Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Network Security Questions a) Why was it basically little security for protocols

ID: 662520 • Letter: N

Question

 Network Security Questions  a) Why was it basically little security for protocols made ??for the internet ?  b ) Explain simply confidentiality, integrity and authentication  c ) What is the relationship between threats unsolicited email (spam), malware and Distributed denial of service attacks  d ) What is encrypting? 
 e ) How does encryption work with symmetric key?  f) How does public key work with encryption?  g ) Why is often used a combination of symmetric and public keys ?  h) Describe SSL and what it is used for?  i) What is VPN and what is it used for?  j) Explain the difference between a simple , stateless firewall and one that is state full ?  k) What is an intrusion prevention system ? 

Explanation / Answer

Answer:

a)

The protocols that are used to provide the security over the internet became more insure due to the increase in the usage of the internet. Now-a-days everyone is using the internet. The communication and sharing of the information is increased. Each web-site is trying to advertise their product or information to attract many people. These are causing overloading over the interwork servers and cables. Many algorithms are used to break the securities provided over internet. There by it seems to be provided with less security over internet.

b)

Confidentiality, integrity and authentication:

All of the three are related to providing security in transferring the information over some communication media.

Confidentiality:

It is to provide security for the sensitive data or information such that the information sent by the user can not be read by any other third-party. The information sent can only read by the sender and the receiver.

Examples of providing confidentiality are encrypting the message, providing passwords, keys etc.

Integrity:

This specifies that the sent data/information/message is not been modified by another third-party while transmitting. This is achieved by providing the parity bits, access controls, Cyclic Redundancy Check (CRC’s). if there is any modifications done in the information, the parity bits or the CRC’s provided will intimate that the data has been modified. In other way providing the encryption keys the data is provided with integrity.

Authentication:

            It is to assure that the information is sent by the specific user to the specific receiver by adding confidentiality and integrity information to the message. In this way the receiver will know who has sent the information and whether it is reached with integrity.

            In Authentication, special keys are used such that information is available only to the sender and the receiver. The keys provided can be combination of some public key and privates keys.

c)

Unsolicited email or spam mails:

            They contain the advertisements or the malware programs that creates nuisance and also they occupy lot of space in storage systems and transferring media. Such as overloading the systems with un-necessary information and creates the functionality of the system to slow. They even sort the data and delete the data too.

Malware:

            Malware is a program that is designed to harm the system over internet. By using the malware, one can be able to access and manipulate the secured files and authenticated data.

Distributed denial of service (DDoS) attacks:

               The denial of service is a type of attack that causes provides the system with floods of senseless request. They try to overload the system and deny the system in performing its tasks. Through this they insect the Trojan-horse into the system simultaneously and leads the system to threats.

The relationship between the three is interlinked with each other. Through the spam mails, the malware the communication systems or the systems are made slow and then attacks with the DDoS.

d)

Encryption:

            Encryption is a process of converting the readable information/messages into the unreadable form. The messages/information’s are can only be read by the authorized parities. They are mostly applicable in the electronic communication systems.

            In other words, converting a plain text into unreadable form is known as cypher text. The cypher text provide with an encryption key so that the authorized person can only decrypt the information using the encryption keys.

e)

Encryption work with the symmetric key:

            In encrypting a plain text and decrypting the cypher text, both the parties should be provided with the same key. This means both the parties should know the code that is being used to encrypt and similar technique should be used to decrypt the cypher text.

            Thus, the key provided in common is known as symmetric key.

h)

SSL:

            SSL stands for Secure Socket Layer. It is a technology that provides the standard security for establishing an encryption link between the web server and the browser.

Usage:

This provides the security over the sensitive data like, credit card numbers, login details, transmission of money, and security numbers over the network.

i)

VPN:

            VPN stands for Virtual Private Network. This is constructed using the public wires like internet. It provides security for the information that is transmitted over the internet. Since, the confidential data is being transmitted from one organization to the other organization or to a system over the internet. In-order to provide the data security VPN is being used such that no third party can encrypt the data.