Wa0019.
Wa0019.
○ Use data encryption, access controls, DLP tools, and employee training.
2. Creates an isolated passage across a public network:
○ Involves wrapping protected information using a public key for encryption and
private key for decryption.
6. AES algorithm uses number of keys:
● Zero-Knowledge Proof.
11.Define Firewall:
● A security device or software that monitors and controls incoming/outgoing network
traffic based on predefined rules.
12.A proxy gateway is:
● An application-level gateway that filters requests and responses between networks.
Group B – Short Answer Type Questions (5x3 = 15 marks)
● Cryptography is the science of securing data through encoding so that only intended
recipients can read it.
● Diffusion: Hides statistical structure of plaintext by spreading it over ciphertext (e.g., in
block ciphers).
● Confusion: Increases complexity of ciphertext by making the relationship between
ciphertext and key complex (e.g., S-boxes in DES).
Q3. Explain technical details of firewall and any one type with diagram.
● A firewall filters traffic between a trusted and untrusted network. It uses rules based on
IP addresses, ports, protocols, etc.
● Packet-filtering firewall:
![Diagram omitted here – basic layout shows firewall between internet and LAN, filtering
packets based on rules.]
● TLS is the successor of SSL with stronger encryption and better security protocols.
● Measures to protect data during transmission over networks from unauthorized access.
(c) Steganography:
● Hiding secret data inside images, audio, or other files without altering their appearance.
(d) Zombie:
● A compromised system controlled by a hacker, often part of a botnet used in DDoS
attacks.
● One-time pad cipher using XOR with a random key equal to message length.
● Perfectly secure if key is truly random, used once, and kept secret.