) Describe host based IDS with its advantages and disadvantages.
Ans.
[Q.5 B]
4.
From S-23
Ans. Hacking in simple terms means an illegal intrusion into a computer From W-
system and/or network. Government websites are the hot target of the 22
hackers due to the press coverage, it receives. Hackers enjoy the media
coverage.
OR
Hacking is the act of identifying and then exploiting weaknesses in a
computer system or network, usually to gain unauthorized access to
personal or organizational data. Hacking is not always a malicious
activity, but the term has mostly negative connotations due to its
association with cybercrime.
Different Types of Hackers:
1. Black Hat Hacker
Black-hat Hackers are also known as an Unethical Hacker or a Security
Cracker. These people hack the system
illegally to steal money or to achieve their own illegal goals.
2. White Hat Hacker
White hat Hackers are also known as Ethical Hackers or a
Penetration Tester. White hat hackers are the good guys of the
hacker world.
These people use the same technique used by the black hat
hackers. They also hack the system, but they can only hack the Diff Types
4.
system that they have permission to hack in order to test the of Hackers
security of the system.
3. Gray Hat Hacker
Gray hat Hackers are Hybrid between Black hat Hackers and White hat
hackers. They can hack any system even if they don't have permission to
test the security of the system but they will never steal money or
damage the system.
d) Explain the features of IDS technique.
Ans. 1) Traffic Monitoring: IDS continuously analyzes network packets to
detect suspicious activities.
2) Signature-Based Detection: Compares traffic patterns with a
ChatGPT
database of known attack signatures.
Answers
3) Anomaly Detection: Identifies deviations from normal behavior that
may indicate an attack.
4) Real-Time Alerts: Generates warnings and logs any detected
intrusions
into the private network. It can only forward packets which have been
requested by a host. The public network‟s users who are outside the
company can access only the DMZ host. It can store the company‟s web
pages which can be served to the outside users. Hence, the DMZ can‟t
give access to the other company‟s data. By any way, if an outsider
penetrates the DMZ‟s security the web pages may get corrupted but
other company‟s information can be safe.
Examples:
1) Web servers
It’s possible for web servers communicating with internal
database servers to be deployed in a DMZ. This makes internal
databases more secure, as these are the repositories responsible
for storing sensitive information. Web servers can connect with
the internal database server directly or through application
firewalls, even though the DMZ continues to provide protection. [Q.3 C]
5. 2) DNS servers From W-
A DNS server stores a database of public IP addresses and their 22
associated hostnames. It usually resolves or converts those
names to IP addresses when applicable. DNS servers use
specialized software and communicate with one another using
dedicated protocols. Placing a DNS server within the DMZ
prevents external DNS requests from gaining access to the
internal network. Installing a second DNS server on the internal
network can also serve as additional security.
Susbcribe our YT Channel Visit our K Scheme Website
Join our telegram Channel
3) Proxy servers
A proxy server is often paired with a firewall. Other computers use it to
view Web pages. When another computer requests a Web page, the
proxy server retrieves it and delivers it to the appropriate requesting
machine. Proxy servers establish connections on behalf of clients,
shielding them from direct communication with a server. They also
isolate internal networks from external networks and save bandwidth
by caching web content.
c) Explain working principle of SMTP in detail.
Composition of Mail: A user sends an e-mail by composing an
electronic mail message using a Mail User Agent (MUA). Mail User Agent [Q.4 D]
is a program which is used to send and receive mail. The message From W-
contains two parts: body and header. The body is the main part of the 22
message while the header includes information such as the sender and
recipient address. The header also includes descriptive information
such as the subject of the message. In this case, the message body is like
a letter and header is like an envelope that contains the recipient's
address.
1) Submission of Mail: After composing an email, the mail client
then submits the completed e-mail to the SMTP server by using
SMTP on TCP port 25.
2) Delivery of Mail: E-mail addresses contain two parts: username
of the recipient and domain name. For example,
vivek@gmail.com, where "vivek" is the username of the recipient
and "gmail.com" is the domain name. If the domain name of the
recipient's email address is different from the sender's domain [Q.4 D]
5. name, then MSA will send the mail to the Mail Transfer Agent From W-
(MTA). To relay the email, the MTA will find the target domain. It 22
checks the MX record from Domain Name System to obtain the
target domain. The MX record contains the domain name and IP
address of the recipient's domain. Once the record is located,
MTA connects to the exchange server to relay the message
3) Receipt and Processing of Mail: Once the incoming message is
received, the exchange server delivers it to the incoming server
(Mail Delivery Agent) which stores the e-mail where it waits for
the user to retrieve it.
