0% found this document useful (0 votes)
4 views

Solution-1

The document covers various cybersecurity concepts including the differentiation between active and passive attacks, the definition and properties of digital signatures, and the explanation of SSL and IPsec protocols. It also discusses proxy servers, firewalls, and different types of malicious software such as worms and spyware. Additionally, it details the SSL handshake protocol and the functioning of packet filtering firewalls.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Solution-1

The document covers various cybersecurity concepts including the differentiation between active and passive attacks, the definition and properties of digital signatures, and the explanation of SSL and IPsec protocols. It also discusses proxy servers, firewalls, and different types of malicious software such as worms and spyware. Additionally, it details the SSL handshake protocol and the functioning of packet filtering firewalls.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Assignment - 2

1) Differentiate : Active Attacks v/s Passive Attacks

2) What is Digital Signature? List out properties of Digital Signature.


A digital signature is an electronic equivalent of a handwritten signature used to verify the
authenticity and integrity of digital data. It ensures that the sender is genuine and the message hasn't
been tampered with.
Properties :
1. Authenticity: Confirms the identity of the sender.
2. Integrity: Ensures the message hasn’t been altered.
3. Non-repudiation: Prevents the sender from denying their action.
4. Uniqueness: Each signature is unique to the message and the signer.
5. Verifiability: This can be validated by the recipient or a third party.
6. Security: Uses encryption to prevent forgery.
7. Dependability: Ensures trust in digital communications.
3) What is SSL? List out various protocols of SSL. Draw Architecture of SSL and SSL Record
Format.
SSL (Secure Sockets Layer) is a security protocol designed to provide a secure, encrypted connection
between a web server and a client (usually a web browser), ensuring that data transmitted over the
internet remains private and unaltered.
Protocols :
1. Handshake Protocol: Establishes a secure connection between the client and server,
including key exchange, authentication, and session setup.
2. Record Protocol: Provides confidentiality and integrity for the data being transmitted.
3. Alert Protocol: Communicates warnings or errors during the connection process.
4. ChangeCipherSpec Protocol: Signals that subsequent data will be encrypted.
Page 1 of 6
By Hiren Sarvaiya
Architecture :

SSL Record Format :

Page 2 of 6
By Hiren Sarvaiya
4) What is IPsec? List out various service provided by IPsec. Draw the architecture of IPsec.
IPsec (Internet Protocol Security) is a framework of protocols that provides secure communication
over IP networks by encrypting and authenticating data. It ensures data integrity, confidentiality, and
authenticity during transmission.
Services :
1. Confidentiality: Protects data by encrypting it, ensuring that only authorized parties can read
it.
2. Data Integrity: Ensures that data is not altered during transmission.
3. Authentication: Verifies the identity of the sender and receiver.
4. Access Control: Restricts unauthorized access to the network.
5. Replay Protection: Prevents attackers from reusing intercepted data packets.
6. Secure Key Management: Manages the encryption and decryption keys securely.
Architecture :

5) Draw the format of ESP Packet and AH Packet.


ESP Packet :

Page 3 of 6
By Hiren Sarvaiya
AH Packet :

6) Differentiate : HTTP v/s HTTPS

7) What is Proxy Server? Explain working and various types of Proxy Servers in detail.
A proxy server acts as an intermediary between a client and the internet. It forwards client requests
to web servers and sends responses back to the client. Proxy servers are used for improving security,
enhancing privacy, and managing network traffic.
Working :
1. A user sends a request (e.g., to access a website).
2. The request first goes to the proxy server.
3. The proxy server processes the request and forwards it to the internet.
4. The web server sends the response to the proxy server.
5. The proxy server delivers the response to the user.
Types :
1. Open/Forward Proxy:
o Routes traffic from clients to any destination on the internet.

o Used for bypassing restrictions or accessing blocked content.

Page 4 of 6
By Hiren Sarvaiya
2. Reverse Proxy:
o Acts as an intermediary between clients and a specific server.

o Used for load balancing, caching, and protecting server identity.


3. Transparent Proxy:
o Intercepts requests without altering them.

o Users are unaware of its presence.


4. Non-Transparent Proxy:
o Modifies requests or responses (e.g., for authentication).

o Users are aware of its operation.


5. Web Proxy:
o Specifically used for browsing websites.

o Provides anonymity and bypasses web filters.


6. Public Proxy:
o Available to anyone on the internet.

o Often free but can be slow and insecure.


7. Residential Proxy:
o Uses IP addresses assigned to physical devices.

o Appears as if the request comes from a real user.


8. HTTP Proxy:
o Works at the HTTP level to filter or cache content.

o Can monitor and modify HTTP requests and responses.


8) What is Firewall? Explain Packet Filtering Firewall in detail.
A firewall is a security system that monitors and controls incoming and outgoing network traffic
based on predefined rules. It acts as a barrier between a trusted network (e.g., an internal network)
and an untrusted network (e.g., the internet) to protect against unauthorized access and cyber
threats.
Packet Filtering Firewall :
A packet filtering firewall is the most basic type of firewall. It works at the network layer of the OSI
model and controls data flow by inspecting individual packets based on rules like source and
destination IP addresses, ports, and protocols.
Working :
1. Rule Evaluation: It examines packet headers and checks them against a set of predefined
rules.
2. Decision Making:
o If a packet matches the rules, it is allowed (accepted).
o If it doesn’t, it is blocked (dropped).
3. No Inspection of Payload: It does not inspect the data (payload) within the packet.
4. Unidirectional Filtering: Rules are applied to both incoming and outgoing packets
independently.

Page 5 of 6
By Hiren Sarvaiya
9) Define :
i) Worm :
A worm is a self-replicating malicious program that spreads across networks without needing a host
file. It exploits vulnerabilities to infect systems and often causes network congestion.
ii) Rootkit :
A rootkit is a malicious tool designed to provide unauthorized access to a system while hiding its
presence. It is often used to control and manipulate infected systems.
iii) Keyloggers :
Keyloggers are malicious software or hardware tools that record every keystroke made on a
keyboard. They are used to steal sensitive information, such as passwords or credit card details.
iv) Spyware :
Spyware is malicious software that secretly collects user information without consent, such as
browsing habits or personal data, and sends it to a third party.
v) Backdors :
A backdoor is a hidden method or vulnerability in a system that allows unauthorized access,
bypassing regular authentication mechanisms.
10) Explain SSL Handshake Protocol.
The Handshake Protocol is used to establish sessions. This protocol allows the client and server to
authenticate each other by sending a series of messages. It has four phases to complete its cycle.
Architecture :

1. Phase 1: The client and server exchange "hello" packets to start communication. They share
the cipher suite (encryption method) and protocol version for security.
2. Phase 2: The server sends its certificate and key details to the client. It ends this phase with a
"server hello end" packet.
3. Phase 3: The client sends its certificate and key details back to the server to complete the
exchange.
4. Phase 4: Both sides switch to the agreed encryption method (change cipher suite), ending the
handshake.
Page 6 of 6
By Hiren Sarvaiya

You might also like