0% found this document useful (0 votes)
4 views8 pages

M S T

The document discusses various types of intrusions, including network, physical, and data intrusions, emphasizing the importance of protecting systems and data. It outlines security measures such as symmetric encryption, intrusion detection systems, and the use of secure communication protocols like TLS and HTTPS. Additionally, it highlights legal frameworks for data protection and the significance of honey pots in detecting unauthorized access.

Uploaded by

Simran SM
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
4 views8 pages

M S T

The document discusses various types of intrusions, including network, physical, and data intrusions, emphasizing the importance of protecting systems and data. It outlines security measures such as symmetric encryption, intrusion detection systems, and the use of secure communication protocols like TLS and HTTPS. Additionally, it highlights legal frameworks for data protection and the significance of honey pots in detecting unauthorized access.

Uploaded by

Simran SM
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 8
SECTION-A 0) Oe An intrusion is Qn unauthorized an unwanted entry into a Computex system , network Ox physical space. St involves accessing adempting to caccess Oo System an xegource without pete Sdon , often with realidous intent. Type af) Antru sions \- Network Sntrusion’ Unauthorized access to Q Computer metwork Cat Systern- Q: Physical Spttrusion : Unouthored physical access +o a building , 100m Ort device. S ie 4ntrusion: Urouthoized occess to on net of sensitive data - by’ EPy6 seawsly affes see) key fesduxe to —— Pototect yout network and data. fey Beauty Fakes > Amproved Addaess SpAce* With a ouch dorgen addoess apace then Lev, 1Pv6 enedluices the sisk of LP eo eblits ond speafing - > Mandatory Araplew entation af TPseci TPVGE vrequin dhe \mplemertation of Tec, uid) provid es kia end enoypto ard outharttation. > Seoune Neighbour Disovey: py ¢incudes ihe Secure Nelphber Discov © prevent neitbor disco > Enhanced Raita attacks },2. 2 oe Se {a Mobile Devices. ead ures Spy and Birding intespaly Wr A honey pet is a decay Com poder system On elooak that i detignd to attrac ond detect | Unowtarized anvess, such as fackens om malsar - St appears as a valuable toytt to attackers bust is actually a trap Set by secuodly porofes-| forays to gate, infmation And fro prove defences. | Purpose > “ta Detect and Analyze Threads 1) Smprae Security Defences. UW) Distt and divert Attackers cp) 4nfoxmachov “Vechnaleyy Act, 2000077 ac): Tis dan powides a frantwenk for eledieic Neoroeae 14 Siyratunes ard penaldi er fes Cyberotimes Like tracking and identity thet 4t also Covers Issues dike data pactection, @ - Cormer ce ond intellectual Peroperty utighds iia) the cusital (iy Digral Personal Yala Botection Act, 2023(D PDP» : Ic Nau fouses m™ psctecting indwidual!s persoral dada ad privacy , outlivigp how dodo should be cabllected, processed and stowed, dye | 4k gents \rdivi duals ongids Over hein data aud imposes penalties de non-corphance TB). SECTION-R ve Syomettic enougption ie a pe af eneryprtion OPS the Same Fey ts Ps booth | | en Gypritg ond de coupling forte ation Here ane the Gne Principles: |. Sing hg Usage : The same secret fy s used by both the sendesy And the vrecener. This key aa be — kept Confd extial , a Anyone with aces 1k can de the olota. 