4) Access and Retrieval of Mail: The stored email in MDA can be
retrieved by using MUA (Mail User Agent). MUA can be accessed
Susbcribe our YT Channel Visit our K Scheme Website
Join our telegram Channel
Thank You
help without selfish heart in this kaliyug
Document Information
The document outlines a model answer …
Download
Download as pdf or txt
Cipher text
Plaintext
(ii) Cryptanalysis is the study of analyzing and breaking cryptographic systems with
the goal of deciphering encrypted information without possessing the proper key or
authentication credentials.
Cryptanalysis
&$#*%@- Welcome
System
Function:
o Provides data integrity, authentication, and anti-replay protection for
IP packets.
o Ensures that the data has not been tampered with during transit and
that it originates from a legitimate source.
o AH does not provide encryption, so the payload remains visible.
Function:
7. Classify thefollowingcybercrime: 2
(i) Cyber terrorismagainst a government organization Marks
(ii) Cyber – Stalking
(iii) Copyright infringement
(iv) Email harassment
ii) Cyber stalking: Cyber Stalking means following some ones activity over
internet. This can be done with the help of many protocols available such as e- mail,
chat rooms, and user net groups.
3. Integrity: Integrity is a related concept but deals with the generation and
modification of data. Only authorized individuals should ever be able to create or
change (or delete) information. When the contents of the message are changed after
the sender sends it, but before it reaches the intended recipient, we say that the integrity
of the message is lost.
Description:
A brute force attack involves systematically guessing a password by trying
every possible combination of characters until the correct one is found. This
method relies on computing power to generate and test password
combinations.
How It Works:
o The attacker uses automated tools to try different character
combinations, starting from simple ones and progressing to more
complex variations.
o Strong passwords with greater complexity (e.g., a mix of upper- and
lower-case letters, numbers, and symbols) take significantly longer to
crack.
Examples:
o An attacker targets a web application login page by attempting
thousands of passwords per second.
o A local brute force attack on a hashed password file.
Mitigation:
o Implementing account lockout policies after a certain number of
failed attempts.
o Using CAPTCHAs to prevent automated attacks.
o Encouraging the use of long and complex passwords.
2. PhishingAttack
Description:
A phishing attack involves tricking a user into voluntarily providing their
password by impersonating a trusted entity (e.g., a bank, email provider, or
company).
How It Works:
o The attacker sends a fraudulent email or message containing a link to
a fake website that resembles a legitimate one.
o The victim is prompted to enter their password and other credentials,
which are then captured by the attacker.
Examples:
o Receiving an email claiming to be from a bank, asking to verify
account details on a fraudulent website.
o SMS-based phishing (smishing), where the victim is tricked into
providing credentials through a text message.
Mitigation:
Both brute force and phishing attacks highlight the importance of strong passwords
and user awareness in maintaining cyber security.
Steganography process:
Cover-media +Hidden data + Stego-key =Stego-medium
Cover media is the file in which we will hide the hidden data, which may also be
encrypted using stego-key. The resultant file is stego-medium. Cover-media can be
image or audio file.
Advantages:
1. With the help of steganography we can hide secret message within graphics image.
2. In modern Steganography, data is encrypted first and then inserted using special
algorithm so that no one suspects its existence.
Drawbacks:
1. It requires lot of overhead to hide a relatively few bits of information.
2. Once the system is discovered, it becomes virtually worthless.
1. Describe : 4
(i) Piggybacking Marks
(ii) Dumpster diving
(ii) Dumpster diving: Dumpster diving is a formof social engineering attack where
an individual searches through physical trash or digital remnants to gather sensitive
information. The information found can be used to breach security systems, steal
identities, or commit other malicious acts.
Examples
Corporate Data Breach:
An attacker retrieves confidential business records from improperly shredded
documents found in a company’s trash.
Ans: Caesar cipher technique is proposed by Julius Caesar. It is one of the simplest and
most widely known encryption techniques. It is a type of substitution technique in
which each letter in the plain text is replacedby a letter some fixed number of position
down the alphabet. The Caesar cipher involves replacing each letter of the alphabet
with the letter three places further down the alphabet.
For example, with a shift of 3, A would be replaced by D, B would became E, and so
on as shown in the table below
Packet filters work by inspecting packets at the network layer (Layer 3) and sometimes
at the transport layer (Layer 4) of the OSI model. They determine whether to allow or
block a packet based on a set of predefined rules.
etc.
Port Number: Indicates the specific application or service
(SSH) or 80 (HTTP).
3. Action Enforcement: Based on the match, the packet filter performs one of
two actions:
Allow (Pass): The packet is forwarded to its destination.
Limitations
ii) MAC: It is used in environments where different levels of sec are classified. It is
much more restrictive. It is sensitivity restriction, formal authorization subject to
sensitivity. In MAC owner or User cannot determine whether access is granted to i.e.
Operating system rights. Security mechanism controls ace all objects and individual
cannot change that access.
1. Convert the given plain text into cipher text using simple columnar 4
technique usingthe following data : Marks
Plain text : NETWORK SECURITY
Number columns : 06
Encryption key : 632514
6 3 2 5 1 4
N E T W O R
K S E C U R
I T Y X X X
In the above example, the plaintext has been padded so that it neatly fits in a rectangle.
This is known as aregularcolumnartransposition. An irregularcolumnartransposition
leaves these characters blank, though this makes decryption slightly more difficult.
The columns are now reordered such that the letters in the key word are ordered
alphabetically.
6 3 2 5 1 4
N E T W O R
K S E C U R
I T Y X X X
1. Session Initiation:
When a client wants to establish a connection to a remote service, the circuit
gateway first intercepts and verifies the connection request.
2. Relaying Data Packets:
After the session is established, the circuit gateway creates a communication
path and begins relaying data packets between the client and the service.
However, unlike an application gateway, the circuit gateway does not inspect
the application-level content of the data. It primarily works at the transport
layer, checking for valid transport-layer protocols (like TCP or UDP).
3. Session Termination:
When the session ends (e.g., the user finishes their interaction with the
service), the circuit gateway terminates the communication path, ensuring
the session is properly closed.
Both application gateways and circuit gateways play vital roles in network security,
but they do so at different layers of the OSI model andwith varying degrees of control
over the data. Application gateways offer more granular control at the expense of
performance, while circuit gateways provide faster, transparent session management
with limited inspection.
Advantages:
The main benefit of a DMZ is to provide an internal network with an additional
security layer by restricting access to sensitive data and servers. A DMZ enables
website visitors to obtain certain services while providing a buffer between them
and the organization's private network.
Examples:
1) Web servers: It’s possible for web servers communicating with internal database
servers to be deployed in a DMZ. This makes internal databases more secure, as these
are the repositories responsible for storing sensitive information. Web servers can
connect with theinternal databaseserver directly or through application firewalls, even
though the DMZ continues to provide protection.
2) DNS servers: A DNS server stores a database of public IP addresses and their
associated hostnames. It usually resolves or converts those names to IP addresses when
applicable. DNS servers use specialized software and communicate with one another
using dedicated protocols. Placing a DNS server within the DMZ prevents external
DNS requests from gaining access to the internal network. Installing a second DNS
server on the internal network can also serve as additional security.
3) Proxy servers: A proxy server is often paired with a firewall. Other computers use
it to view Web pages. When another computer requests a Web page, the proxy server
retrieves it and delivers it to the appropriate requesting machine. Proxy servers
establish connections on behalf of clients, shielding them from direct communication
with a server. They also isolate internal networks from external networks and save
bandwidth by caching web content
Ans: A Digital Certificate is a cryptographic tool used to verify the identity of an entity
and facilitate secure communication in a network. It acts as a trusted "electronic
passport" that confirms the identity of an organization, individual, or device.
1. Authentication:
o Digital certificates help verify the identity of users, websites, or
devices, ensuring that communication is happening with the correct
entity.
2. Data Encryption:
o Digital certificates, especially in Public Key Infrastructure (PKI)
systems, are used for encrypting data, ensuring that it remains
confidential during transmission.
3. Digital Signatures:
o They are used for signing digital documents or messages, providing
proof of origin, integrity, and non-repudiation.
4. Secure Communication:
o Digital certificates enable secure protocols like SSL/TLS for
encrypting web traffic (e.g., HTTPS), ensuring the confidentiality and
integrity of communication over the internet.
5. Non-Repudiation:
o They ensure that the sender cannot deny the authenticity of the
message, as the certificate is linked to their identity.
Private Key: The entity that needs the certificate (e.g., a website or user)
generates a private key. This key is kept secret and is used for decryption or
digital signing.
Public Key: The corresponding public key is generated, which can be shared
openly. The public key is used for encrypting messages that only the private
key can decrypt, or for verifying a digital signature.
The entity creates aCSR, which is a request to the Certificate Authority (CA)
to issue a digital certificate. The CSR includes:
o The public key generated in Step 1.
o Distinguished Name (DN) information, including:
Common Name (e.g., domain name for SSL certificates)
Organization Name
Organizational Unit (e.g., department)
Country
Locality and State
o The signature of the entity’s private key, ensuring that the request is
authentic.
Once the identity is verified, the CA generates the digital certificate. The
certificate contains:
o The public key from the CSR.
o The Distinguished Name (DN) of the certificate holder.
o The Certificate Authority’s digital si gnature.
o The Validity Period, specifying the start and expiration dates.
o The Serial Number and other relevant metadata.
The CA signs the certificate with its private key, providing a way to verify the
authenticity of the certificate.
The digital certificate is sent back to the requester, who can now install it on
their server or device.
The private key remains securely stored by the entity, while the public key
is embedded in the certificate.
5. Considering DES, find the output of the initial permutation box when the 4
input is given in hexadecimal as, 0×0000 0080 00000002 Marks
Ans:
This is a 64-bit value. First, we need to convert the input into binary format.
0x00000080 00000002 =0000 0000 0000 0000 0000 0000 1000 0000 0000 0000 0000
0000 0000 0000 0000 0010
In binary:
0000000000000000000000001000000000000000000000000000000000000010
0000 0000 0000 0000 0000 0000 1000 0000 0000 0000 0000 0000 0000 0000 0000
0010
The Initial Permutation (IP) in DES is a fixed permutation that rearranges the bits in a
specific order. The permutation order is specified by the IP table in the DES
specification.
Copy code
58 50 42 34 26 18 10 2
60 52 44 36 28 20 12 4
62 54 46 38 30 22 14 6
64 56 48 40 32 24 16 8
57 49 41 33 25 17 9 1
59 51 43 35 27 19 11 3
61 53 45 37 29 21 13 5
63 55 47 39 31 23 15 7
This table indicates the positions where each bit in the 64-bit input should be placed
during the permutation.
To apply the initial permutation, each bit from the original 64-bit input is placed into
the new 64-bit output based on the positions defined in the IP table.
0000000000000000000000001000000000000000000000000000000000000010
Now, we apply the permutation rule based on the IP table. For instance:
The first bit in the output comes from the 58th position in the input,
The second bit comes from the 50th position, and so on.
The result after applying the IP permutation to the binary input is:
After applying the IP, the output will be a rearranged 64-bit value. This output will
need to be converted back into hexadecimal.
Let's performthe bit-wise permutation. The resulting output afterapplying the IP table
will be:
1000 0010 0000 0010 0000 0000 0000 0000 0000 0010 0000 0000 0000 0000 0000
0000
1000 0010 0000 0010 0000 0000 0000 0000 0000 0010 0000 0000 0000 0000 0000
0000
=0x8002000000000000
Final Output:
The output of the Initial Permutation (IP) for the input 0x0000008000000002 is:
0x8002000000000000
This is the resulting value after applying the DES Initial Permutation (IP) to the
provided 64-bit input.
6. Risk of Financial Loss: Evaluate the financial consequences that may result from
the compromise of specific information.
(i) Network based IDS: Examines activity on the network itself It has visibility only
Ans:
into the traffic crossing the network link it is monitoring and typically has no idea of
what is happening on individual systems. NIDSs look for certain activities that typify
hostile actions or misuse, such as the following:
Denial-of-service attacks
Port scans or sweeps
Malicious content in the data payload of a packet or packets
Vulnerability scanning
Trojans, viruses, or worms
Tunneling
Brute-force attacks
It is host independent, It has high false positive rate, t senses network attack It slow
down the network that have IDS client installed.
(ii) Host based IDS: Examines activity on an individual system, such as a mail server,
web server, or individual PC. It is concerned only with an individual system and
usually has no visibility into the activity on the network
or systems around it HIDS is looking for certain activities that typify hostile
actions or misuse, such as the following:
Logins at odd hours
Login authentication failures
Additions of new user accounts
Modification or access of critical system files
It is host dependent, It has low false positive rate, It senses local attack. It slow down
the host that have IDS client installed.
iii) Honey Pots
A relatively recent innovation in intrusion detection technology is the honey pot.
Honey pots are decoy systems that are designed to lure a potential attacker away from
critical systems. Honey pots are designed to:
divert an attacker from accessing critical systems
collect information about the attacker's activity
It encourages the attacker to stay on the system long enough for administrators to
respond. These systems are filled with fabricated information designed to appear
valuable but that a legitimate user of the system wouldn’t access. Thus, any access to
the honey pot is suspect
Working of Kerberos:
1. The authentication service, or AS, receivers the request by the client and verifies
that the client is indeed the computer it claims to be. This is usually just a simple
database lookup of the users ID.
2. Upon verification, a timestamp is created. This puts the current time in a user
session, along with an expiration date. The default expiration date of a timestamp is 8
hours. The encryption key is then created. The timestamp ensures that when 8 hours
is up, the encryption key is useless.
3. The key is sent back to the client in the form of a ticket-granting ticket, or TGT.
This is a simple ticket that is issued by the authentication service. It is used for
authentication the client for future reference.
4. The client submits the ticket-granting ticket to the ticket-granting server, or TGS, to
get authenticated.
5. The TGS creates an encrypted key with a timestamp, and grants the client a service
ticket.
6. The client decrypts the ticket, tells the TGS it has done so, and then sends its own
encrypted key to the service.
7. The service decrypts the key, and makes sure the timestamp is still valid. If it is, the
service contacts the key distribution center to receive a session that is returned to the
client.
8. The client decrypts the ticket. If the keys are still valid, communication is initiated
between client and server.
(i) Sniffing : Sniffing is a type of network attack where an attacker intercepts and
monitors data transmitted over a network. The attacker uses a packet sniffer or
network analyzer tool to capture network traffic, including sensitive information like
passwords, emails, and personal messages. This attack is particularly effective on
unsecured networks, such as public Wi-Fi, where data is transmitted in clear text and
is not encrypted.
Example: Imagine you're using a public Wi-Fi network at a coffee shop, and you log
into your online bank account. While you're browsing, an attacker sitting nearby uses
a sniffer tool like Wireshark to capture the data packets transmitted over the network.
Because the data is not encrypted, the attacker can see your login credentials, including
your username and password. The attacker may then use this information to access
your bank account.
Example (IP Spoofing): In IP spoofing, the attacker sends IP packets from a forged
source address to appear as though the packets are coming from a trusted source. For
example, an attacker may send a packet that appears to be from the IP address of a
legitimate server, such as a bank’s website, tricking the victim into trusting it. Imagine
an attacker sends a malicious packet that appears to be from a legitimate banking
website. The victim might trust this packet, thinking it's from the bank, and respond
with sensitive information (such as login credentials). In reality, the attacker has forged
the source IP address to impersonate the trusted bank.
Example: An attacker sends an email that looks like it’s from a reputable company,
such as a bank or an online store. The email contains a message warning the recipient
about suspicious activity in their account and asks them to click a link to verify their
account details. The link leads to a fake website that looks identical to the real site.
Once the victim enters their personal information (such as username and password),
the attacker captures this data and can use it to steal money or perform identity theft.
The ITIL framework organizes service management into five stages in the service
lifecycle. Each stage focuses on specific aspects of service management and has its
own set of processes and best practices.
1. Service Strategy
Purpose:
Defines the approach to create and deliver IT services that align with the organization's
objectives and customer needs.
Key Objectives:
Processes:
2. Service Design
Purpose:
Focuses on designing IT services and processes to meet the objectives defined in the
Service Strategy stage.
Key Objectives:
Processes:
3. Service Transition
Purpose:
Facilitates the transition of new or changed services into the operational environment,
ensuring minimal disruption to business operations.
Key Objectives:
Processes:
Change Management
Release and Deployment Management
Service Validation and Testing
Configuration Management
Knowledge Management
4. Service Operation
Purpose:
Focuses on managing and delivering IT services to ensure they meet agreed service
levels and deliver value to the business.
Key Objectives:
Processes:
Incident Management
Problem Management
Event Management
Request Fulfillment
Access Management
Purpose:
Continuously improve the effectiveness and efficiency of IT services and processes.
Key Objectives:
Processes:
Advantages:
It improve security of network by performing checks at both levels- thet is packet and
application level. It provide flexibility fexibility to the network administrator to define
more secure policies.
Disadvantages: Internal users are connected to the application gateway as well as
packet filter router, So if any how packet filter is attacked, then the whole internal
network is exposed to the attacker.
1. Screened Host Firewall, Dule Homed Bastion: In this type of Configuration the
direct connection between internal host and packet filter are avoided. Here the packet
filter connection only to the application gateway, which is turned as separate
connection with the internal host. Hence, Packet filter is successfully attacked, and
then only application gateway is visible to the attacker.
3 Screened Subnet Firewall This type of configuration offer highest security among
the possible configurations In this type two packet filters are used , one between
internet and application gateway and other in between application gateway and
internal network This configuration achieve 3 level of security of an attacker to break
into
26 pages
2 pages
9 pages
3 pages
19 pages
5 pages
3 pages
26 pages
14 pages
4 pages
13 pages
99 pages
Show more
About Support
About Scribd, Inc. Help / FAQ
Privacy Policy
Third Parties
Accept All
Continue Without
Accepting