2 CoA he Mage cl ih; mare] j iS to ensure had ony oudtesh Porte can Aces the infomation The dole is unseadable withoud the arret. bey. or Speed and Efficiency = Symmetric enc ptien 4s genoably aster ond Jess NHESOUNS— intensive then Ay mmetsic encapton, malig it suitable fon entry plion e amounts 5 uy. key Distribution’ ud rej challenge is s ecunly eee aK dhe ey intercept, a confident ality Is compsremised . fgaxtkins & Example Ince AESC Adianced enor Grardard) /DESL Dale Enoyption Standard) ant 3bES triple DES). © Dade Antepedy xd Auherrb catiofoptionsl): While net metric encryption Can be Combined alwaxs Iwhered) Sy" with techniques ike meuage cudtrenticad codes (MAC) +o ensure athe clade fravit been dampened with ad +, audhenticate the sender, 5. Connon A 0 a O Ans’ Sisteibuded Host - based Antrusion Detection Syptens(HIDS) onder ard analyse Fhe activities aa multiple indiiduel fasts Comptes) Q cross Q etaa b to lett suspicious behaviox a7 Intrusions. Here's they work: I decal Agents 9 Each Host: ez Each hestlegy Sener _ watts bien) stuns a Hips oserd 9 hic, wonites: a) Syste re Jo b) File 4 esa (e.g-, Charges to Anes! system die) ©) Processes od senvices ad) Use actwity ad Sogins e) Compl quoration file 9. pata Calllection & Arabysic: | > The aed cllects dole Jorstly and pedome itl cals such ase a ped a) Checking her Froon attack patterns Ggnstores) b) Detecting mance]: le ee" accessing | Nes eo unum Yner) ) eae file do known tascline 07 hashes, | Q. Centralized management’ | ae = 2 i Central Sever oO coms @ te Celves aes and Sop fom od fast agen ae > Ht provdes: ’ a Oars pontring and correlation uf olerts PI ation ) Pattern ae eee Ite tg ©) Reporting ond alerting eg Yetection Methods* Distributed IDS Aypicadly use’ > Signa bated detection © Reg patterns. > Avomaly — based detection’ Floss deviadtias bron rarmak behalor Ff Got oll ents searordly Aransrt daa to the certral SOnvey, aften usin @ reyption Ce-9- TLs) 2 Me systers ac support real — dime an Pextodic Com muni codhon. nizes known attack 2 SECTION foyer), TLSC Transpad en Se cusy ) » on HT TES CHypertest pane Secune) AHEe Lech ralog\es used te Secure hsdo- Puen Rare Oe" Fhe iyrtennet: Hors the fecunes af SSL, TLS and HTTPS \- B5L( Seome Sockets toyed? ae 2 Ee ——— ate i cpu PtGPEPHE Prrctocal desgred to provide © Csi Geoune Sockets Seoune Gemanj cation Own G) ROpOEES 4 E velo Netscape tn the aos bet ‘eS aude avon af TLS: eu Fesdunes: a) Encryption! Seeues chata in transit to paevent eavesdsiopping: l b) Audhentication: Uses uel Cortificats to very the \dentit: af the sever cand optionally the clerd), c) Syctenrity? Ensuxes data tas nat been alltened nee | Jononemitt usteg MESST Audienti cation Codes MACS), 3) Handshake Roretocal! Establishes 2 Secune connection by wegatiadiy oyphgparhc ces ed 3 begs: e) Suppo fox Symmetric and Asymmetric Enowypllon © Public-key cagetagessrhy fox dey exchanye, and symmetric - bey fox dafa transmission, o: mEse Bianspad doyer Seoul) | “GSS the success to sb; offering stronger okear cand peter secncty: All modern f Se We comeaios ese TLS 1 ven BY still allo qui~ called "SSL" =) Fey Acsctones: | Pe a, Oe ae | ees co bah rot divecty Irtecpootle: b) Ampaeed Enorption Adgeuthn s! Suppo stronger | ard roe SeOne Cipher suites. z | 0) mM a k Pofect Farad Seoreef PFS: With comein 4 exchange allptthns (Juke Diffie Hellea”? Session keys Cannot be retroactively dle cxypted if Jong~erm keys ane Comprtersisedl « d) Enhanced Handshake Process 2- More oobust bey hegetiadion , Cortificede valid ation, ond otext ™ essaging. ©) Re cond Rotral?- Enoype applietion dota. ensuring corfidentiatify Onl intetity So. HTTPS ( Hypertext bess facto! Seoure) a s HTTP layered per SsLf TLS usedto ATTeS | seowiely hxowse WebSrtes~ 2 fey fetes i wun corte! All HTTP Cunee dleda Wik es 000K ond Logtn credential s) is enor pth SEL TT (gifs, Ue identity of ate b) fratren ees contifi cates jue by wey cake husvonrtes CAs) 3 ‘ sidy = Pyeverrs Aernperig a Cosotupt} or, 9 OP ca duxting Apansmiss}o. " Ne HTTPS is often indi cated b da) “gust Oe oe In the bsoaser and He

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy